realtimenetprots/sipfw/SIP/SIPSec/DigestPlugin/inc/CSIPSecDigestCacheEntry.h
changeset 0 307788aac0a8
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/realtimenetprots/sipfw/SIP/SIPSec/DigestPlugin/inc/CSIPSecDigestCacheEntry.h	Tue Feb 02 01:03:15 2010 +0200
@@ -0,0 +1,209 @@
+/*
+* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+* All rights reserved.
+* This component and the accompanying materials are made available
+* under the terms of "Eclipse Public License v1.0"
+* which accompanies this distribution, and is available
+* at the URL "http://www.eclipse.org/legal/epl-v10.html".
+*
+* Initial Contributors:
+* Nokia Corporation - initial contribution.
+*
+* Contributors:
+*
+* Description:
+* Name          : CSIPSecDigestCacheEntry.h
+* Part of       : SIPSec
+* Version       : SIP/6.0
+*
+*/
+
+
+
+
+/**
+ @internalComponent
+*/
+
+#ifndef __SIPSEC_DIGESTCACHEENTRY_H__
+#define __SIPSEC_DIGESTCACHEENTRY_H__
+
+// INCLUDES
+#include <e32base.h>
+#include "CSIPSecDigest.h"
+
+// FORWARD DECLARATIONS
+class CUri8;
+class MSIPSecUser;
+class TSIPSecPluginCtxInfo;
+class TSIPSecPluginCtxRequest;
+class TSIPSecPluginCtxVerify;
+class TSIPSecPluginContext;
+class CSIPSecUserRecord;
+
+
+// CLASS DECLARATION
+/**
+ * @brief Class represents cache entry
+ * 
+ * @class CSIPSecDigestCacheEntry CSIPSecDigestCacheEntry.h
+ * "CSIPSecDigestCacheEntry.h"
+ *
+ * This class is an abstract base class for credentials
+ * It provides functions to assing user credentials and SIP user.
+ * It also contains logic to determine, if it should be included in outgoing
+ * SIP request 
+ */
+class CSIPSecDigestCacheEntry : public CBase
+	{
+public:	// Destructor
+
+    /**
+    * Destructor
+    */	
+    virtual ~CSIPSecDigestCacheEntry();
+
+public:	// New pure virtual functions
+
+    /**
+    * Updates entry when a SIP request is passed to SIPSec.
+    * @param aContext Request context    
+    */
+    virtual void UpdateL( TSIPSecPluginCtxRequest& aContext ) = 0;
+
+    /**
+    * Updates entry when client sets credentials.
+    * @param aUserCredentials User record
+    */
+    virtual void UpdateL( CSIPSecUserRecord& aUserCredentials )  = 0;
+
+    /**
+    * Handles authentication info
+    * @param aAuthenticationInfo authentication info context
+    */
+    virtual void HandleL( TSIPSecPluginCtxInfo& aAuthenticationInfo ) = 0;
+
+    /**
+    * Handles security verify
+    * @param aSecurityVerifyCtx Security verify context
+    */
+    virtual void HandleL( TSIPSecPluginCtxVerify& aSecurityVerifyCtx ) = 0;
+
+    /**
+    * Returns type of challenge
+    * @return Type of challenge
+    */
+    virtual CSIPSecDigest::TChallengeType Type() const = 0;
+    
+    /**
+    * Returns type of challenge, taking in account the context.
+    * @param aContext context
+    * @return Type of challenge
+    */
+    virtual CSIPSecDigest::TChallengeType
+    	Type( const TSIPSecPluginContext& aContext ) const = 0;
+
+public:	// New functions
+
+    /**
+    * Returns user data
+    * @return User data
+    */
+    CSIPSecUserRecord& UserData();
+
+    /**
+    * Sets user data
+    * @param aUserData User data
+    */
+    void SetUserData( CSIPSecUserRecord& aUserData );
+
+    /**
+    * Checks, if this entry holds asked user data
+    * @param aUserData User data
+    */
+    TBool HoldsUserData( const CSIPSecUserRecord& aUserData ) const;
+    
+    /**
+    * Checks if this should be included to outgoing request contained in
+    * context.
+    * @param aContext Context
+    * @return ETrue if entry should be included in the SIP request,
+    *		  EFalse otherwise
+    */
+    TBool Match( TSIPSecPluginContext& aContext ) const;    
+
+    /**
+    * Checks if the specified SIPSec user is same as in this instance.
+    * @param aUser SIPSec user
+    * @param aAlsoTrustedUser If ETrue and aUser does not match the SIPSec user
+    *	of this instance, then aUser's trusted user is compared to the SIPSec
+    *	user of this CSIPSecDigestCacheEntry.
+    * @param RegistrationId Registration id
+    * @return ETrue  SIPSec user is same
+    *		  EFalse Otherwise
+    */
+    TBool IsUsedByUser( const MSIPSecUser& aUser,
+    					TBool aAlsoTrustedUser,
+    					TRegistrationId aRegistrationId ) const;
+
+	/**
+    * Compares the SIPSec user to a cached SIPSec user.
+    * @param aUser SIPSec user
+    * @param aCachedUser Cached SIPSec user
+    * @param aAlsoTrustedUser If ETrue and aUser does not match the SIPSec user
+    *	of this instance, then aUser's trusted user is compared to the SIPSec
+    *	user of this CSIPSecDigestCacheEntry.
+    * @param RegistrationId Registration id
+    * @return ETrue  If the SIPSec user match
+    *		  EFalse Otherwise, or if either aUser or aCachedUser is NULL
+    */
+	static TBool CompareUsers( const MSIPSecUser& aUser,
+							   const MSIPSecUser& aCachedUser,
+							   TBool aAlsoTrustedUser,
+							   TRegistrationId aRegistrationId );
+
+	/**
+    * Get the SIPSec user
+    * @return MSIPSecUser& SIPSec user
+    */
+	const MSIPSecUser& SIPSecUser() const;
+	
+public:	// Data
+
+    static const TInt iSIPSecOffset;
+
+    TSglQueLink iLink;
+
+protected: // Constructors
+
+    /**
+    * Constructor
+    * @param aUser SIPSec user
+    */
+	CSIPSecDigestCacheEntry( const MSIPSecUser& aUser );
+
+    /**
+    * Second phase constructor
+    * @param aType Challenge type
+    * @param aRemoteTarget Remote target    
+    */
+	void ConstructL( CSIPSecDigest::TChallengeType aType,
+					 const CUri8& aRemoteTarget );
+
+protected: // Data
+
+    // User credentials, not owned.
+    CSIPSecUserRecord* iUserCredentials;
+
+	// SIPSec user
+	const MSIPSecUser& iUser;
+
+private: // Data
+
+    // Remote target, owned.
+    CUri8* iRemoteTarget;
+	};
+
+#endif //__SIPSEC_DIGESTCACHEENTRY_H__
+
+// End of File