1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000
1.2 +++ b/os/persistentdata/persistentstorage/dbms/sdbms/Sd_Sess2.cpp Fri Jun 15 03:10:57 2012 +0200
1.3 @@ -0,0 +1,547 @@
1.4 +// Copyright (c) 2004-2009 Nokia Corporation and/or its subsidiary(-ies).
1.5 +// All rights reserved.
1.6 +// This component and the accompanying materials are made available
1.7 +// under the terms of "Eclipse Public License v1.0"
1.8 +// which accompanies this distribution, and is available
1.9 +// at the URL "http://www.eclipse.org/legal/epl-v10.html".
1.10 +//
1.11 +// Initial Contributors:
1.12 +// Nokia Corporation - initial contribution.
1.13 +//
1.14 +// Contributors:
1.15 +//
1.16 +// Description:
1.17 +// DBMS server-session and support classes - "DBMS security" related - full support
1.18 +//
1.19 +//
1.20 +
1.21 +#include <s32file.h>
1.22 +#include "D32Strings.h"
1.23 +#include "SD_STD.H"
1.24 +#include "Sd_DbList.h"
1.25 +
1.26 +using namespace DBSC;
1.27 +
1.28 +CDbsSession::CDbsSession() :
1.29 + iDbPolicyRqColl(TLinearOrder< TPair<TInt, TDbPolicyRequest> > (&Compare<TInt, TDbPolicyRequest>))
1.30 + {
1.31 + }
1.32 +
1.33 +/**
1.34 +New "DBMS security" related messages processed here!
1.35 +@param aMessage DBMS server message
1.36 +@param aDbsFunction DBMS server function code
1.37 +@return An error code (< 0) or a DBMS server session object handle (EDbsDatabase, EDbsIncremental,...).
1.38 +*/
1.39 +TInt CDbsSession::ExtServiceL(const RMessage2& aMessage, TDbsFunction aDbsFunction)
1.40 + {
1.41 + TInt handle = 0;
1.42 + switch(aDbsFunction)
1.43 + {
1.44 + case EDbsCreateDatabase:
1.45 + handle=CreateDatabaseL(aMessage);
1.46 + break;
1.47 + case EDbsDatabaseList:
1.48 + handle=GetDatabaseListL(aMessage);
1.49 + break;
1.50 + case EDbsCopyDatabase:
1.51 + CopyDatabaseL(aMessage);
1.52 + break;
1.53 + case EDbsDeleteDatabase:
1.54 + DeleteDatabaseL(aMessage);
1.55 + break;
1.56 + case EDbsGetSecurityPolicy:
1.57 + GetSecurityPolicyL(aMessage);
1.58 + break;
1.59 + case EDbsGetBackupPath:
1.60 + GetBackupPathL(aMessage);
1.61 + break;
1.62 + case EDbsGetBackupPaths:
1.63 + handle=GetBackupPathsL(aMessage);
1.64 + break;
1.65 + default:
1.66 + handle = KErrNotSupported;
1.67 + break;
1.68 + }
1.69 + return handle;
1.70 + }
1.71 +
1.72 +/**
1.73 +Extracts aMessage's "aIndex" argument (which is expected to be a file name) and
1.74 +stores it to CDbsServer::iFileName data member.
1.75 +@param aIndex The index of RMessage parameter
1.76 +@param aMessage
1.77 +@return A descriptor of the file name,extracted from aMessage and stored in CDbsServer::iFileName.
1.78 +*/
1.79 +const TDesC& CDbsSession::ReadFileNameL(TInt aIndex, const RMessage2& aMessage)
1.80 + {
1.81 + TDes& name = Server().FileName();
1.82 + aMessage.ReadL(aIndex, name);
1.83 + return name;
1.84 + }
1.85 +
1.86 +/**
1.87 +Extracts database name (aMessage's arg 0) and database format string (aMessage's arg 1)
1.88 +and use them to extract database properties, such as: database UID, access type (secure/non-secure),
1.89 +full database file path, database format string, drive number.
1.90 +@return A pointer to a TDbProps object, which contains some properties, extracted from the database name.
1.91 +*/
1.92 +TDbProps* CDbsSession::ExtractDbPropsLC(const RMessage2& aMessage)
1.93 + {
1.94 + const TDesC& dbName = ReadFileNameL(0, aMessage);
1.95 + const TDesC& dbFormat = ReadName0L(1, aMessage);
1.96 + return Server().DbPropsFactory().ExtractLC(dbName, dbFormat);
1.97 + }
1.98 +
1.99 +/**
1.100 +This method creates new EDbsDatabase type object.
1.101 +The related MPolicy interface will be retrieved and
1.102 +put together with the EDbsDatabase object in TEntry list.
1.103 +
1.104 +The initial contact for a database. Open a database source
1.105 +return the database handle for the client
1.106 +*/
1.107 +TInt CDbsSession::OpenDatabaseL(const RMessage2& aMessage)
1.108 + {
1.109 + TDbProps* dbProps = ExtractDbPropsLC(aMessage);
1.110 + const MPolicy* policy = Server().PolicyProxy().DbPolicyL(dbProps->iDbPolicyRequest);
1.111 + Server().PolicyProxy().CheckL(aMessage, *policy);
1.112 + TInt dbHandle = DoOpenDatabaseL(aMessage, *dbProps);
1.113 + CleanupStack::PopAndDestroy(dbProps);
1.114 + return dbHandle;
1.115 + }
1.116 +
1.117 +
1.118 +/**
1.119 +SYMBIAN_REMOVE_TRIVIAL_ENCRYPTION version of the method.
1.120 +Opens a database. It is used by both: OpenDatabase() and CreateDatabase() methods.
1.121 +@param aMessage DBMS server message:EDbsCreateDatabase or EDbsOpenDatabase.
1.122 +@param aDbProps A TDbProps object created from the database name and format string.
1.123 +@return A handle to the opened/created database object.
1.124 +@leave One of the system-wide error codes.
1.125 +*/
1.126 +TInt CDbsSession::DoOpenDatabaseL(const RMessage2& aMessage, const TDbProps& aDbProps)
1.127 + {
1.128 + CDbsConnection* dbConnection = Sources().OpenLC(Server().Fs(), aDbProps.iPath, aDbProps.iFormatStr);
1.129 + CDbObject* dbObj = DoAuthenticateL(dbConnection, aMessage);
1.130 + dbConnection->Attach(dbObj);
1.131 + CleanupStack::Pop(dbConnection);
1.132 +
1.133 + //dbObj does not have to be pushed in the cleanup stack!
1.134 + //NewDbEntryL() will take care of its destruction, if the database entry cannot be created.
1.135 + //NewDbEntryL() will destroy the connection also in this case.
1.136 + TInt dbHandle = 0;
1.137 + NewDbEntryL(dbObj, aDbProps.iDbPolicyRequest, dbHandle);
1.138 + return dbHandle;
1.139 + }
1.140 +
1.141 +//SYMBIAN_REMOVE_TRIVIAL_ENCRYPTION version of the method.
1.142 +//Authenticates a database.
1.143 +CDbObject* CDbsSession::DoAuthenticateL(CDbsConnection* aDbsConnection, const RMessage2&)
1.144 + {
1.145 + __ASSERT(aDbsConnection);
1.146 + CDbSource& src = aDbsConnection->Source().Source();
1.147 + return src.AuthenticateL();
1.148 + }
1.149 +
1.150 +
1.151 +//Adds a new database entry to the session list of database session objects.
1.152 +void CDbsSession::NewDbEntryL(CDbObject* aDbObject, const TDbPolicyRequest& aDbPolicyRequest, TInt& aDbHandle)
1.153 + {
1.154 + __ASSERT(aDbObject);
1.155 + const MPolicy* policy = Server().PolicyProxy().DbPolicyL(aDbPolicyRequest);
1.156 +
1.157 + aDbHandle = DoAdd(aDbObject, EDbsDatabase, policy);
1.158 +
1.159 + //Store the database uid for later use
1.160 + TInt err = iDbPolicyRqColl.Insert(aDbHandle, aDbPolicyRequest);
1.161 + if(err != KErrNone)
1.162 + {//If iDbPolicyRqColl.Insert() fails, then remove the object from TEntry list and then return.
1.163 + TEntry& e = Object(aDbHandle);
1.164 + Free(e);
1.165 + User::Leave(err);
1.166 + }
1.167 + }
1.168 +
1.169 +/**
1.170 +Converts RDbs::TPolicyType parameter value to the internally used DBSC::TPolicyType value.
1.171 +@param aPolicyType Security policy type - client side
1.172 +@return Security policy type used on the server side.
1.173 +@leave KErrArgument if it is an invalid security policy type
1.174 +*/
1.175 +static TPolicyType ConvertPolicyTypeL(RDbs::TPolicyType aPolicyType)
1.176 + {
1.177 + TPolicyType policyType = static_cast <TPolicyType> (1 << aPolicyType);
1.178 + if(policyType > EPTLast || policyType <= EPTNone)
1.179 + {
1.180 + __LEAVE(KErrArgument);
1.181 + }
1.182 + return policyType;
1.183 + }
1.184 +
1.185 +/**
1.186 +Creates secure shared database.
1.187 +@param aMessage DBMS server message: EDbsCreateDatabase.
1.188 +@return A handle to the created database object.
1.189 +@leave One of the system-wide error codes, including:
1.190 + KErrNotSupported An attempt to create non-secure shared database
1.191 + KErrAlreadyExists The database with the supplied name already exists
1.192 +*/
1.193 +TInt CDbsSession::CreateDatabaseL(const RMessage2& aMessage)
1.194 + {
1.195 + TDbProps* dbProps = ExtractDbPropsLC(aMessage);
1.196 + if(dbProps->iDbPolicyRequest.iAccessType == EATNonSecure)
1.197 + {//This method works only for secure shared databases
1.198 + __LEAVE(KErrNotSupported);
1.199 + }
1.200 + const MPolicy* policy = Server().PolicyProxy().DbPolicyL(dbProps->iDbPolicyRequest);
1.201 + Server().PolicyProxy().CheckL(aMessage, *policy);
1.202 + //Leave if the file is already there
1.203 + ::TEntry fileEntry;
1.204 + TBool dbFileExist = Server().Fs().Entry(dbProps->iPath, fileEntry) == KErrNone;
1.205 + if(dbFileExist)
1.206 + {
1.207 + __LEAVE(KErrAlreadyExists);
1.208 + }
1.209 + TInt dbHandle = 0;
1.210 + TRAPD(err, dbHandle = DoCreateDatabaseL(aMessage, *dbProps));
1.211 + if(err != KErrNone)
1.212 + {//Cleanup if the creation fails
1.213 + // Although the file delete below could return at error since we are
1.214 + // already on an error-path a design decision has been made to ignore the
1.215 + // error in favor of the one returned by DoCreateDatabaseL()
1.216 +
1.217 + // If a debug build - record error
1.218 + TInt fileDeleteErr = Server().Fs().Delete(dbProps->iPath);
1.219 + #ifdef _DEBUG
1.220 + if (fileDeleteErr != KErrNone)
1.221 + {
1.222 + RDebug::Print(_L("CDbsSession::CreateDatabaseL - Failed to delete file. Error = %d"), fileDeleteErr);
1.223 + }
1.224 + #endif
1.225 +
1.226 + __LEAVE(err);
1.227 + }
1.228 + CleanupStack::PopAndDestroy(dbProps);
1.229 + return dbHandle;
1.230 + }
1.231 +
1.232 +//Creates secure shared database.
1.233 +//Originaly, the database were always created on the client side, using ::CreateDatabaseL() call.
1.234 +//I am not very sure how this function works and prefer to call ::CreateDatabaseL() to create
1.235 +//the database on the server side, then delete it and the open it in the same way, as it
1.236 +//worked before for opening/sharing databases on the server side.
1.237 +TInt CDbsSession::DoCreateDatabaseL(const RMessage2& aMessage, const TDbProps& aDbProps)
1.238 + {
1.239 + CDbDatabase* db = ::CreateDatabaseL(TDbFormat::ECreate, Server().Fs(), aDbProps.iPath, aDbProps.iFormatStr);
1.240 + delete db;
1.241 + TInt dbHandle = DoOpenDatabaseL(aMessage, aDbProps);
1.242 + return dbHandle;
1.243 + }
1.244 +
1.245 +/**
1.246 +Copies an existing secure shared database to a new database.
1.247 +The new database will have the same security policy as the old one.
1.248 +@param aMessage DBMS server message (EDbsCopyDatabase)
1.249 +@leave One of the system-wide error codes, including KErrArgument - a null uid supplied
1.250 + as an argument.
1.251 +*/
1.252 +void CDbsSession::CopyDatabaseL(const RMessage2& aMessage)
1.253 + {
1.254 + RDbPropsFactory& dbPropsFactory = Server().DbPropsFactory();
1.255 + TUid uid;
1.256 + uid.iUid = aMessage.Int2();
1.257 + if(uid == KNullUid)
1.258 + {
1.259 + __LEAVE(KErrArgument);
1.260 + }
1.261 + //Do not change the order, because ReadFileNameL() uses the same place to store the names.
1.262 + const TDesC& srcDbName = ReadFileNameL(0, aMessage);
1.263 + TDbProps* srcDbProps = dbPropsFactory.ExtractLC(srcDbName, uid);
1.264 + const TDesC& destDbName = ReadFileNameL(1, aMessage);
1.265 + TDbProps* destDbProps = dbPropsFactory.ExtractLC(destDbName, uid);
1.266 +
1.267 + const MPolicy* policy = Server().PolicyProxy().DbPolicyL(srcDbProps->iDbPolicyRequest);
1.268 + Server().PolicyProxy().CheckL(aMessage, *policy);
1.269 +
1.270 + CFileMan* fileMan = CFileMan::NewL(Server().Fs());
1.271 + CleanupStack::PushL(fileMan);
1.272 + __LEAVE_IF_ERROR(fileMan->Copy(srcDbProps->iPath, destDbProps->iPath, 0));
1.273 + //"Copy" operation executed without errors. Now it is a time to turn off the read-only
1.274 + //flag of the target file (which may be on if the source files is on a read-only drive)
1.275 + __LEAVE_IF_ERROR(Server().Fs().SetAtt(destDbProps->iPath, 0, KEntryAttReadOnly));
1.276 + CleanupStack::PopAndDestroy(3);//srcDbProps, destDbProps, fileMan
1.277 + }
1.278 +
1.279 +/**
1.280 +Deletes secure shared database
1.281 +@param aMessage DBMS server message (EDbsDeleteDatabase)
1.282 +@leave One of the system-wide error codes, including KErrArgument - a null uid supplied
1.283 + as an argument.
1.284 +*/
1.285 +void CDbsSession::DeleteDatabaseL(const RMessage2& aMessage)
1.286 + {
1.287 + TUid uid;
1.288 + uid.iUid = aMessage.Int1();
1.289 + if(uid == KNullUid)
1.290 + {
1.291 + __LEAVE(KErrArgument);
1.292 + }
1.293 + const TDesC& dbName = ReadFileNameL(0, aMessage);
1.294 + TDbProps* dbProps = Server().DbPropsFactory().ExtractLC(dbName, uid);
1.295 + const MPolicy* policy = Server().PolicyProxy().DbPolicyL(dbProps->iDbPolicyRequest);
1.296 + Server().PolicyProxy().CheckL(aMessage, *policy);
1.297 + __LEAVE_IF_ERROR(Server().Fs().Delete(dbProps->iPath));
1.298 + CleanupStack::PopAndDestroy(dbProps);
1.299 + }
1.300 +
1.301 +/**
1.302 +Gets the list of names of datatbases, which have the same uid.
1.303 +@param aMessage DBMS server message (EDbsDatabaseList)
1.304 +@return A stream handle to a stream with the database names found.
1.305 +@leave One of the system-wide error codes, including KErrArgument - a null uid supplied
1.306 + as an argument.
1.307 +*/
1.308 +TInt CDbsSession::GetDatabaseListL(const RMessage2& aMessage)
1.309 + {
1.310 + CDbNamesFactory* dbNamesFactory = CDbNamesFactory::NewLC();
1.311 + TDriveNumber driveNumber;
1.312 + TDbPolicyRequest dbPolicyRequest;
1.313 + CDbNamesFactory::ExtractArgs(aMessage, driveNumber, dbPolicyRequest);
1.314 + if(dbPolicyRequest.iUid == KNullUid)
1.315 + {
1.316 + __LEAVE(KErrArgument);
1.317 + }
1.318 + const MPolicy* policy = Server().PolicyProxy().DbPolicyL(dbPolicyRequest);
1.319 + Server().PolicyProxy().CheckL(aMessage, *policy);
1.320 + CDbDatabaseNames* dbNames = dbNamesFactory->DbNamesLC(driveNumber, dbPolicyRequest, Server().DbPropsFactory(), Server().Fs());
1.321 + //NewStreamL() will take care about destroying dbNames.
1.322 + TInt streamHandle = NewStreamL(dbNames, Externalizer(dbNames), aMessage, policy);
1.323 + CleanupStack::PopAndDestroy(dbNamesFactory);
1.324 + return streamHandle;
1.325 + }
1.326 +
1.327 +/**
1.328 +Gets database/table security policy.
1.329 +@param aMessage DBMS server message (EDbsGetSecurityPolicy)
1.330 +@leave One of the system-wide error codes, including KErrArgument - a null uid supplied
1.331 + as an argument.
1.332 +*/
1.333 +void CDbsSession::GetSecurityPolicyL(const RMessage2& aMessage)
1.334 + {
1.335 + //No security policy check.
1.336 + TUid dbUid = TUid::Uid(aMessage.Int0());
1.337 + if(dbUid == KNullUid)
1.338 + {
1.339 + __LEAVE(KErrArgument);
1.340 + }
1.341 + TPolicyType policyTypeRq = ::ConvertPolicyTypeL(static_cast <RDbs::TPolicyType> (aMessage.Int1() & ~KTablePolicyMaskBit));
1.342 + TBool tblPolicyRq = aMessage.Int1() & KTablePolicyMaskBit;
1.343 + if(tblPolicyRq)
1.344 + {
1.345 + ReadName0L(2, aMessage);
1.346 + if(Server().Name0() == KNullDesC)
1.347 + {
1.348 + __LEAVE(KErrArgument);
1.349 + }
1.350 + }
1.351 + TDbPolicyRequest dbPolicyRequest;
1.352 + dbPolicyRequest.iUid = dbUid;
1.353 + dbPolicyRequest.iAccessType = EATSecure;
1.354 + const MPolicy* policy = tblPolicyRq ? Server().PolicyProxy().TblPolicyL(dbPolicyRequest, Server().Name0()) :
1.355 + Server().PolicyProxy().DbPolicyL(dbPolicyRequest);
1.356 + __ASSERT(policy);
1.357 + TSecurityPolicy secPolicy;
1.358 + __LEAVE_IF_ERROR(policy->Get(policyTypeRq, secPolicy));
1.359 + aMessage.WriteL(3, secPolicy.Package());
1.360 + }
1.361 +
1.362 +/**
1.363 +The function extracts backup&restore process SID from aMessage argument (parameter 0).
1.364 +@param aMessage DBMS server message - EDbsGetBackupPath or EDbsGetBackupPaths.
1.365 +@return Backup&restore process SID
1.366 +@leave KErrArgument 0 or ECapability_None backup&restore process SID
1.367 +@internalComponent
1.368 +*/
1.369 +static TSecureId BackupSIDL(const RMessage2& aMessage)
1.370 + {
1.371 + TSecureId backupSID = TSecureId(aMessage.Int0());
1.372 + if(backupSID.iId == 0 || backupSID.iId == (TUint32)ECapability_None)
1.373 + {
1.374 + __LEAVE(KErrArgument);
1.375 + }
1.376 + return backupSID;
1.377 + }
1.378 +
1.379 +/**
1.380 +The function extracts database security policy UID from aMessage argument (parameter 1).
1.381 +@param aMessage DBMS server message - EDbsGetBackupPath or EDbsGetBackupPaths.
1.382 +@return Database security policy UID
1.383 +@leave KErrArgument Null database security policy UID
1.384 +@internalComponent
1.385 +*/
1.386 +static TUid SecurityPolicyUidL(const RMessage2& aMessage)
1.387 + {
1.388 + TUid dbUid = TUid::Uid(aMessage.Int1());
1.389 + if(dbUid == KNullUid)
1.390 + {
1.391 + __LEAVE(KErrArgument);
1.392 + }
1.393 + return dbUid;
1.394 + }
1.395 +
1.396 +/**
1.397 +The function gets the backup&restore process SID from the related database security policy,
1.398 +identified by aDbUid argument.
1.399 +@param aPolicyProxy A reference to CPolicyProxy object, which might be asked for particular
1.400 + database or table policy.
1.401 +@param aBackupSID Backup&restore process SID, extracted from RMessage2 object.
1.402 +@param aDbUid Database security policy UID, extracted from RMessage2 object.
1.403 +@return Backup&restore process SID, which is part of the database security policy.
1.404 +@leave KErrPermissionDenied - the supplied process SID does not match the database backup&
1.405 + restore SID or the database backup&restore SID is 0 or ECapability_None.
1.406 +@internalComponent
1.407 +*/
1.408 +static TSecureId RegisteredBackupSIDL(CPolicyProxy& aPolicyProxy, TSecureId aBackupSID, TUid aDbUid)
1.409 + {
1.410 + TSecureId regBackupSID = aPolicyProxy.BackupSIDL(aDbUid);
1.411 + if((regBackupSID == 0 || regBackupSID == (TUint32)ECapability_None) || aBackupSID != regBackupSID)
1.412 + {
1.413 + __LEAVE(KErrPermissionDenied);
1.414 + }
1.415 + return regBackupSID;
1.416 + }
1.417 +
1.418 +/**
1.419 +The method will return via aMessage argument the full path to the secure shared database,
1.420 +which name is packed in aMessage argument too.
1.421 +@param aMessage DBMS server message (EDbsGetBackupPath)
1.422 +@leave One of the system-wide error codes, including:
1.423 + - KErrArgument - 0 or ECapability_None process SID, null UID,
1.424 + null or invalid database name,
1.425 + the database is not secure shared database;
1.426 + - KErrNotFound - the database file does not exist;
1.427 + - KErrPermissionDenied - the supplied process SID does not match the database backup&
1.428 + restore SID or the database backup&restore SID is 0 or ECapability_None.
1.429 +@deprecated
1.430 +*/
1.431 +void CDbsSession::GetBackupPathL(const RMessage2& aMessage)
1.432 + {
1.433 + //Backup&restore process SID
1.434 + TSecureId backupSID = ::BackupSIDL(aMessage);
1.435 + //Security policy UID
1.436 + TUid dbUid = ::SecurityPolicyUidL(aMessage);
1.437 + //Database name and drive, format: <drive>:<name>.<ext>
1.438 + ReadName0L(2, aMessage);
1.439 + if(Server().Name0() == KNullDesC)
1.440 + {
1.441 + __LEAVE(KErrArgument);
1.442 + }
1.443 + //Database path
1.444 + RDbPropsFactory& dbPropsFactory = Server().DbPropsFactory();
1.445 + TDbProps* dbProps = dbPropsFactory.ExtractLC(Server().Name0(), dbUid);
1.446 + if(dbProps->iDbPolicyRequest.iAccessType != EATSecure)
1.447 + {
1.448 + __LEAVE(KErrArgument);
1.449 + }
1.450 + //Check if the database file exists
1.451 + ::TEntry fileEntry;
1.452 + TBool dbFileExist = Server().Fs().Entry(dbProps->iPath, fileEntry) == KErrNone;
1.453 + if(!dbFileExist)
1.454 + {
1.455 + __LEAVE(KErrNotFound);
1.456 + }
1.457 + //Get and check backup&restore SID
1.458 + TSecureId regBackupSID = ::RegisteredBackupSIDL(Server().PolicyProxy(), backupSID, dbUid);
1.459 + //
1.460 + aMessage.WriteL(3, dbProps->iPath);
1.461 + //
1.462 + CleanupStack::PopAndDestroy(dbProps);
1.463 + }
1.464 +
1.465 +/**
1.466 +This function processes "aFileEntries" array, which is a result of TFindFile::FindWildByDir()
1.467 +or TFindFile::FindWild() calls. In a loop the function will get an element from "aFileEntries"
1.468 +array, copy it to a temporary string adding the drive and the path, and will add that string
1.469 +to "aDatabasePaths" array.
1.470 +Note: If the created full file path length is bigger than KDbMaxStrLen characters, then the
1.471 + string will not be added to "aDatabasePaths" array!
1.472 +@param aFileEntries An array of file names, result of TFindFile::FindWildByDir() or
1.473 + TFindFile::FindWild() calls.
1.474 +@param aFileSpec A string, containing the drive and the directory of the file names in
1.475 + aFileEntries array.
1.476 +@param aDatabasePaths Output argument. Each file name from aFileEntries array will be "decorated"
1.477 + with the drive and path and then the created new string will be added to
1.478 + aDatabasePaths array.
1.479 +@leave One of the system-wide error codes, including KErrNoMemory.
1.480 +@internalComponent
1.481 +*/
1.482 +static void ProcessFileEntriesL(CDir& aFileEntries, const TDesC& aFileSpec,
1.483 + CDbStrings& aDatabasePaths)
1.484 + {
1.485 + TParse parse;
1.486 + __LEAVE_IF_ERROR(parse.Set(aFileSpec, NULL, NULL));
1.487 + TInt cnt = aFileEntries.Count();
1.488 + for(TInt i=0;i<cnt;++i)
1.489 + {
1.490 + TFileName fileName;
1.491 + fileName.Copy(parse.DriveAndPath());
1.492 + const ::TEntry& entry = aFileEntries[i];
1.493 + fileName.Append(entry.iName);
1.494 + if(fileName.Length() < KDbMaxStrLen)
1.495 + {
1.496 + aDatabasePaths.AddL(fileName);
1.497 + }
1.498 + }
1.499 + }
1.500 +
1.501 +/**
1.502 +Gets a list of paths of the databases, which have the same security policy uid.
1.503 +@param aMessage DBMS server message (EDbsGetBackupPaths)
1.504 +@return A stream handle to a stream with the database names found.
1.505 +@leave One of the system-wide error codes, including:
1.506 + - KErrArgument - 0 or ECapability_None process SID, null database security policy UID;
1.507 + - KErrPermissionDenied - the supplied process SID does not match databases backup&
1.508 + restore SID or databases backup&restore SID is 0 or ECapability_None.
1.509 +*/
1.510 +TInt CDbsSession::GetBackupPathsL(const RMessage2& aMessage)
1.511 + {
1.512 + //Backup&restore process SID
1.513 + TSecureId backupSID = ::BackupSIDL(aMessage);
1.514 + //Security policy UID
1.515 + TUid dbUid = ::SecurityPolicyUidL(aMessage);
1.516 + //Get and check backup&restore SID
1.517 + TSecureId regBackupSID = ::RegisteredBackupSIDL(Server().PolicyProxy(), backupSID, dbUid);
1.518 + //Get the related database security policy
1.519 + TDbPolicyRequest dbPolicyRequest = {dbUid, EATSecure};
1.520 + const MPolicy* policy = Server().PolicyProxy().DbPolicyL(dbPolicyRequest);
1.521 + //
1.522 + CDbStrings* dbPaths = CDbStrings::NewLC();
1.523 + //DBMS server - private data path. CDbServer::iFileName used as a storage for the path.
1.524 + __LEAVE_IF_ERROR(Server().Fs().PrivatePath(Server().FileName()));
1.525 + //Construct search pattern. CDbServer::iName1 used as a storage for the search pattern.
1.526 + RDbPropsFactory::ConstructCommonPart(dbUid, Server().Name1());
1.527 + Server().Name1().Append('*');
1.528 + //Search....
1.529 + TFindFile findFile(Server().Fs());
1.530 + CDir* fileEntries = NULL;
1.531 + TInt err = findFile.FindWildByDir(Server().Name1(), Server().FileName(), fileEntries);
1.532 + if(err == KErrNone)
1.533 + {
1.534 + do
1.535 + {
1.536 + __ASSERT(fileEntries);
1.537 + CleanupStack::PushL(fileEntries);
1.538 + ::ProcessFileEntriesL(*fileEntries, findFile.File(), *dbPaths);
1.539 + CleanupStack::PopAndDestroy(fileEntries);
1.540 + fileEntries = NULL;
1.541 + } while(findFile.FindWild(fileEntries) == KErrNone);
1.542 + }
1.543 + if(err != KErrNotFound && err != KErrNone)
1.544 + {
1.545 + __LEAVE(err);
1.546 + }
1.547 + //NewStreamL() will take care about destroying dbPaths.
1.548 + TInt streamHandle = NewStreamL(dbPaths, Externalizer(dbPaths), aMessage, policy);
1.549 + return streamHandle;
1.550 + }