os/persistentdata/persistentstorage/sql/TEST/t_sqlattach.cpp
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
sl@0
     1
// Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
sl@0
     2
// All rights reserved.
sl@0
     3
// This component and the accompanying materials are made available
sl@0
     4
// under the terms of "Eclipse Public License v1.0"
sl@0
     5
// which accompanies this distribution, and is available
sl@0
     6
// at the URL "http://www.eclipse.org/legal/epl-v10.html".
sl@0
     7
//
sl@0
     8
// Initial Contributors:
sl@0
     9
// Nokia Corporation - initial contribution.
sl@0
    10
//
sl@0
    11
// Contributors:
sl@0
    12
//
sl@0
    13
// Description:
sl@0
    14
//
sl@0
    15
sl@0
    16
#include <e32test.h>
sl@0
    17
#include <bautils.h>
sl@0
    18
#include <sqldb.h>
sl@0
    19
sl@0
    20
///////////////////////////////////////////////////////////////////////////////////////
sl@0
    21
sl@0
    22
RTest TheTest(_L("t_sqlattach test"));
sl@0
    23
sl@0
    24
RSqlDatabase TheDb;
sl@0
    25
RSqlDatabase TheDb2;
sl@0
    26
sl@0
    27
_LIT(KTestDir, "c:\\test\\");
sl@0
    28
sl@0
    29
_LIT(KTestDb1, "c:\\test\\t_sqlattach_1.db");
sl@0
    30
_LIT(KTestDb2, "c:\\test\\t_sqlattach_2.db");
sl@0
    31
_LIT(KTestDb3, "c:\\test\\t_sqlattach_3.db");
sl@0
    32
_LIT(KTestDb4, "c:\\test\\t_sqlattach_4.db");
sl@0
    33
sl@0
    34
_LIT(KSecureTestDb1, "c:[21212122]BBDb2.db");//Created outside this test app
sl@0
    35
_LIT(KSecureTestDb2, "c:[21212122]AADb2.db");//Created outside this test app
sl@0
    36
_LIT(KSecureTestDb3, "c:[21212123]t_sqlattach_3.db");
sl@0
    37
_LIT(KDbNameInjection, "c:\\test\\t_sqlattach_3.db' as db; delete from a;");
sl@0
    38
sl@0
    39
//const TUid KSecureUid = {0x21212122};//The UID of the secure test databases: KSecureTestDb1 and KSecureTestDb2
sl@0
    40
sl@0
    41
//The test uses two secure databases: KSecureTestDb1 and KSecureTestDb2.
sl@0
    42
//
sl@0
    43
//KSecureTestDb1 schema
sl@0
    44
//TABLE A1(F1 INTEGER , F2 INTEGER, B1 BLOB)
sl@0
    45
//
sl@0
    46
//KSecureTestDb1 security settings
sl@0
    47
//-Security UID  = KSecureUid
sl@0
    48
//-Schema policy = ECapabilityTrustedUI
sl@0
    49
//-Read policy   = ECapabilityReadDeviceData
sl@0
    50
//-Write policy  = ECapabilityWriteDeviceData
sl@0
    51
//The test application can read/write the database tables but cannot modify the database structure
sl@0
    52
//
sl@0
    53
//KSecureTestDb2 schema
sl@0
    54
//TABLE C(A1 INTEGER, B2 BLOB)
sl@0
    55
//
sl@0
    56
//KSecureTestDb2 security settings
sl@0
    57
//-Security UID  = KSecureUid
sl@0
    58
//-Schema policy = ECapabilityDiskAdmin
sl@0
    59
//-Read policy   = ECapabilityNetworkControl
sl@0
    60
//-Write policy  = ECapabilityWriteDeviceData
sl@0
    61
//The test application can write to the database tables but cannot modify the database structure or read from tables
sl@0
    62
sl@0
    63
///////////////////////////////////////////////////////////////////////////////////////
sl@0
    64
sl@0
    65
void DeleteDatabases()
sl@0
    66
	{
sl@0
    67
	TheDb2.Close();
sl@0
    68
	TheDb.Close();
sl@0
    69
	(void)RSqlDatabase::Delete(KDbNameInjection);
sl@0
    70
	(void)RSqlDatabase::Delete(KSecureTestDb3);
sl@0
    71
	(void)RSqlDatabase::Delete(KTestDb4);
sl@0
    72
	(void)RSqlDatabase::Delete(KTestDb3);
sl@0
    73
	(void)RSqlDatabase::Delete(KTestDb2);	
sl@0
    74
	(void)RSqlDatabase::Delete(KTestDb1);	
sl@0
    75
	}
sl@0
    76
sl@0
    77
///////////////////////////////////////////////////////////////////////////////////////
sl@0
    78
//Test macros and functions
sl@0
    79
void Check(TInt aValue, TInt aLine)
sl@0
    80
	{
sl@0
    81
	if(!aValue)
sl@0
    82
		{
sl@0
    83
		DeleteDatabases();
sl@0
    84
		TheTest(EFalse, aLine);
sl@0
    85
		}
sl@0
    86
	}
sl@0
    87
void Check(TInt aValue, TInt aExpected, TInt aLine)
sl@0
    88
	{
sl@0
    89
	if(aValue != aExpected)
sl@0
    90
		{
sl@0
    91
		DeleteDatabases();
sl@0
    92
		RDebug::Print(_L("*** Expected error: %d, got: %d\r\n"), aExpected, aValue);
sl@0
    93
		TheTest(EFalse, aLine);
sl@0
    94
		}
sl@0
    95
	}
sl@0
    96
#define TEST(arg) ::Check((arg), __LINE__)
sl@0
    97
#define TEST2(aValue, aExpected) ::Check(aValue, aExpected, __LINE__)
sl@0
    98
sl@0
    99
///////////////////////////////////////////////////////////////////////////////////////
sl@0
   100
sl@0
   101
void CreateTestDir()
sl@0
   102
    {
sl@0
   103
    RFs fs;
sl@0
   104
	TInt err = fs.Connect();
sl@0
   105
	TEST2(err, KErrNone);
sl@0
   106
sl@0
   107
	err = fs.MkDir(KTestDir);
sl@0
   108
	TEST(err == KErrNone || err == KErrAlreadyExists);
sl@0
   109
	
sl@0
   110
	fs.Close();
sl@0
   111
	}
sl@0
   112
sl@0
   113
void CreateDatabases()
sl@0
   114
	{
sl@0
   115
	TBuf<100> sql;
sl@0
   116
	
sl@0
   117
	TInt err = TheDb.Create(KTestDb1);
sl@0
   118
	TEST2(err, KErrNone);
sl@0
   119
	sql.Copy(_L("CREATE TABLE A1(F1 INTEGER, F2 INTEGER)"));
sl@0
   120
	err = TheDb.Exec(sql);
sl@0
   121
	TEST(err >= 0);
sl@0
   122
	sql.Copy(_L("CREATE TABLE A2(DDD INTEGER)"));
sl@0
   123
	err = TheDb.Exec(sql);
sl@0
   124
	TEST(err >= 0);
sl@0
   125
	TheDb.Close();
sl@0
   126
	
sl@0
   127
	err = TheDb.Create(KTestDb2);
sl@0
   128
	TEST2(err, KErrNone);
sl@0
   129
	sql.Copy(_L("CREATE TABLE B(A1 INTEGER, A2 INTEGER)"));
sl@0
   130
	err = TheDb.Exec(sql);
sl@0
   131
	TEST(err >= 0);
sl@0
   132
	TheDb.Close();
sl@0
   133
	}
sl@0
   134
sl@0
   135
///////////////////////////////////////////////////////////////////////////////////////
sl@0
   136
///////////////////////////////////////////////////////////////////////////////////////
sl@0
   137
sl@0
   138
/**
sl@0
   139
@SYMTestCaseID			SYSLIB-SQL-CT-1641
sl@0
   140
@SYMTestCaseDesc		Attached database tests.
sl@0
   141
						Open non-secure database, attach secure database.
sl@0
   142
						The test application's security policy allows read/write operations on the attached
sl@0
   143
						database, but database schema modifications are not allowed. The test executes
sl@0
   144
						different kind of SQL statements to verify that the test application's security 
sl@0
   145
						policy is properly asserted by the SQL server.
sl@0
   146
@SYMTestPriority		High
sl@0
   147
@SYMTestActions			Execution SQL statements on attached database.
sl@0
   148
@SYMTestExpectedResults Test must not fail
sl@0
   149
@SYMREQ					REQ5792
sl@0
   150
                        REQ5793
sl@0
   151
*/	
sl@0
   152
void Test1()
sl@0
   153
	{
sl@0
   154
	TInt err = TheDb.Open(KTestDb1);
sl@0
   155
	TEST2(err, KErrNone);
sl@0
   156
	
sl@0
   157
	//Attach a secure database, the logical database name length is 0
sl@0
   158
	_LIT(KAttachDb0, "");
sl@0
   159
	err = TheDb.Attach(KSecureTestDb1, KAttachDb0);
sl@0
   160
	TEST2(err, KErrBadName);
sl@0
   161
sl@0
   162
	//Attach a secure database, the logical database name length is > than KMaxFileName
sl@0
   163
	TBuf<KMaxFileName + 1> longDbName;
sl@0
   164
	longDbName.SetLength(longDbName.MaxLength());
sl@0
   165
	longDbName.Fill(TChar('A'));
sl@0
   166
	err = TheDb.Attach(KSecureTestDb1, longDbName);
sl@0
   167
	TEST2(err, KErrBadName);
sl@0
   168
	
sl@0
   169
	//Attach a secure database
sl@0
   170
	//The test application can read/write the attached database tables but cannot modify the database structure
sl@0
   171
	_LIT(KAttachDb1, "Db1");
sl@0
   172
	err = TheDb.Attach(KSecureTestDb1, KAttachDb1);
sl@0
   173
	TEST2(err, KErrNone);
sl@0
   174
	
sl@0
   175
	//Attempt to read from the attached secure database
sl@0
   176
	err = TheDb.Exec(_L("SELECT * FROM db1.a1"));
sl@0
   177
	TEST(err >= 0);
sl@0
   178
	//Attempt to write to the attached secure database
sl@0
   179
	err = TheDb.Exec(_L("INSERT INTO dB1.a1(f1) valUES(10)"));
sl@0
   180
	TEST2(err, 1);
sl@0
   181
	//Attempt to modify the attached secure database schema
sl@0
   182
	err = TheDb.Exec(_L("CREATE TABLE db1.CCC(H REAL)"));
sl@0
   183
	TEST2(err, KErrPermissionDenied);
sl@0
   184
	err = TheDb.Exec(_L("ALTER TABLE db1.A1 ADD COLUMN a2 integer"));
sl@0
   185
	TEST2(err, KErrPermissionDenied);
sl@0
   186
	
sl@0
   187
	//Attempt to read from the main non-secure database
sl@0
   188
	err = TheDb.Exec(_L("SELECT * FROM main.a1"));
sl@0
   189
	TEST(err >= 0);
sl@0
   190
	//Attempt to write to the main non-secure database
sl@0
   191
	err = TheDb.Exec(_L("INSERT INTO a1(f1) valUES(10)"));
sl@0
   192
	TEST2(err, 1);
sl@0
   193
	//Attempt to modify the main non-secure database schema
sl@0
   194
	err = TheDb.Exec(_L("CREATE TABLE a3(H REAL)"));
sl@0
   195
	TEST(err >= 0);
sl@0
   196
sl@0
   197
	TheTest.Printf(_L("===Attach second, non-secure database"));
sl@0
   198
	//Attach a non-secure database
sl@0
   199
	//The test application should be able to do everything with the attached database
sl@0
   200
	_LIT(KAttachDb2, "db2");
sl@0
   201
	err = TheDb.Attach(KTestDb2, KAttachDb2);
sl@0
   202
	TEST2(err, KErrNone);
sl@0
   203
sl@0
   204
	//Attempt to read from the attached non-secure database
sl@0
   205
	err = TheDb.Exec(_L("SELECT * FROM db2.B"));
sl@0
   206
	TEST(err >= 0);
sl@0
   207
	//Attempt to write to the attached non-secure database
sl@0
   208
	err = TheDb.Exec(_L("INSERT INTO dB2.b(a2) ValUES(112)"));
sl@0
   209
	TEST2(err, 1);
sl@0
   210
	//Attempt to modify the attached non-secure database schema
sl@0
   211
	err = TheDb.Exec(_L("ALTER TABLE db2.b ADD COLUMN a3 text"));
sl@0
   212
	TEST(err >= 0);
sl@0
   213
sl@0
   214
	TheTest.Printf(_L("===Attach third, non-secure database (the main database)"));
sl@0
   215
	//Attach a non-secure database (the main database)
sl@0
   216
	//The test application should be able to do everything with the attached database
sl@0
   217
	_LIT(KAttachDb3, "db3");
sl@0
   218
	err = TheDb.Attach(KTestDb1, KAttachDb3);
sl@0
   219
	TEST2(err, KErrNone);
sl@0
   220
	
sl@0
   221
	//Attempt to read from the third, non-secure database
sl@0
   222
	err = TheDb.Exec(_L("SELECT * FROM db3.a1"));
sl@0
   223
	TEST(err >= 0);
sl@0
   224
	//Attempt to write to the third, non-secure database
sl@0
   225
	err = TheDb.Exec(_L("INSERT INTO db3.a1(f2) values(11)"));
sl@0
   226
	TEST2(err, 1);
sl@0
   227
	//Attempt to modify the third, non-secure database schema
sl@0
   228
	err = TheDb.Exec(_L("CREATE TABLE db3.a4(s blob)"));
sl@0
   229
	TEST(err < 0);//Cannot modify the main database from the atatched!?
sl@0
   230
sl@0
   231
	TheTest.Printf(_L("===Attach fourth, secure database"));
sl@0
   232
	//Attach a secure database
sl@0
   233
	//The test application can only write to the database, but cannot modify the schema or read from the database
sl@0
   234
	_LIT(KAttachDb4, "db4");
sl@0
   235
	err = TheDb.Attach(KSecureTestDb2, KAttachDb4);
sl@0
   236
	TEST2(err, KErrNone);
sl@0
   237
sl@0
   238
	//Attempt to read from the attached secure database
sl@0
   239
	err = TheDb.Exec(_L("SELECT * FROM db4.c"));
sl@0
   240
	TEST2(err, KErrPermissionDenied);
sl@0
   241
	//Attempt to write to the attached secure database
sl@0
   242
	err = TheDb.Exec(_L("INSERT INTO Db4.c(a1) VALUES(1)"));
sl@0
   243
	TEST2(err, 1);
sl@0
   244
	//Attempt to write to a non-secure database using data from the attached secure database
sl@0
   245
	err = TheDb.Exec(_L("INSERT INTO a1(f1) select db4.c.a1 from db4.c"));
sl@0
   246
	TEST2(err, KErrPermissionDenied);
sl@0
   247
	//Attempt to write to a secure database using data from a non-secure database
sl@0
   248
	err = TheDb.Exec(_L("INSERT INTO db4.c(a1) select f1 from a1"));
sl@0
   249
	TEST(err >= 0);
sl@0
   250
	err = TheDb.Exec(_L("UPDATE db4.C SET a1 = 3 WHERE a1 = 1"));
sl@0
   251
	TEST2(err, KErrPermissionDenied);//!?!?!?
sl@0
   252
	err = TheDb.Exec(_L("DELETE FROM db4.C"));
sl@0
   253
	TEST(err >= 0);
sl@0
   254
	//Attempt to modify the attached secure database schema
sl@0
   255
	err = TheDb.Exec(_L("CREATE TABLE db4.CCC(z integer)"));
sl@0
   256
	TEST2(err, KErrPermissionDenied);
sl@0
   257
	err = TheDb.Exec(_L("DROP table db4.C"));
sl@0
   258
	TEST2(err, KErrPermissionDenied);
sl@0
   259
	
sl@0
   260
	err = TheDb.Detach(KAttachDb2);
sl@0
   261
	TEST2(err, KErrNone);	
sl@0
   262
	err = TheDb.Detach(KAttachDb1);
sl@0
   263
	TEST2(err, KErrNone);
sl@0
   264
	
sl@0
   265
	err = TheDb.Detach(KAttachDb4);
sl@0
   266
	TEST2(err, KErrNone);	
sl@0
   267
	err = TheDb.Exec(_L("SELECT * FROM db4.c"));
sl@0
   268
	TEST(err < 0);
sl@0
   269
		
sl@0
   270
	err = TheDb.Detach(KAttachDb2);
sl@0
   271
	TEST(err != KErrNone);	
sl@0
   272
	
sl@0
   273
	err = TheDb.Detach(KAttachDb3);
sl@0
   274
	TEST2(err, KErrNone);
sl@0
   275
	err = TheDb.Exec(_L("INSERT INTO db3.a1(f2) values(11)"));
sl@0
   276
	TEST(err < 0);
sl@0
   277
	
sl@0
   278
	err = TheDb.Detach(KAttachDb4);
sl@0
   279
	TEST(err != KErrNone);	
sl@0
   280
sl@0
   281
    //Detach() with zero-length logical database name
sl@0
   282
    err = TheDb.Detach(_L(""));
sl@0
   283
    TEST2(err, KErrBadName);  
sl@0
   284
    
sl@0
   285
    //Detach() with logical database name containing "bad" unicode characters (cannot be converted to UTF8)
sl@0
   286
    TBuf<2> dbName3;
sl@0
   287
    dbName3.SetLength(2);
sl@0
   288
    dbName3[0] = TChar(0xD800); 
sl@0
   289
    dbName3[1] = TChar(0xFC00); 
sl@0
   290
    err = TheDb.Detach(dbName3);
sl@0
   291
    TEST2(err, KSqlErrGeneral);  
sl@0
   292
    
sl@0
   293
    //Attach a non-existing database
sl@0
   294
    _LIT(KAttachDbFile5, "c:\\test\\zxcvbnm987654321.db");
sl@0
   295
    _LIT(KAttachDb5, "zxcvbnm987654321");
sl@0
   296
    err = TheDb.Attach(KAttachDbFile5, KAttachDb5);
sl@0
   297
    TEST2(err, KErrNotFound);
sl@0
   298
        
sl@0
   299
	TheDb.Close();
sl@0
   300
	}
sl@0
   301
sl@0
   302
/**
sl@0
   303
@SYMTestCaseID			SYSLIB-SQL-CT-1642
sl@0
   304
@SYMTestCaseDesc		Attached database tests.
sl@0
   305
						Open secure database, attach secure database.
sl@0
   306
						The test application's security policy allows read/write operations on the main
sl@0
   307
						database, but database schema modifications are not allowed.  The test application
sl@0
   308
						is allowed to write to the attached database but can't read from or modify the schema.
sl@0
   309
						The test executes different kind of SQL statements to verify that the test application's security 
sl@0
   310
						policy is properly asserted by the SQL server.
sl@0
   311
@SYMTestPriority		High
sl@0
   312
@SYMTestActions			Execution SQL statements on attached database.
sl@0
   313
@SYMTestExpectedResults Test must not fail
sl@0
   314
@SYMREQ					REQ5792
sl@0
   315
                        REQ5793
sl@0
   316
*/	
sl@0
   317
void Test2()
sl@0
   318
	{
sl@0
   319
	//The test application can read/write the database tables but cannot modify the database structure
sl@0
   320
	TInt err = TheDb.Open(KSecureTestDb1);
sl@0
   321
	TEST2(err, KErrNone);
sl@0
   322
	_LIT(KAttachDb2, "Db2");
sl@0
   323
	//The test application can only write to the database, but cannot modify the schema or read from the database
sl@0
   324
	err = TheDb.Attach(KSecureTestDb2, KAttachDb2);
sl@0
   325
	TEST2(err, KErrNone);
sl@0
   326
	
sl@0
   327
	//Attempt to read from the main database and write to the attached database
sl@0
   328
	err = TheDb.Exec(_L("INSERT INTO db2.c(a1) SELECT f1 FROM a1"));
sl@0
   329
	TEST(err >= 0);
sl@0
   330
	
sl@0
   331
	//Attempt to read from the attached database and write to the main database
sl@0
   332
	err = TheDb.Exec(_L("INSERT INTO  a1(f2) SELECT a1 FROM db2.c"));
sl@0
   333
	TEST2(err, KErrPermissionDenied);
sl@0
   334
sl@0
   335
	//Attempt to detach database using DETACH sql statement directly.
sl@0
   336
	err = TheDb.Exec(_L("DETACH DATABASE DB2"));
sl@0
   337
	TEST2(err, KErrPermissionDenied);
sl@0
   338
		
sl@0
   339
	err = TheDb.Detach(KAttachDb2);
sl@0
   340
	TEST2(err, KErrNone);	
sl@0
   341
sl@0
   342
	//Attempt to attach a database using ATTACH sql statement directly.
sl@0
   343
	TBuf<100> sql;
sl@0
   344
	sql.Format(_L("ATTACH DATABASE '%S' AS Db3"), &KSecureTestDb2);
sl@0
   345
	err = TheDb.Exec(sql);
sl@0
   346
	TEST2(err, KErrPermissionDenied);
sl@0
   347
		
sl@0
   348
	TheDb.Close();
sl@0
   349
	}
sl@0
   350
sl@0
   351
/**
sl@0
   352
@SYMTestCaseID			SYSLIB-SQL-CT-1814
sl@0
   353
@SYMTestCaseDesc		Attached database tests. SQL injection.
sl@0
   354
						Create the following test databases:
sl@0
   355
						1) c:\test\inj.db
sl@0
   356
						2) c:\test\inj.db' as db; delete from a;
sl@0
   357
						3) c:[21212123]Injected.db
sl@0
   358
						Insert some records in database (3). Attach database (2) to database (3).
sl@0
   359
						Check the records count of table A. If the count is zero, then it means that the injection has been successful
sl@0
   360
						and a security hole exists when attaching/detaching databases.
sl@0
   361
@SYMTestPriority		High
sl@0
   362
@SYMTestActions			Attached database tests. SQL injection.
sl@0
   363
@SYMTestExpectedResults Test must not fail
sl@0
   364
@SYMREQ					REQ5792
sl@0
   365
                        REQ5793
sl@0
   366
*/	
sl@0
   367
void SqlInjectionTest()
sl@0
   368
	{
sl@0
   369
	//Create the database, which name is used for the attack. 
sl@0
   370
	//This is done just to ensure that the database, which name is used in the SQL injection, exists,
sl@0
   371
	//Otherwise the injection attack may fail with KErrNotFound error.
sl@0
   372
	TInt err = TheDb2.Create(KTestDb3);
sl@0
   373
	TEST2(err, KErrNone);
sl@0
   374
	TheDb2.Close();
sl@0
   375
	err = TheDb2.Create(KDbNameInjection);
sl@0
   376
	TEST2(err, KErrNone);
sl@0
   377
	TheDb2.Close();
sl@0
   378
	//Create a secure database, which will be impacted by the SQL injection
sl@0
   379
	TSecurityPolicy policy(TSecurityPolicy::EAlwaysPass);
sl@0
   380
	RSqlSecurityPolicy dbPolicy;
sl@0
   381
	err = dbPolicy.Create(policy);
sl@0
   382
	TEST2(err, KErrNone);
sl@0
   383
	err = TheDb.Create(KSecureTestDb3, dbPolicy);
sl@0
   384
	TEST2(err, KErrNone);
sl@0
   385
	err = TheDb.Exec(_L("CREATE TABLE A(Id Integer)"));
sl@0
   386
	TEST(err >= 0);
sl@0
   387
	err = TheDb.Exec(_L("INSERT INTO A(Id) VALUES(1)"));
sl@0
   388
	TEST(err >= 0);
sl@0
   389
	err = TheDb.Exec(_L("INSERT INTO A(Id) VALUES(2)"));
sl@0
   390
	TEST(err >= 0);
sl@0
   391
	const TInt KInsertedRecCnt = 2;
sl@0
   392
	//Cleanup
sl@0
   393
	dbPolicy.Close();
sl@0
   394
	TheDb.Close();
sl@0
   395
	//Repopen the secure database and attach the secind database, which file name is actually a SQL injection
sl@0
   396
	err = TheDb.Open(KSecureTestDb3);
sl@0
   397
	TEST2(err, KErrNone);
sl@0
   398
	err = TheDb.Attach(KDbNameInjection, _L("Db2"));
sl@0
   399
	TEST2(err, KErrNone);
sl@0
   400
	//Check table A contents. If the security hole still exists, table A content is gone.
sl@0
   401
	TSqlScalarFullSelectQuery query(TheDb);
sl@0
   402
	TInt recCnt = 0;
sl@0
   403
	TRAP(err, recCnt = query.SelectIntL(_L("SELECT COUNT(*) FROM A")));
sl@0
   404
	TEST2(err, KErrNone);
sl@0
   405
	TEST2(recCnt, KInsertedRecCnt);//if zero records count - successfull SQL injection - the security hole exists!
sl@0
   406
	//Try to execute RSqlDatabase::Detach(), where instead of a logical database name, SQL statement is supplied.
sl@0
   407
	err = TheDb.Detach(_L("DB; INSERT INTO A(Id) VALUES(3)"));
sl@0
   408
	TEST(err != KErrNone);
sl@0
   409
	//Check table A contents. If the security hole still exists, table A will have one more record.
sl@0
   410
	TRAP(err, recCnt = query.SelectIntL(_L("SELECT COUNT(*) FROM A")));
sl@0
   411
	TEST2(err, KErrNone);
sl@0
   412
	TEST2(recCnt, KInsertedRecCnt);//if one more record - successfull SQL injection - the security hole exists!
sl@0
   413
	TheDb.Close();
sl@0
   414
	//Cleanup
sl@0
   415
	(void)RSqlDatabase::Delete(KDbNameInjection);
sl@0
   416
	(void)RSqlDatabase::Delete(KTestDb3);
sl@0
   417
	(void)RSqlDatabase::Delete(KSecureTestDb3);
sl@0
   418
	}
sl@0
   419
sl@0
   420
/**
sl@0
   421
@SYMTestCaseID			SYSLIB-SQL-UT-3507
sl@0
   422
@SYMTestCaseDesc		Test for DEF109100: SQL, code coverage for TSqlBufRIterator, TSqlAttachDbRefCounter is very low.
sl@0
   423
						The test opens two existing databases, and the attaches to them the same secure shared database.
sl@0
   424
@SYMTestPriority		High
sl@0
   425
@SYMTestActions			Test for DEF109100: SQL, code coverage for TSqlBufRIterator, TSqlAttachDbRefCounter is very low.
sl@0
   426
@SYMTestExpectedResults Test must not fail
sl@0
   427
@SYMDEF					DEF109100
sl@0
   428
*/	
sl@0
   429
void TwoConnAttachTest()
sl@0
   430
	{
sl@0
   431
	//Connection 1
sl@0
   432
	TInt err = TheDb.Open(KTestDb1);	
sl@0
   433
	TEST2(err, KErrNone);
sl@0
   434
	//Connection 2
sl@0
   435
	err = TheDb2.Open(KTestDb2);	
sl@0
   436
	TEST2(err, KErrNone);
sl@0
   437
	//Attach KSecureTestDb1 to connection 1
sl@0
   438
	_LIT(KAttachDb1, "Db1");
sl@0
   439
	err = TheDb.Attach(KSecureTestDb1, KAttachDb1);
sl@0
   440
	TEST2(err, KErrNone);
sl@0
   441
	//Attach KSecureTestDb1 to connection 2
sl@0
   442
	err = TheDb2.Attach(KSecureTestDb1, KAttachDb1);
sl@0
   443
	TEST2(err, KErrNone);
sl@0
   444
	//Detach
sl@0
   445
	err = TheDb2.Detach(KAttachDb1);
sl@0
   446
	TEST2(err, KErrNone);
sl@0
   447
	err = TheDb.Detach(KAttachDb1);
sl@0
   448
	TEST2(err, KErrNone);
sl@0
   449
	//Cleanup
sl@0
   450
	TheDb2.Close();
sl@0
   451
	TheDb.Close();
sl@0
   452
	}
sl@0
   453
sl@0
   454
/**
sl@0
   455
@SYMTestCaseID			SYSLIB-SQL-UT-3515
sl@0
   456
@SYMTestCaseDesc		RSqlStatement::DeclaredColumnType() test
sl@0
   457
						The test creates 2 tables in two different databases. Then the test opens the first database and
sl@0
   458
						attaches the second one. After that a SELECT sql statement is prepared and the statement operates
sl@0
   459
						on both tables: from the main database and the attached one.
sl@0
   460
						DeclaredColumnType() is called after the statement preparation and column types checked.
sl@0
   461
@SYMTestPriority		High
sl@0
   462
@SYMTestActions			RSqlStatement::ColumnCount() test
sl@0
   463
@SYMTestExpectedResults Test must not fail
sl@0
   464
@SYMREQ					REQ8035
sl@0
   465
*/	
sl@0
   466
void DeclaredColumnTypeTest()
sl@0
   467
	{
sl@0
   468
	//Preparation
sl@0
   469
	TInt err = TheDb.Open(KTestDb1);	
sl@0
   470
	TEST2(err, KErrNone);
sl@0
   471
	err = TheDb.Exec(_L("CREATE TABLE Y(Id INTEGER, Name TEXT)"));
sl@0
   472
	TEST(err >= 0);
sl@0
   473
	TheDb.Close();
sl@0
   474
	err = TheDb.Open(KTestDb2);	
sl@0
   475
	TEST2(err, KErrNone);
sl@0
   476
	err = TheDb.Exec(_L("CREATE TABLE Z(Id INTEGER, Data BLOB)"));
sl@0
   477
	TEST(err >= 0);
sl@0
   478
	TheDb.Close();
sl@0
   479
	//Open KTestDb1, attach KTestDb2
sl@0
   480
	err = TheDb.Open(KTestDb1);
sl@0
   481
	TEST2(err, KErrNone);
sl@0
   482
	_LIT(KAttachDb, "Db2");
sl@0
   483
	err = TheDb.Attach(KTestDb2, KAttachDb);
sl@0
   484
	TEST2(err, KErrNone);
sl@0
   485
	//SELECT from both db
sl@0
   486
	RSqlStatement stmt;
sl@0
   487
	err = stmt.Prepare(TheDb, _L("SELECT Y.Id, Y.Name, DB2.Z.Data   FROM Y,DB2.Z   WHERE Y.Id = DB2.Z.Id"));
sl@0
   488
	TEST2(err, KErrNone);
sl@0
   489
	TInt colCnt = stmt.ColumnCount();
sl@0
   490
	TEST2(colCnt, 3);
sl@0
   491
	TSqlColumnType colType;
sl@0
   492
	err = stmt.DeclaredColumnType(0, colType);
sl@0
   493
	TEST2(err, KErrNone);
sl@0
   494
	TEST2(colType, ESqlInt);
sl@0
   495
	err = stmt.DeclaredColumnType(1, colType);
sl@0
   496
	TEST2(err, KErrNone);
sl@0
   497
	TEST2(colType, ESqlText);
sl@0
   498
	err = stmt.DeclaredColumnType(2, colType);
sl@0
   499
	TEST2(err, KErrNone);
sl@0
   500
	TEST2(colType, ESqlBinary);
sl@0
   501
	stmt.Close();
sl@0
   502
	//Cleanup
sl@0
   503
	err = TheDb.Detach(KAttachDb);
sl@0
   504
	TEST2(err, KErrNone);
sl@0
   505
	TheDb.Close();
sl@0
   506
	}
sl@0
   507
sl@0
   508
/**
sl@0
   509
@SYMTestCaseID			SYSLIB-SQL-UT-4016
sl@0
   510
@SYMTestCaseDesc		Test for DEF116713 SQL: No redindexing occurs for an attached database.
sl@0
   511
 						The test does the following steps:
sl@0
   512
 						1) Sets the "CollationDllName" column value in the "symbian_settings" stable of the database to be used
sl@0
   513
 						   as an attached database (KTestDb2). The set column value is different than the default collation dll name.
sl@0
   514
 						2) Opens KTestDb1, attaches KTestDb2.
sl@0
   515
 						3) When KTestDb2 is attached to KTestDb1, the SQL server should detect that the "CollationDllName" column 
sl@0
   516
 						   value is different than the default collation dll name and should reindex the attached database and then 
sl@0
   517
 						   store the current collation dll name in the "CollationDllName" column.
sl@0
   518
 						4) The test checks that after attaching the KTestDb2 database, the "CollationDllName" column value 
sl@0
   519
 						   is not the previously used test collation dll name.
sl@0
   520
@SYMTestPriority		Low
sl@0
   521
@SYMTestActions			Test for DEF116713 SQL: No redindexing occurs for an attached database.
sl@0
   522
@SYMTestExpectedResults Test must not fail
sl@0
   523
@SYMDEF					DEF116713
sl@0
   524
*/
sl@0
   525
void DEF116713()
sl@0
   526
 	{
sl@0
   527
 	//Set the "CollationDllName" column value in "symbian_settings" table of the database to be attached - 
sl@0
   528
 	//not to be the default collation dll name.
sl@0
   529
 	TInt err = TheDb.Open(KTestDb2);
sl@0
   530
 	TEST2(err, KErrNone);
sl@0
   531
 	err = TheDb.Exec(_L("UPDATE symbian_settings SET CollationDllName='ddkjrrm'"));
sl@0
   532
 	TEST2(err, 1);
sl@0
   533
 	TheDb.Close();
sl@0
   534
 	//Open the main database, attach the other one
sl@0
   535
 	err = TheDb.Open(KTestDb1);
sl@0
   536
 	TEST2(err, KErrNone);
sl@0
   537
 	err = TheDb.Attach(KTestDb2, _L("Db2"));
sl@0
   538
 	TEST2(err, KErrNone);
sl@0
   539
 	//The expectation is that the attached database is reindexed and the "CollationDllName" column value - set.
sl@0
   540
 	RSqlStatement stmt;
sl@0
   541
 	err = stmt.Prepare(TheDb, _L("SELECT CollationDllName FROM Db2.symbian_settings"));
sl@0
   542
 	TEST2(err, KErrNone);
sl@0
   543
 	err = stmt.Next();	
sl@0
   544
 	TEST2(err, KSqlAtRow);
sl@0
   545
 	TPtrC collationDllName;
sl@0
   546
 	err = stmt.ColumnText(0, collationDllName);
sl@0
   547
   	TEST2(err, KErrNone);
sl@0
   548
 	stmt.Close();
sl@0
   549
 	TheDb.Close();
sl@0
   550
 	
sl@0
   551
 	_LIT(KTestCollationDllName, "ddkjrrm");//The same as the used in the "UPDATE symbian_settings" sql.
sl@0
   552
 	TEST(collationDllName != KTestCollationDllName);
sl@0
   553
   	}
sl@0
   554
sl@0
   555
/**
sl@0
   556
@SYMTestCaseID			SYSLIB-SQL-UT-4042
sl@0
   557
@SYMTestCaseDesc		RSqlDatabase::Size(TSize&) on attached database - injection test.
sl@0
   558
						The test creates a database and attempts to attach another database,
sl@0
   559
						passing a DELETE SQL statement in the attached database name.
sl@0
   560
						The attach operation is expected to fail, the database content should stay
sl@0
   561
						unchanged after the operation.						
sl@0
   562
@SYMTestPriority		High
sl@0
   563
@SYMTestActions			RSqlDatabase::Size(TSize&) on attached database - injection test.
sl@0
   564
@SYMTestExpectedResults Test must not fail
sl@0
   565
@SYMREQ					REQ10407
sl@0
   566
*/
sl@0
   567
void Size2InjectionTest()
sl@0
   568
	{
sl@0
   569
	TInt err = TheDb.Create(KTestDb4);
sl@0
   570
	TEST2(err, KErrNone);
sl@0
   571
	err = TheDb.Exec(_L("CREATE TABLE A(I INTEGER)"));
sl@0
   572
	TEST(err >= 0);
sl@0
   573
	err = TheDb.Exec(_L("INSERT INTO A VALUES(1)"));
sl@0
   574
	TEST2(err, 1);
sl@0
   575
	_LIT(KAttachDbName, "B");
sl@0
   576
	err = TheDb.Attach(KTestDb4, KAttachDbName);
sl@0
   577
	TEST2(err, KErrNone);
sl@0
   578
	RSqlDatabase::TSize	size;
sl@0
   579
	err = TheDb.Size(size, _L("B;DELETE FROM MAIN.A"));
sl@0
   580
	TEST2(err, KSqlErrGeneral);
sl@0
   581
	TPtrC msg = TheDb.LastErrorMessage();
sl@0
   582
	TheTest.Printf(_L("RSqlDatabase::Size(TSize&) injection, error message: %S\r\n"), &msg);
sl@0
   583
	TSqlScalarFullSelectQuery q(TheDb);
sl@0
   584
	TInt reccnt = 0;
sl@0
   585
	TRAP(err, reccnt = q.SelectIntL(_L("SELECT COUNT(*) FROM MAIN.A")));
sl@0
   586
	TEST2(err, KErrNone);
sl@0
   587
	TEST2(reccnt, 1);
sl@0
   588
	err = TheDb.Detach(KAttachDbName);
sl@0
   589
	TEST2(err, KErrNone);
sl@0
   590
	TheDb.Close();
sl@0
   591
	(void)RSqlDatabase::Delete(KTestDb4);
sl@0
   592
	}
sl@0
   593
sl@0
   594
/**
sl@0
   595
@SYMTestCaseID			SYSLIB-SQL-UT-4043
sl@0
   596
@SYMTestCaseDesc		RSqlDatabase::Compact() on attached database - injection test.
sl@0
   597
						The test creates a database and attaches another database.
sl@0
   598
						Then the test attempts to compact the attached database calling
sl@0
   599
						RSqlDatabase::Compact() passing DROP TABLE and DELETE statements
sl@0
   600
						as name of the attached database. The call is expected to fail,
sl@0
   601
						the database content should stay unchanged after the call.
sl@0
   602
@SYMTestPriority		High
sl@0
   603
@SYMTestActions			RSqlDatabase::Compact() on attached database - injection test.
sl@0
   604
@SYMTestExpectedResults Test must not fail
sl@0
   605
@SYMREQ					REQ10405
sl@0
   606
*/
sl@0
   607
void CompactInjectionTest()
sl@0
   608
	{
sl@0
   609
	TInt err = TheDb.Create(KTestDb4);
sl@0
   610
	TEST2(err, KErrNone);
sl@0
   611
	err = TheDb.Exec(_L("CREATE TABLE A(I INTEGER); INSERT INTO A(I) VALUES(1)"));
sl@0
   612
	TEST(err >= 0);
sl@0
   613
	_LIT(KAttachDbName, "B");
sl@0
   614
	err = TheDb.Attach(KTestDb4, KAttachDbName);
sl@0
   615
	TEST2(err, KErrNone);
sl@0
   616
	err = TheDb.Compact(RSqlDatabase::EMaxCompaction, _L("B;DROP B.A"));
sl@0
   617
	TEST2(err, KSqlErrGeneral);
sl@0
   618
	TPtrC msg = TheDb.LastErrorMessage();
sl@0
   619
	TheTest.Printf(_L("RSqlDatabase::Compact() injection, error message: %S\r\n"), &msg);
sl@0
   620
sl@0
   621
	TSqlScalarFullSelectQuery query(TheDb);
sl@0
   622
	TInt recCount = 0;
sl@0
   623
	TRAP(err, recCount = query.SelectIntL(_L("SELECT COUNT(*) FROM A")));
sl@0
   624
	TEST2(err, KErrNone);
sl@0
   625
	TEST2(recCount, 1);
sl@0
   626
sl@0
   627
	err = TheDb.Compact(8192, _L("B;DROP B.A;"));
sl@0
   628
	TEST2(err, KSqlErrGeneral);
sl@0
   629
	msg.Set(TheDb.LastErrorMessage());
sl@0
   630
	TheTest.Printf(_L("RSqlDatabase::Compact() injection, error message: %S\r\n"), &msg);
sl@0
   631
sl@0
   632
	recCount = 0;
sl@0
   633
	TRAP(err, recCount = query.SelectIntL(_L("SELECT COUNT(*) FROM A")));
sl@0
   634
	TEST2(err, KErrNone);
sl@0
   635
	TEST2(recCount, 1);
sl@0
   636
sl@0
   637
	TRequestStatus stat;
sl@0
   638
	TheDb.Compact(8192, stat, _L("B;DELETE FROM B.A;"));
sl@0
   639
	User::WaitForRequest(stat);
sl@0
   640
	TEST2(stat.Int(), KSqlErrGeneral);
sl@0
   641
	msg.Set(TheDb.LastErrorMessage());
sl@0
   642
	TheTest.Printf(_L("RSqlDatabase::Compact() injection, error message: %S\r\n"), &msg);
sl@0
   643
sl@0
   644
	recCount = 0;
sl@0
   645
	TRAP(err, recCount = query.SelectIntL(_L("SELECT COUNT(*) FROM A")));
sl@0
   646
	TEST2(err, KErrNone);
sl@0
   647
	TEST2(recCount, 1);
sl@0
   648
	
sl@0
   649
	err = TheDb.Detach(KAttachDbName);
sl@0
   650
	TEST2(err, KErrNone);
sl@0
   651
	TheDb.Close();
sl@0
   652
	(void)RSqlDatabase::Delete(KTestDb4);
sl@0
   653
	}
sl@0
   654
	
sl@0
   655
/**
sl@0
   656
@SYMTestCaseID			SYSLIB-SQL-UT-4094
sl@0
   657
@SYMTestCaseDesc		Incremental blob i/o tests on an attached database.
sl@0
   658
						Open secure database, attach secure database.
sl@0
   659
						The test application's security policy allows incremental blob read & write 
sl@0
   660
						operations on the main database, but only write operations on the attached database.
sl@0
   661
						The test attempts to read and write to a blob in the attached database to verify that 
sl@0
   662
						the test application's security policy is properly asserted by the Symbian SQL server.
sl@0
   663
@SYMTestPriority		High
sl@0
   664
@SYMTestActions			Execution of blob read and write operations on the attached database.
sl@0
   665
@SYMTestExpectedResults Test must not fail
sl@0
   666
@SYMREQ					REQ5794
sl@0
   667
*/	
sl@0
   668
void BlobAttachedTestL()
sl@0
   669
	{
sl@0
   670
	// Open the main secure database - the test application can read & write blobs in it
sl@0
   671
	// Attach another secure database - the test application can only write blobs in it
sl@0
   672
	TInt err = TheDb.Open(KSecureTestDb1);
sl@0
   673
	TEST2(err, KErrNone);
sl@0
   674
	_LIT(KAttachDb1, "Db1");
sl@0
   675
	err = TheDb.Attach(KSecureTestDb2, KAttachDb1);
sl@0
   676
	TEST2(err, KErrNone);
sl@0
   677
	
sl@0
   678
	// Insert a new record into the attached database - the blob value is "AAAAAAAAAA"
sl@0
   679
	err = TheDb.Exec(_L("INSERT INTO Db1.C(A1, B2) VALUES(15, x'41414141414141414141')"));
sl@0
   680
	TEST2(err, 1);
sl@0
   681
sl@0
   682
	// Attempt to write to a blob in the attached database
sl@0
   683
	RSqlBlobWriteStream wrStrm;
sl@0
   684
	CleanupClosePushL(wrStrm);
sl@0
   685
	TRAP(err, wrStrm.OpenL(TheDb, _L("C"), _L("B2"), KSqlLastInsertedRowId, KAttachDb1));
sl@0
   686
	TEST2(err, KErrNone);
sl@0
   687
	TRAP(err, wrStrm.WriteL(_L8("ZZZ")));
sl@0
   688
	TEST2(err, KErrNone);
sl@0
   689
	CleanupStack::PopAndDestroy(&wrStrm);	
sl@0
   690
sl@0
   691
	TRAP(err, TSqlBlob::SetL(TheDb, _L("C"), _L("B2"), _L8("YYYYY"), KSqlLastInsertedRowId, KAttachDb1));
sl@0
   692
	TEST2(err, KErrNone);
sl@0
   693
	
sl@0
   694
	// Attempt to read a blob in the attached database
sl@0
   695
	RSqlBlobReadStream rdStrm;
sl@0
   696
	CleanupClosePushL(rdStrm);
sl@0
   697
	TRAP(err, rdStrm.OpenL(TheDb, _L("C"), _L("B2"), KSqlLastInsertedRowId, KAttachDb1));
sl@0
   698
	TEST2(err, KErrPermissionDenied);
sl@0
   699
	CleanupStack::PopAndDestroy(&rdStrm);	
sl@0
   700
sl@0
   701
	HBufC8* wholeBuf = NULL;
sl@0
   702
	TRAP(err, wholeBuf = TSqlBlob::GetLC(TheDb, _L("C"), _L("B2"), KSqlLastInsertedRowId, KAttachDb1));
sl@0
   703
	TEST2(err, KErrPermissionDenied);
sl@0
   704
sl@0
   705
	HBufC8* buf = HBufC8::NewLC(10);	
sl@0
   706
	TPtr8 bufPtr(buf->Des());	  
sl@0
   707
	err = TSqlBlob::Get(TheDb, _L("C"), _L("B2"), bufPtr, KSqlLastInsertedRowId, KAttachDb1);
sl@0
   708
	TEST2(err, KErrPermissionDenied); 
sl@0
   709
	CleanupStack::PopAndDestroy(buf); 
sl@0
   710
	
sl@0
   711
	// SQLite and system tables in the attached database
sl@0
   712
	
sl@0
   713
	// Attempt to read from and write to the SQLite master table -
sl@0
   714
	// reads should be permitted because write capability is enough for this, 
sl@0
   715
	// writes should not be permitted because schema capability is required for this
sl@0
   716
	TBuf8<20> data;
sl@0
   717
	CleanupClosePushL(rdStrm);
sl@0
   718
	TRAP(err, rdStrm.OpenL(TheDb, _L("sqlite_master"), _L("tbl_name"), 1, KAttachDb1)); // TEXT column
sl@0
   719
	TEST2(err, KErrNone);
sl@0
   720
	TRAP(err, rdStrm.ReadL(data, 1));
sl@0
   721
	TEST2(err, KErrNone);
sl@0
   722
	CleanupStack::PopAndDestroy(&rdStrm);	
sl@0
   723
sl@0
   724
	wholeBuf = TSqlBlob::GetLC(TheDb, _L("sqlite_master"), _L("tbl_name"), 1, KAttachDb1);
sl@0
   725
	TEST(wholeBuf->Length() > 0);	
sl@0
   726
	CleanupStack::PopAndDestroy(wholeBuf); 	
sl@0
   727
sl@0
   728
	buf = HBufC8::NewLC(100);
sl@0
   729
	bufPtr.Set(buf->Des());	 	  
sl@0
   730
	err = TSqlBlob::Get(TheDb, _L("sqlite_master"), _L("tbl_name"), bufPtr, 1, KAttachDb1);
sl@0
   731
	TEST2(err, KErrNone); 
sl@0
   732
	TEST(bufPtr.Length() > 0);	
sl@0
   733
	CleanupStack::PopAndDestroy(buf); 
sl@0
   734
	
sl@0
   735
	CleanupClosePushL(wrStrm);
sl@0
   736
	TRAP(err, wrStrm.OpenL(TheDb, _L("sqlite_master"), _L("tbl_name"), 1, KAttachDb1));
sl@0
   737
	TEST2(err, KErrPermissionDenied);
sl@0
   738
	CleanupStack::PopAndDestroy(&wrStrm);	
sl@0
   739
sl@0
   740
	TRAP(err, TSqlBlob::SetL(TheDb, _L("sqlite_master"), _L("tbl_name"), _L8("VVVV"), 1, KAttachDb1));
sl@0
   741
	TEST2(err, KErrPermissionDenied);
sl@0
   742
sl@0
   743
	// Attempt to read from and write to the system tables in the attached database - neither reads nor writes should be permitted
sl@0
   744
	CleanupClosePushL(rdStrm);
sl@0
   745
	TRAP(err, rdStrm.OpenL(TheDb, _L("symbian_security"), _L("PolicyData"), 1, KAttachDb1)); // BLOB column
sl@0
   746
	TEST2(err, KErrPermissionDenied);
sl@0
   747
	CleanupStack::PopAndDestroy(&rdStrm);	
sl@0
   748
sl@0
   749
	TRAP(err, wholeBuf = TSqlBlob::GetLC(TheDb, _L("symbian_security"), _L("PolicyData"), 1, KAttachDb1));
sl@0
   750
	TEST2(err, KErrPermissionDenied);
sl@0
   751
sl@0
   752
	buf = HBufC8::NewLC(100);	
sl@0
   753
	bufPtr.Set(buf->Des());	  
sl@0
   754
	err = TSqlBlob::Get(TheDb, _L("symbian_security"), _L("PolicyData"), bufPtr, 1, KAttachDb1);
sl@0
   755
	TEST2(err, KErrPermissionDenied); 
sl@0
   756
	CleanupStack::PopAndDestroy(buf); 
sl@0
   757
	
sl@0
   758
	CleanupClosePushL(wrStrm);
sl@0
   759
	TRAP(err, wrStrm.OpenL(TheDb, _L("symbian_security"), _L("PolicyData"), 1, KAttachDb1));
sl@0
   760
	TEST2(err, KErrPermissionDenied);
sl@0
   761
	CleanupStack::PopAndDestroy(&wrStrm);	
sl@0
   762
sl@0
   763
	TRAP(err, TSqlBlob::SetL(TheDb, _L("symbian_security"), _L("PolicyData"), _L8("VVVV"), 1, KAttachDb1));
sl@0
   764
	TEST2(err, KErrPermissionDenied);
sl@0
   765
		
sl@0
   766
	TheDb.Close();
sl@0
   767
	}
sl@0
   768
sl@0
   769
void DoTestsL()
sl@0
   770
	{
sl@0
   771
	CreateDatabases();
sl@0
   772
sl@0
   773
	TheTest.Start(_L(" @SYMTestCaseID:SYSLIB-SQL-CT-1641 ===Open non-secure database, attach secure database "));
sl@0
   774
	Test1();
sl@0
   775
	
sl@0
   776
	TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-SQL-CT-1642 ===Open secure database, attach secure database "));
sl@0
   777
	Test2();
sl@0
   778
	
sl@0
   779
	TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-SQL-CT-1814 SQL injection test "));
sl@0
   780
	SqlInjectionTest();
sl@0
   781
	
sl@0
   782
	TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-SQL-UT-3507 DEF109100 - SQL, code coverage for TSqlBufRIterator,TSqlAttachDbRefCounter is very low "));
sl@0
   783
	TwoConnAttachTest();
sl@0
   784
	
sl@0
   785
	TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-SQL-UT-3515 RSqlStatement::DeclaredColumnType() and attached databases test "));
sl@0
   786
	DeclaredColumnTypeTest();
sl@0
   787
	
sl@0
   788
 	TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-SQL-UT-4016 DEF116713 SQL: No redindexing occurs for an attached database "));
sl@0
   789
	DEF116713();
sl@0
   790
sl@0
   791
 	TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-SQL-UT-4042 RSqlDatabase::Size(TSize) - attached database, injection test"));
sl@0
   792
 	Size2InjectionTest();
sl@0
   793
sl@0
   794
 	TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-SQL-UT-4043 RSqlDatabase::Compact() - attached database, injection test"));
sl@0
   795
 	CompactInjectionTest();
sl@0
   796
sl@0
   797
	TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-SQL-UT-4094 Incremental blob attached test"));
sl@0
   798
 	BlobAttachedTestL();
sl@0
   799
	}
sl@0
   800
sl@0
   801
TInt E32Main()
sl@0
   802
	{
sl@0
   803
	TheTest.Title();
sl@0
   804
		
sl@0
   805
	CTrapCleanup* tc = CTrapCleanup::New();
sl@0
   806
	
sl@0
   807
	__UHEAP_MARK;
sl@0
   808
sl@0
   809
	CreateTestDir();
sl@0
   810
	DeleteDatabases();
sl@0
   811
	
sl@0
   812
	TRAPD(err, DoTestsL());
sl@0
   813
	DeleteDatabases();
sl@0
   814
	TEST2(err, KErrNone);
sl@0
   815
sl@0
   816
	__UHEAP_MARKEND;
sl@0
   817
	
sl@0
   818
	TheTest.End();
sl@0
   819
	TheTest.Close();
sl@0
   820
	
sl@0
   821
	delete tc;
sl@0
   822
	
sl@0
   823
	User::Heap().Check();
sl@0
   824
	return KErrNone;
sl@0
   825
	}