Add support for Exchange 2003 provisioning

* Provisioning for Exchange 2003 and Exchange 2007 now supported
* Added end-to-end test of Exchange 2003 provisioning parser

Change-Id: I1f86f2909351a8220b963551cd33fecdf59a7e26
diff --git a/src/com/android/exchange/EasSyncService.java b/src/com/android/exchange/EasSyncService.java
index 36c6aae..e0e0ed2 100644
--- a/src/com/android/exchange/EasSyncService.java
+++ b/src/com/android/exchange/EasSyncService.java
@@ -116,6 +116,9 @@
     static private final String AUTO_DISCOVER_PAGE = "/autodiscover/autodiscover.xml";
     static private final int AUTO_DISCOVER_REDIRECT_CODE = 451;
 
+    static public final String EAS_12_POLICY_TYPE = "MS-EAS-Provisioning-WBXML";
+    static public final String EAS_2_POLICY_TYPE = "MS-WAP-Provisioning-XML";
+
     /**
      * We start with an 8 minute timeout, and increase/decrease by 3 minutes at a time.  There's
      * no point having a timeout shorter than 5 minutes, I think; at that point, we can just let
@@ -972,6 +975,10 @@
         return false;
     }
 
+    private String getPolicyType() {
+        return (mProtocolVersionDouble >= 12.0) ? EAS_12_POLICY_TYPE : EAS_2_POLICY_TYPE;
+    }
+
     // TODO This is Exchange 2007 only at this point
     /**
      * Obtain a set of policies from the server and determine whether those policies are supported
@@ -983,7 +990,7 @@
     private ProvisionParser canProvision() throws IOException {
         Serializer s = new Serializer();
         s.start(Tags.PROVISION_PROVISION).start(Tags.PROVISION_POLICIES);
-        s.start(Tags.PROVISION_POLICY).data(Tags.PROVISION_POLICY_TYPE, "MS-EAS-Provisioning-WBXML")
+        s.start(Tags.PROVISION_POLICY).data(Tags.PROVISION_POLICY_TYPE, getPolicyType())
             .end().end().end().done();
         HttpResponse resp = sendHttpClientPost("Provision", s.toByteArray());
         int code = resp.getStatusLine().getStatusCode();
@@ -1024,7 +1031,10 @@
         Serializer s = new Serializer();
         s.start(Tags.PROVISION_PROVISION).start(Tags.PROVISION_POLICIES);
         s.start(Tags.PROVISION_POLICY);
-        s.data(Tags.PROVISION_POLICY_TYPE, "MS-EAS-Provisioning-WBXML");
+
+        // Use the proper policy type, depending on EAS version
+        s.data(Tags.PROVISION_POLICY_TYPE, getPolicyType());
+
         s.data(Tags.PROVISION_POLICY_KEY, tempKey);
         s.data(Tags.PROVISION_STATUS, "1");
         if (remoteWipe) {
diff --git a/src/com/android/exchange/adapter/ProvisionParser.java b/src/com/android/exchange/adapter/ProvisionParser.java
index 513279a..ee947f2 100644
--- a/src/com/android/exchange/adapter/ProvisionParser.java
+++ b/src/com/android/exchange/adapter/ProvisionParser.java
@@ -19,6 +19,11 @@
 import com.android.email.SecurityPolicy.PolicySet;
 import com.android.exchange.EasSyncService;
 
+import org.xmlpull.v1.XmlPullParser;
+import org.xmlpull.v1.XmlPullParserException;
+import org.xmlpull.v1.XmlPullParserFactory;
+
+import java.io.ByteArrayInputStream;
 import java.io.IOException;
 import java.io.InputStream;
 
@@ -51,7 +56,7 @@
         return mRemoteWipe;
     }
 
-    public void parseProvisionDoc() throws IOException {
+    public void parseProvisionDocWbxml() throws IOException {
         int minPasswordLength = 0;
         int passwordMode = PolicySet.PASSWORD_MODE_NONE;
         int maxPasswordFails = 0;
@@ -114,10 +119,149 @@
         }
     }
 
+    class ShadowPolicySet {
+        int mMinPasswordLength = 0;
+        int mPasswordMode = PolicySet.PASSWORD_MODE_NONE;
+        int mMaxPasswordFails = 0;
+        int mMaxScreenLockTime = 0;
+    }
+
+    public void parseProvisionDocXml(String doc) throws IOException {
+        ShadowPolicySet sps = new ShadowPolicySet();
+
+        try {
+            XmlPullParserFactory factory = XmlPullParserFactory.newInstance();
+            XmlPullParser parser = factory.newPullParser();
+            parser.setInput(new ByteArrayInputStream(doc.getBytes()), "UTF-8");
+            int type = parser.getEventType();
+            if (type == XmlPullParser.START_DOCUMENT) {
+                type = parser.next();
+                if (type == XmlPullParser.START_TAG) {
+                    String tagName = parser.getName();
+                    if (tagName.equals("wap-provisioningdoc")) {
+                        parseWapProvisioningDoc(parser, sps);
+                    }
+                }
+            }
+        } catch (XmlPullParserException e) {
+           throw new IOException();
+        }
+
+        mPolicySet = new PolicySet(sps.mMinPasswordLength, sps.mPasswordMode, sps.mMaxPasswordFails,
+                sps.mMaxScreenLockTime, true);
+    }
+
+    /**
+     * Return true if password is required; otherwise false.
+     */
+    boolean parseSecurityPolicy(XmlPullParser parser, ShadowPolicySet sps)
+            throws XmlPullParserException, IOException {
+        boolean passwordRequired = true;
+        while (true) {
+            int type = parser.nextTag();
+            if (type == XmlPullParser.END_TAG && parser.getName().equals("characteristic")) {
+                break;
+            } else if (type == XmlPullParser.START_TAG) {
+                String tagName = parser.getName();
+                if (tagName.equals("parm")) {
+                    String name = parser.getAttributeValue(null, "name");
+                    if (name.equals("4131")) {
+                        String value = parser.getAttributeValue(null, "value");
+                        if (value.equals("1")) {
+                            passwordRequired = false;
+                        }
+                    }
+                }
+            }
+        }
+        return passwordRequired;
+    }
+
+    void parseCharacteristic(XmlPullParser parser, ShadowPolicySet sps)
+            throws XmlPullParserException, IOException {
+        boolean enforceInactivityTimer = true;
+        while (true) {
+            int type = parser.nextTag();
+            if (type == XmlPullParser.END_TAG && parser.getName().equals("characteristic")) {
+                break;
+            } else if (type == XmlPullParser.START_TAG) {
+                if (parser.getName().equals("parm")) {
+                    String name = parser.getAttributeValue(null, "name");
+                    String value = parser.getAttributeValue(null, "value");
+                    if (name.equals("AEFrequencyValue")) {
+                        if (enforceInactivityTimer) {
+                            if (value.equals("0")) {
+                                sps.mMaxScreenLockTime = 1;
+                            } else {
+                                sps.mMaxScreenLockTime = 60*Integer.parseInt(value);
+                            }
+                        }
+                    } else if (name.equals("AEFrequencyType")) {
+                        // "0" here means we don't enforce an inactivity timeout
+                        if (value.equals("0")) {
+                            enforceInactivityTimer = false;
+                        }
+                    } else if (name.equals("DeviceWipeThreshold")) {
+                        sps.mMaxPasswordFails = Integer.parseInt(value);
+                    } else if (name.equals("CodewordFrequency")) {
+                        // Ignore; has no meaning for us
+                    } else if (name.equals("MinimumPasswordLength")) {
+                        sps.mMinPasswordLength = Integer.parseInt(value);
+                    } else if (name.equals("PasswordComplexity")) {
+                        if (value.equals("0")) {
+                            sps.mPasswordMode = PolicySet.PASSWORD_MODE_STRONG;
+                        } else {
+                            sps.mPasswordMode = PolicySet.PASSWORD_MODE_SIMPLE;
+                        }
+                    }
+                }
+            }
+        }
+    }
+
+    void parseRegistry(XmlPullParser parser, ShadowPolicySet sps)
+            throws XmlPullParserException, IOException {
+      while (true) {
+          int type = parser.nextTag();
+          if (type == XmlPullParser.END_TAG && parser.getName().equals("characteristic")) {
+              break;
+          } else if (type == XmlPullParser.START_TAG) {
+              String name = parser.getName();
+              if (name.equals("characteristic")) {
+                  parseCharacteristic(parser, sps);
+              }
+          }
+      }
+    }
+
+    void parseWapProvisioningDoc(XmlPullParser parser, ShadowPolicySet sps)
+            throws XmlPullParserException, IOException {
+        while (true) {
+            int type = parser.nextTag();
+            if (type == XmlPullParser.END_TAG && parser.getName().equals("wap-provisioningdoc")) {
+                break;
+            } else if (type == XmlPullParser.START_TAG) {
+                String name = parser.getName();
+                if (name.equals("characteristic")) {
+                    String atype = parser.getAttributeValue(null, "type");
+                    if (atype.equals("SecurityPolicy")) {
+                        // If a password isn't required, stop here
+                        if (!parseSecurityPolicy(parser, sps)) {
+                            return;
+                        }
+                    } else if (atype.equals("Registry")) {
+                        parseRegistry(parser, sps);
+                        return;
+                    }
+                }
+            }
+        }
+    }
+
     public void parseProvisionData() throws IOException {
         while (nextTag(Tags.PROVISION_DATA) != END) {
             if (tag == Tags.PROVISION_EAS_PROVISION_DOC) {
-                parseProvisionDoc();
+                parseProvisionDocWbxml();
             } else {
                 skipTag();
             }
@@ -125,10 +269,12 @@
     }
 
     public void parsePolicy() throws IOException {
+        String policyType = null;
         while (nextTag(Tags.PROVISION_POLICY) != END) {
             switch (tag) {
                 case Tags.PROVISION_POLICY_TYPE:
-                    mService.userLog("Policy type: ", getValue());
+                    policyType = getValue();
+                    mService.userLog("Policy type: ", policyType);
                     break;
                 case Tags.PROVISION_POLICY_KEY:
                     mPolicyKey = getValue();
@@ -137,7 +283,13 @@
                     mService.userLog("Policy status: ", getValue());
                     break;
                 case Tags.PROVISION_DATA:
-                    parseProvisionData();
+                    if (policyType.equalsIgnoreCase(EasSyncService.EAS_2_POLICY_TYPE)) {
+                        // Parse the old style XML document
+                        parseProvisionDocXml(getValue());
+                    } else {
+                        // Parse the newer WBXML data
+                        parseProvisionData();
+                    }
                     break;
                 default:
                     skipTag();
diff --git a/tests/src/com/android/exchange/adapter/ProvisionParserTests.java b/tests/src/com/android/exchange/adapter/ProvisionParserTests.java
new file mode 100644
index 0000000..09a9d96
--- /dev/null
+++ b/tests/src/com/android/exchange/adapter/ProvisionParserTests.java
@@ -0,0 +1,144 @@
+/*
+ * Copyright (C) 2010 The Android Open Source Project
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package com.android.exchange.adapter;
+
+import com.android.email.SecurityPolicy.PolicySet;
+
+import java.io.ByteArrayInputStream;
+import java.io.IOException;
+
+/**
+ * You can run this entire test case with:
+ *   runtest -c com.android.exchange.adapter.ProvisionParserTests email
+ */
+public class ProvisionParserTests extends SyncAdapterTestCase {
+    private final ByteArrayInputStream mTestInputStream =
+        new ByteArrayInputStream("ABCDEFG".getBytes());
+
+    // A good sample of an Exchange 2003 (WAP) provisioning document for end-to-end testing
+    private String mWapProvisioningDoc1 =
+        "<wap-provisioningdoc>" +
+            "<characteristic type=\"SecurityPolicy\"><parm name=\"4131\" value=\"0\"/>" +
+            "</characteristic>" +
+            "<characteristic type=\"Registry\">" +
+                "<characteristic type=\"HKLM\\Comm\\Security\\Policy\\LASSD\\AE\\" +
+                        "{50C13377-C66D-400C-889E-C316FC4AB374}\">" +
+                    "<parm name=\"AEFrequencyType\" value=\"1\"/>" +
+                    "<parm name=\"AEFrequencyValue\" value=\"5\"/>" +
+                "</characteristic>" +
+                "<characteristic type=\"HKLM\\Comm\\Security\\Policy\\LASSD\">" +
+                    "<parm name=\"DeviceWipeThreshold\" value=\"20\"/>" +
+                "</characteristic>" +
+                "<characteristic type=\"HKLM\\Comm\\Security\\Policy\\LASSD\">" +
+                    "<parm name=\"CodewordFrequency\" value=\"5\"/>" +
+                "</characteristic>" +
+                "<characteristic type=\"HKLM\\Comm\\Security\\Policy\\LASSD\\LAP\\lap_pw\">" +
+                    "<parm name=\"MinimumPasswordLength\" value=\"8\"/>" +
+                "</characteristic>" +
+                "<characteristic type=\"HKLM\\Comm\\Security\\Policy\\LASSD\\LAP\\lap_pw\">" +
+                    "<parm name=\"PasswordComplexity\" value=\"0\"/>" +
+                "</characteristic>" +
+            "</characteristic>" +
+        "</wap-provisioningdoc>";
+
+    // Provisioning document with passwords turned off
+    private String mWapProvisioningDoc2 =
+        "<wap-provisioningdoc>" +
+            "<characteristic type=\"SecurityPolicy\"><parm name=\"4131\" value=\"1\"/>" +
+            "</characteristic>" +
+            "<characteristic type=\"Registry\">" +
+                "<characteristic type=\"HKLM\\Comm\\Security\\Policy\\LASSD\\AE\\" +
+                        "{50C13377-C66D-400C-889E-C316FC4AB374}\">" +
+                    "<parm name=\"AEFrequencyType\" value=\"0\"/>" +
+                    "<parm name=\"AEFrequencyValue\" value=\"5\"/>" +
+                "</characteristic>" +
+                "<characteristic type=\"HKLM\\Comm\\Security\\Policy\\LASSD\">" +
+                    "<parm name=\"DeviceWipeThreshold\" value=\"20\"/>" +
+                "</characteristic>" +
+                "<characteristic type=\"HKLM\\Comm\\Security\\Policy\\LASSD\">" +
+                    "<parm name=\"CodewordFrequency\" value=\"5\"/>" +
+                "</characteristic>" +
+                "<characteristic type=\"HKLM\\Comm\\Security\\Policy\\LASSD\\LAP\\lap_pw\">" +
+                    "<parm name=\"MinimumPasswordLength\" value=\"8\"/>" +
+                "</characteristic>" +
+                "<characteristic type=\"HKLM\\Comm\\Security\\Policy\\LASSD\\LAP\\lap_pw\">" +
+                    "<parm name=\"PasswordComplexity\" value=\"0\"/>" +
+                "</characteristic>" +
+            "</characteristic>" +
+        "</wap-provisioningdoc>";
+
+    // Provisioning document with simple password, 4 chars, 5 failures
+    private String mWapProvisioningDoc3 =
+        "<wap-provisioningdoc>" +
+            "<characteristic type=\"SecurityPolicy\"><parm name=\"4131\" value=\"0\"/>" +
+            "</characteristic>" +
+            "<characteristic type=\"Registry\">" +
+                "<characteristic type=\"HKLM\\Comm\\Security\\Policy\\LASSD\\AE\\" +
+                        "{50C13377-C66D-400C-889E-C316FC4AB374}\">" +
+                    "<parm name=\"AEFrequencyType\" value=\"1\"/>" +
+                    "<parm name=\"AEFrequencyValue\" value=\"2\"/>" +
+                "</characteristic>" +
+                "<characteristic type=\"HKLM\\Comm\\Security\\Policy\\LASSD\">" +
+                    "<parm name=\"DeviceWipeThreshold\" value=\"5\"/>" +
+                "</characteristic>" +
+                "<characteristic type=\"HKLM\\Comm\\Security\\Policy\\LASSD\">" +
+                    "<parm name=\"CodewordFrequency\" value=\"5\"/>" +
+                "</characteristic>" +
+                "<characteristic type=\"HKLM\\Comm\\Security\\Policy\\LASSD\\LAP\\lap_pw\">" +
+                    "<parm name=\"MinimumPasswordLength\" value=\"4\"/>" +
+                "</characteristic>" +
+                "<characteristic type=\"HKLM\\Comm\\Security\\Policy\\LASSD\\LAP\\lap_pw\">" +
+                    "<parm name=\"PasswordComplexity\" value=\"1\"/>" +
+                "</characteristic>" +
+            "</characteristic>" +
+        "</wap-provisioningdoc>";
+
+    public void testWapProvisionParser1() throws IOException {
+         ProvisionParser parser = new ProvisionParser(mTestInputStream, getTestService());
+        parser.parseProvisionDocXml(mWapProvisioningDoc1);
+        PolicySet ps = parser.getPolicySet();
+        assertNotNull(ps);
+        // Check the settings to make sure they were parsed correctly
+        assertEquals(5*60, ps.mMaxScreenLockTime);  // Screen lock time is in seconds
+        assertEquals(8, ps.mMinPasswordLength);
+        assertEquals(PolicySet.PASSWORD_MODE_STRONG, ps.mPasswordMode);
+        assertEquals(20, ps.mMaxPasswordFails);
+        assertTrue(ps.mRequireRemoteWipe);
+    }
+
+    public void testWapProvisionParser2() throws IOException {
+        ProvisionParser parser = new ProvisionParser(mTestInputStream, getTestService());
+        parser.parseProvisionDocXml(mWapProvisioningDoc2);
+        PolicySet ps = parser.getPolicySet();
+        assertNotNull(ps);
+        // Password should be set to none; others are ignored in this case.
+        assertEquals(PolicySet.PASSWORD_MODE_NONE, ps.mPasswordMode);
+    }
+
+    public void testWapProvisionParser3() throws IOException {
+        ProvisionParser parser = new ProvisionParser(mTestInputStream, getTestService());
+        parser.parseProvisionDocXml(mWapProvisioningDoc3);
+        PolicySet ps = parser.getPolicySet();
+        assertNotNull(ps);
+        // Password should be set to simple
+        assertEquals(2*60, ps.mMaxScreenLockTime);  // Screen lock time is in seconds
+        assertEquals(4, ps.mMinPasswordLength);
+        assertEquals(PolicySet.PASSWORD_MODE_SIMPLE, ps.mPasswordMode);
+        assertEquals(5, ps.mMaxPasswordFails);
+        assertTrue(ps.mRequireRemoteWipe);
+    }
+}