networksecurity/tlsprovider/Test/tlstest2/negativegetsessionstep.cpp
changeset 0 af10295192d8
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/networksecurity/tlsprovider/Test/tlstest2/negativegetsessionstep.cpp	Tue Jan 26 15:23:49 2010 +0200
@@ -0,0 +1,185 @@
+// Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+/**
+ @file negativegetsessionstep.cpp
+ @internalTechnology
+*/
+#include "negativegetsessionstep.h"
+#include <tlsprovinterface.h>
+
+#define KServer2  _L8("192.168.10.11")
+#define KSessionId4 _L8("444444444455555555556666666666")
+
+CNegativeGetSessionStep::CNegativeGetSessionStep()
+	{
+	SetTestStepName(KNegativeGetSessionStep);
+	}
+	
+TVerdict CNegativeGetSessionStep::doTestStepL()
+	{
+	// first we have to retrieve the available cipher suites
+	TInt err = GetCipherSuitesL();  
+	TInt sessionIdLength(0) ;
+	
+	CTlsCryptoAttributes* tlsCryptoAttributes = Provider()->Attributes();
+		
+	tlsCryptoAttributes->iSessionNameAndID.iServerName.iAddress.Copy( KServer2 );
+	tlsCryptoAttributes->iSessionNameAndID.iServerName.iPort = 10;
+	tlsCryptoAttributes->iSessionNameAndID.iSessionId.Copy( KSessionId4 );
+	 
+	
+	tlsCryptoAttributes->iCompressionMethod = ENullCompression;
+	tlsCryptoAttributes->iCurrentCipherSuite.iHiByte = 0;
+	tlsCryptoAttributes->iCurrentCipherSuite.iLoByte = 3;
+			
+	tlsCryptoAttributes->iNegotiatedProtocol.iMajor = 3;
+	tlsCryptoAttributes->iNegotiatedProtocol.iMinor = 0; 
+	
+	tlsCryptoAttributes->iProposedProtocol.iMajor = 3;
+	tlsCryptoAttributes->iProposedProtocol.iMinor = 0; 
+			
+	tlsCryptoAttributes->iPublicKeyParams->iKeyType = ERsa;
+	tlsCryptoAttributes->iClientAuthenticate = EFalse; 
+	tlsCryptoAttributes->iDialogNonAttendedMode = ETrue;
+	
+	CX509Certificate* cert = NULL;
+	err = VerifyServerCertificateL(cert);
+	delete cert; // don't really need the cert
+	
+	err = CreateSessionL();
+		
+	// ensure we succeeded
+	if (err != KErrNone)
+		{
+		INFO_PRINTF2(_L("Failed! Create Session failed! (Error %d)"), err);
+		SetTestStepResult(EFail);
+		}
+	
+	HBufC8* keyExMessage = NULL;
+	
+	err = ClientKeyExchange(keyExMessage);
+	
+	if (err != KErrNone)
+		{
+		INFO_PRINTF2(_L("Failed! Key exchange failed! (Error %d)"), err);
+		SetTestStepResult(EFail);
+		return TestStepResult();
+		}
+	CleanupStack::PushL(keyExMessage);	
+	
+	// Call ServerFinished to do the chache
+	INFO_PRINTF1(_L("Deriving premaster secret."));
+			
+	// derive the premaster secret from the key exchange method	
+	HBufC8* premaster = DerivePreMasterSecretL(*keyExMessage);
+	CleanupStack::PopAndDestroy(keyExMessage);
+	
+	INFO_PRINTF1(_L("Deriving master secret."));
+	
+	// compute the master secret from the premaster.
+	CleanupStack::PushL(premaster);
+	HBufC8* master = ComputeMasterSecretL(*premaster);
+	CleanupStack::PopAndDestroy(premaster);
+	CleanupStack::PushL(master);
+	
+	// do the caching 
+	ValidateServerFinishL(*master);
+	
+	CleanupStack::PopAndDestroy(master);
+	// case A:
+	
+	err = VerifyGetSessionL(tlsCryptoAttributes->iSessionNameAndID.iServerName,sessionIdLength);
+	
+	if (err != KErrNone)
+		{
+		INFO_PRINTF1(_L("Case A Failed! GetSession failed!"));
+		SetTestStepResult(EFail);
+		return TestStepResult();
+		}
+		
+ 	//case B: get a session without a match.
+		
+	CTLSProvider* tlsProviderB = CTLSProvider::ConnectL();
+		
+	CTlsCryptoAttributes* tlsCryptoAttributesB = tlsProviderB->Attributes();
+	
+	tlsCryptoAttributesB->iCurrentCipherSuite.iHiByte = 0;
+	tlsCryptoAttributesB->iCurrentCipherSuite.iLoByte = 3;
+	
+	tlsCryptoAttributesB->iNegotiatedProtocol.iMajor = 3;
+	tlsCryptoAttributesB->iNegotiatedProtocol.iMinor = 1; 
+	
+	tlsCryptoAttributesB->iProposedProtocol.iMajor = 6;
+	tlsCryptoAttributesB->iProposedProtocol.iMinor = 6; 
+	
+	TTLSSessionNameAndID sessionNameAndIDB;
+	sessionNameAndIDB.iServerName.iAddress.Copy( KServer2 );
+	sessionNameAndIDB.iServerName.iPort = 10;
+			
+	err = VerifyGetSessionL(tlsProviderB ,sessionNameAndIDB.iServerName,sessionIdLength);
+		
+	if (err != KErrNone && sessionIdLength != 0)
+		{
+		INFO_PRINTF1(_L("Case B Failed! GetSession failed!"));
+		SetTestStepResult(EFail);
+		delete tlsProviderB;
+		return TestStepResult();
+		}
+	
+	// case C. get a session with a match.
+	
+	tlsCryptoAttributesB->iCurrentCipherSuite.iHiByte = 0;
+	tlsCryptoAttributesB->iCurrentCipherSuite.iLoByte = 3;
+	
+	tlsCryptoAttributesB->iNegotiatedProtocol.iMajor = 3;
+	tlsCryptoAttributesB->iNegotiatedProtocol.iMinor = 0; 
+		
+	tlsCryptoAttributesB->iProposedProtocol.iMajor = 3;
+	tlsCryptoAttributesB->iProposedProtocol.iMinor = 0; 
+	
+	err = VerifyGetSessionL(tlsProviderB ,sessionNameAndIDB.iServerName,sessionIdLength);
+			
+	if (err != KErrNone && sessionIdLength == 0)
+		{
+		INFO_PRINTF1(_L("Case C Failed! GetSession failed!"));
+		SetTestStepResult(EFail);
+		delete tlsProviderB;
+		return TestStepResult();
+		}
+		
+	err = ClearSessionCacheL(tlsProviderB, sessionNameAndIDB);
+	if (err != KErrNone)
+		{
+		INFO_PRINTF2(_L("Failed! Clear Session Failed! (Error %d)"), err);
+		SetTestStepResult(EFail);
+		delete tlsProviderB;
+		return TestStepResult();
+		}
+	
+	// check that session is gone.
+	err = VerifyGetSessionL(tlsProviderB ,sessionNameAndIDB.iServerName,sessionIdLength);
+				
+	if (err != KErrNone && sessionIdLength != 0)
+		{
+		INFO_PRINTF1(_L("Case C Failed! Session is still present"));
+		SetTestStepResult(EFail);
+		}
+	
+	delete tlsProviderB;
+					
+	return TestStepResult();
+	}
+