networksecurity/tlsprovider/Test/tlstest2/negativegetsessionstep.cpp
author Dremov Kirill (Nokia-D-MSW/Tampere) <kirill.dremov@nokia.com>
Tue, 26 Jan 2010 15:23:49 +0200
changeset 0 af10295192d8
permissions -rw-r--r--
Revision: 201004

// Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
// All rights reserved.
// This component and the accompanying materials are made available
// under the terms of "Eclipse Public License v1.0"
// which accompanies this distribution, and is available
// at the URL "http://www.eclipse.org/legal/epl-v10.html".
//
// Initial Contributors:
// Nokia Corporation - initial contribution.
//
// Contributors:
//
// Description:
//

/**
 @file negativegetsessionstep.cpp
 @internalTechnology
*/
#include "negativegetsessionstep.h"
#include <tlsprovinterface.h>

#define KServer2  _L8("192.168.10.11")
#define KSessionId4 _L8("444444444455555555556666666666")

CNegativeGetSessionStep::CNegativeGetSessionStep()
	{
	SetTestStepName(KNegativeGetSessionStep);
	}
	
TVerdict CNegativeGetSessionStep::doTestStepL()
	{
	// first we have to retrieve the available cipher suites
	TInt err = GetCipherSuitesL();  
	TInt sessionIdLength(0) ;
	
	CTlsCryptoAttributes* tlsCryptoAttributes = Provider()->Attributes();
		
	tlsCryptoAttributes->iSessionNameAndID.iServerName.iAddress.Copy( KServer2 );
	tlsCryptoAttributes->iSessionNameAndID.iServerName.iPort = 10;
	tlsCryptoAttributes->iSessionNameAndID.iSessionId.Copy( KSessionId4 );
	 
	
	tlsCryptoAttributes->iCompressionMethod = ENullCompression;
	tlsCryptoAttributes->iCurrentCipherSuite.iHiByte = 0;
	tlsCryptoAttributes->iCurrentCipherSuite.iLoByte = 3;
			
	tlsCryptoAttributes->iNegotiatedProtocol.iMajor = 3;
	tlsCryptoAttributes->iNegotiatedProtocol.iMinor = 0; 
	
	tlsCryptoAttributes->iProposedProtocol.iMajor = 3;
	tlsCryptoAttributes->iProposedProtocol.iMinor = 0; 
			
	tlsCryptoAttributes->iPublicKeyParams->iKeyType = ERsa;
	tlsCryptoAttributes->iClientAuthenticate = EFalse; 
	tlsCryptoAttributes->iDialogNonAttendedMode = ETrue;
	
	CX509Certificate* cert = NULL;
	err = VerifyServerCertificateL(cert);
	delete cert; // don't really need the cert
	
	err = CreateSessionL();
		
	// ensure we succeeded
	if (err != KErrNone)
		{
		INFO_PRINTF2(_L("Failed! Create Session failed! (Error %d)"), err);
		SetTestStepResult(EFail);
		}
	
	HBufC8* keyExMessage = NULL;
	
	err = ClientKeyExchange(keyExMessage);
	
	if (err != KErrNone)
		{
		INFO_PRINTF2(_L("Failed! Key exchange failed! (Error %d)"), err);
		SetTestStepResult(EFail);
		return TestStepResult();
		}
	CleanupStack::PushL(keyExMessage);	
	
	// Call ServerFinished to do the chache
	INFO_PRINTF1(_L("Deriving premaster secret."));
			
	// derive the premaster secret from the key exchange method	
	HBufC8* premaster = DerivePreMasterSecretL(*keyExMessage);
	CleanupStack::PopAndDestroy(keyExMessage);
	
	INFO_PRINTF1(_L("Deriving master secret."));
	
	// compute the master secret from the premaster.
	CleanupStack::PushL(premaster);
	HBufC8* master = ComputeMasterSecretL(*premaster);
	CleanupStack::PopAndDestroy(premaster);
	CleanupStack::PushL(master);
	
	// do the caching 
	ValidateServerFinishL(*master);
	
	CleanupStack::PopAndDestroy(master);
	// case A:
	
	err = VerifyGetSessionL(tlsCryptoAttributes->iSessionNameAndID.iServerName,sessionIdLength);
	
	if (err != KErrNone)
		{
		INFO_PRINTF1(_L("Case A Failed! GetSession failed!"));
		SetTestStepResult(EFail);
		return TestStepResult();
		}
		
 	//case B: get a session without a match.
		
	CTLSProvider* tlsProviderB = CTLSProvider::ConnectL();
		
	CTlsCryptoAttributes* tlsCryptoAttributesB = tlsProviderB->Attributes();
	
	tlsCryptoAttributesB->iCurrentCipherSuite.iHiByte = 0;
	tlsCryptoAttributesB->iCurrentCipherSuite.iLoByte = 3;
	
	tlsCryptoAttributesB->iNegotiatedProtocol.iMajor = 3;
	tlsCryptoAttributesB->iNegotiatedProtocol.iMinor = 1; 
	
	tlsCryptoAttributesB->iProposedProtocol.iMajor = 6;
	tlsCryptoAttributesB->iProposedProtocol.iMinor = 6; 
	
	TTLSSessionNameAndID sessionNameAndIDB;
	sessionNameAndIDB.iServerName.iAddress.Copy( KServer2 );
	sessionNameAndIDB.iServerName.iPort = 10;
			
	err = VerifyGetSessionL(tlsProviderB ,sessionNameAndIDB.iServerName,sessionIdLength);
		
	if (err != KErrNone && sessionIdLength != 0)
		{
		INFO_PRINTF1(_L("Case B Failed! GetSession failed!"));
		SetTestStepResult(EFail);
		delete tlsProviderB;
		return TestStepResult();
		}
	
	// case C. get a session with a match.
	
	tlsCryptoAttributesB->iCurrentCipherSuite.iHiByte = 0;
	tlsCryptoAttributesB->iCurrentCipherSuite.iLoByte = 3;
	
	tlsCryptoAttributesB->iNegotiatedProtocol.iMajor = 3;
	tlsCryptoAttributesB->iNegotiatedProtocol.iMinor = 0; 
		
	tlsCryptoAttributesB->iProposedProtocol.iMajor = 3;
	tlsCryptoAttributesB->iProposedProtocol.iMinor = 0; 
	
	err = VerifyGetSessionL(tlsProviderB ,sessionNameAndIDB.iServerName,sessionIdLength);
			
	if (err != KErrNone && sessionIdLength == 0)
		{
		INFO_PRINTF1(_L("Case C Failed! GetSession failed!"));
		SetTestStepResult(EFail);
		delete tlsProviderB;
		return TestStepResult();
		}
		
	err = ClearSessionCacheL(tlsProviderB, sessionNameAndIDB);
	if (err != KErrNone)
		{
		INFO_PRINTF2(_L("Failed! Clear Session Failed! (Error %d)"), err);
		SetTestStepResult(EFail);
		delete tlsProviderB;
		return TestStepResult();
		}
	
	// check that session is gone.
	err = VerifyGetSessionL(tlsProviderB ,sessionNameAndIDB.iServerName,sessionIdLength);
				
	if (err != KErrNone && sessionIdLength != 0)
		{
		INFO_PRINTF1(_L("Case C Failed! Session is still present"));
		SetTestStepResult(EFail);
		}
	
	delete tlsProviderB;
					
	return TestStepResult();
	}