1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000
1.2 +++ b/os/persistentdata/persistentstorage/dbms/tdbms/t_dbplatsec.cpp Fri Jun 15 03:10:57 2012 +0200
1.3 @@ -0,0 +1,674 @@
1.4 +// Copyright (c) 2004-2009 Nokia Corporation and/or its subsidiary(-ies).
1.5 +// All rights reserved.
1.6 +// This component and the accompanying materials are made available
1.7 +// under the terms of "Eclipse Public License v1.0"
1.8 +// which accompanies this distribution, and is available
1.9 +// at the URL "http://www.eclipse.org/legal/epl-v10.html".
1.10 +//
1.11 +// Initial Contributors:
1.12 +// Nokia Corporation - initial contribution.
1.13 +//
1.14 +// Contributors:
1.15 +//
1.16 +// Description:
1.17 +// DBMS security policy - testing new APIs
1.18 +// All tests assume that drive C is presented in the system and is not a ROM drive.
1.19 +// Please, ensure that t_dbenvcreate test is executed before t_dbplatsec<N>/t_dbplatsecperf tests!
1.20 +// Please, ensure that t_dbenvdestroy test is executed after t_dbplatsec<N>/t_dbplatsecperf tests!
1.21 +//
1.22 +//
1.23 +
1.24 +#include <d32dbms.h>
1.25 +#include <e32test.h>
1.26 +#include "t_dbplatsecdef.h"
1.27 +#include "t_dbplatsecutl.h"
1.28 +#include "t_dbplatsecdb.h"
1.29 +#include "t_dbplatsectbl.h"
1.30 +
1.31 +//Global definitions
1.32 +RTest TheTest(_L("t_dbplatsec : DBMS platform security testing"));
1.33 +RDbs TheDbs;
1.34 +RDbNamedDatabase TheDb1;
1.35 +RDbNamedDatabase TheDb2;
1.36 +RDbTable TheTbl1;
1.37 +RDbTable TheTbl2;
1.38 +
1.39 +void DeleteDatabases();
1.40 +TDBSCUtils TheDbscUtils(TheTest, &DeleteDatabases);
1.41 +
1.42 +void DeleteDatabases()
1.43 + {
1.44 + TheTbl1.Close();
1.45 + TheTbl2.Close();
1.46 + TheDb2.Close();
1.47 + TheDb1.Close();
1.48 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
1.49 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb2Name);
1.50 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb3Name);
1.51 + }
1.52 +
1.53 +static void GetDatabaseRPolicyTest()
1.54 + {
1.55 + TSecurityPolicy policy;
1.56 + TInt err = TheDbs.GetDatabasePolicy(KSecureDbUid, RDbs::EReadPolicy, policy);
1.57 + TEST2(err, KErrNone);
1.58 + TCompiledSecurityPolicy testSecurityPolicy(policy);
1.59 + TSecurityPolicy::TType type = testSecurityPolicy.Type();
1.60 + TEST(type == TSecurityPolicy::ETypeC3);
1.61 + TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityCommDD));
1.62 + TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityPowerMgmt));
1.63 + TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityTrustedUI));
1.64 + }
1.65 +
1.66 +static void GetDatabaseWPolicyTest()
1.67 + {
1.68 + TSecurityPolicy policy;
1.69 + TInt err = TheDbs.GetDatabasePolicy(KSecureDbUid, RDbs::EWritePolicy, policy);
1.70 + TEST2(err, KErrNone);
1.71 + TCompiledSecurityPolicy testSecurityPolicy(policy);
1.72 + TSecurityPolicy::TType type = testSecurityPolicy.Type();
1.73 + TEST(type == TSecurityPolicy::ETypeC3);
1.74 + TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityMultimediaDD));
1.75 + TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityReadDeviceData));
1.76 + TEST(TDBSCUtils::HasCapability(testSecurityPolicy, static_cast <TCapability> (TUint8(ECapability_None))));
1.77 + }
1.78 +
1.79 +static void GetDatabaseSPolicyTest()
1.80 + {
1.81 + TSecurityPolicy policy;
1.82 + TInt err = TheDbs.GetDatabasePolicy(KSecureDbUid, RDbs::ESchemaPolicy, policy);
1.83 + TEST2(err, KErrNone);
1.84 + TCompiledSecurityPolicy testSecurityPolicy(policy);
1.85 + TSecurityPolicy::TType type = testSecurityPolicy.Type();
1.86 + TEST(type == TSecurityPolicy::ETypeC7);
1.87 + TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityWriteDeviceData));
1.88 + TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityDRM));
1.89 + TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityProtServ));
1.90 + TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityDiskAdmin));
1.91 + TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityNetworkControl));
1.92 + TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityWriteUserData));
1.93 + TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilitySwEvent));
1.94 + }
1.95 +
1.96 +static void GetTablePolicyTest(const TDesC& aTableName,
1.97 + RDbs::TPolicyType aPolicyType,
1.98 + TSecurityPolicy::TType aType,
1.99 + TSecureId aSecureId,
1.100 + TVendorId aVendorId,
1.101 + const TCapability* aCapabilities, TInt aCapCount)
1.102 + {
1.103 + TSecurityPolicy policy;
1.104 + TInt err = TheDbs.GetTablePolicy(KSecureDbUid, aTableName, aPolicyType, policy);
1.105 + TEST2(err, KErrNone);
1.106 + TCompiledSecurityPolicy testSecurityPolicy(policy);
1.107 + TEST(testSecurityPolicy.Type() == aType);
1.108 + for(TInt i=0;i<aCapCount;++i)
1.109 + {
1.110 + TEST(TDBSCUtils::HasCapability(testSecurityPolicy, aCapabilities[i]));
1.111 + }
1.112 + if(testSecurityPolicy.Type() == TSecurityPolicy::ETypeS3)
1.113 + {
1.114 + TEST(testSecurityPolicy.SecureId() == aSecureId);
1.115 + }
1.116 + else if(testSecurityPolicy.Type() == TSecurityPolicy::ETypeV3)
1.117 + {
1.118 + TEST(testSecurityPolicy.VendorId() == aVendorId);
1.119 + }
1.120 + }
1.121 +
1.122 +//Tests RDbs::GetDatabasePolicy()/RDbs::GetTablePolicy() with invalid arguments
1.123 +static void InvalidPolicyArgTestsL()
1.124 + {
1.125 + TheTest.Printf(_L("--Invalid UID\n"));
1.126 + const TUid KInvalidUid = {0x490122};
1.127 + TSecurityPolicy policy;
1.128 + TInt err = TheDbs.GetDatabasePolicy(KInvalidUid, RDbs::EWritePolicy, policy);
1.129 + TEST2(err, KErrArgument);
1.130 + err = TheDbs.GetDatabasePolicy(KNullUid, RDbs::EWritePolicy, policy);
1.131 + TEST2(err, KErrArgument);
1.132 + err = TheDbs.GetTablePolicy(KInvalidUid, KTableName1, RDbs::EWritePolicy, policy);
1.133 + TEST2(err, KErrArgument);
1.134 + err = TheDbs.GetTablePolicy(KNullUid, KTableName1, RDbs::EWritePolicy, policy);
1.135 + TEST2(err, KErrArgument);
1.136 +
1.137 + TheTest.Printf(_L("--Invalid policy type\n"));
1.138 + err = TheDbs.GetDatabasePolicy(KSecureDbUid, static_cast <RDbs::TPolicyType> (100), policy);
1.139 + TEST2(err, KErrArgument);
1.140 + err = TheDbs.GetTablePolicy(KSecureDbUid, KTableName2, static_cast <RDbs::TPolicyType> (101), policy);
1.141 + TEST2(err, KErrArgument);
1.142 +
1.143 + TheTest.Printf(_L("--Table name, which is not in the policy file\n"));
1.144 + _LIT(KMissingTableName, "AAAAAA");
1.145 + err = TheDbs.GetTablePolicy(KSecureDbUid, KMissingTableName, RDbs::EWritePolicy, policy);
1.146 + TEST2(err, KErrNone);//This must be the related database policy
1.147 + TSecurityPolicy dbPolicy;
1.148 + err = TheDbs.GetDatabasePolicy(KSecureDbUid, RDbs::EWritePolicy, dbPolicy);
1.149 + TEST2(err, KErrNone);
1.150 + TCompiledSecurityPolicy sp1(policy);
1.151 + TCompiledSecurityPolicy sp2(dbPolicy);
1.152 + TEST(sp1 == sp2);
1.153 +
1.154 + TheTest.Printf(_L("--Table name - zero length\n"));
1.155 + _LIT(KInvTableName, "");
1.156 + err = TheDbs.GetTablePolicy(KSecureDbUid, KInvTableName, RDbs::EWritePolicy, policy);
1.157 + TEST2(err, KErrArgument);
1.158 +
1.159 + TheTest.Printf(_L("--Table name - Schema policy request\n"));
1.160 + err = TheDbs.GetTablePolicy(KSecureDbUid, KTableName3, RDbs::ESchemaPolicy, policy);
1.161 + TEST2(err, KErrNotSupported);
1.162 + }
1.163 +
1.164 +//Returns a valid drive number, but not presented in the system
1.165 +static TDriveNumber FirstNotPresentedDriveNumber()
1.166 + {
1.167 + RFs fs;
1.168 + TEST2(fs.Connect(), KErrNone);
1.169 + TDriveNumber drvNumber = static_cast <TDriveNumber> (1000);
1.170 + for(TInt i=EDriveA;i<=EDriveZ;++i)
1.171 + {
1.172 + TDriveInfo driveInfo;
1.173 + if(fs.Drive(driveInfo, static_cast <TDriveNumber> (i)) == KErrNone)
1.174 + {
1.175 + if(driveInfo.iType == EMediaNotPresent)
1.176 + {
1.177 + drvNumber = static_cast <TDriveNumber> (i);
1.178 + break;
1.179 + }
1.180 + }
1.181 + }
1.182 + fs.Close();
1.183 + TEST(drvNumber <= EDriveZ);
1.184 + return drvNumber;
1.185 + }
1.186 +
1.187 +//Returns the first valid ROM drive number.
1.188 +static TDriveNumber FirstROMDriveNumber()
1.189 + {
1.190 + RFs fs;
1.191 + TEST2(fs.Connect(), KErrNone);
1.192 + TDriveNumber drvNumber = static_cast <TDriveNumber> (1000);
1.193 + for(TInt i=EDriveA;i<=EDriveZ;++i)
1.194 + {
1.195 + TDriveInfo driveInfo;
1.196 + if(fs.Drive(driveInfo, static_cast <TDriveNumber> (i)) == KErrNone)
1.197 + {
1.198 + if(driveInfo.iDriveAtt & KDriveAttRom)
1.199 + {
1.200 + drvNumber = static_cast <TDriveNumber> (i);
1.201 + break;
1.202 + }
1.203 + }
1.204 + }
1.205 + fs.Close();
1.206 + TEST(drvNumber <= EDriveZ);
1.207 + return drvNumber;
1.208 + }
1.209 +
1.210 +//Tests RDbs::DatabaseNamesL() with invalid arguments
1.211 +static void InvalidPolicyArgTests2L()
1.212 + {
1.213 + CDbDatabaseNames* dbNames = NULL;
1.214 +
1.215 + TheTest.Printf(_L("--Invalid UID\n"));
1.216 + const TUid KInvalidUid = {0x490122};
1.217 + TRAPD(err, dbNames = TheDbs.DatabaseNamesL(EDriveC, KInvalidUid));
1.218 + TEST2(err, KErrArgument);
1.219 + TEST(dbNames == NULL);
1.220 +
1.221 + TheTest.Printf(_L("--Null UID\n"));
1.222 + TRAP(err, dbNames = TheDbs.DatabaseNamesL(EDriveC, KNullUid));
1.223 + TEST2(err, KErrArgument);
1.224 + TEST(dbNames == NULL);
1.225 +
1.226 + TheTest.Printf(_L("--Invalid drive\n"));
1.227 + TRAP(err, dbNames = TheDbs.DatabaseNamesL(static_cast <TDriveNumber> (-1), KSecureDbUid));
1.228 + TEST2(err, KErrBadName);
1.229 + TEST(dbNames == NULL);
1.230 + TRAP(err, TheDbs.DatabaseNamesL(static_cast <TDriveNumber> (1765), KSecureDbUid));
1.231 + TEST2(err, KErrBadName);
1.232 + TEST(dbNames == NULL);
1.233 +
1.234 + TheTest.Printf(_L("--Valid drive number, but not presented in the system\n"));
1.235 + TDriveNumber driveNumber = ::FirstNotPresentedDriveNumber();
1.236 + TRAP(err, dbNames = TheDbs.DatabaseNamesL(driveNumber, KSecureDbUid));
1.237 + TEST2(err, KErrNotReady);
1.238 + TEST(dbNames == NULL);
1.239 + }
1.240 +
1.241 +/**
1.242 +@SYMTestCaseID SYSLIB-DBMS-CT-0003
1.243 +@SYMTestCaseDesc Test RDbs::GetDatabasePolicy(), RDbs::GetTablePolicy()
1.244 + getting database or table security policies.
1.245 +@SYMTestPriority High
1.246 +@SYMTestActions A call with valid arguments and result check.
1.247 + A call with an invalid UID.
1.248 + A call with an invalid security policy type.
1.249 + A call with a table name, not presented in the policy file.
1.250 + A call requesting schema security policy of a table.
1.251 +@SYMTestExpectedResults The test must not fail.
1.252 +@SYMREQ REQ2429
1.253 + DBMS shall provide an API to apply security policies to database tables.
1.254 +*/
1.255 +static void GetPolicyTestL()
1.256 + {
1.257 + TheTest.Printf(_L("--Simple GetDatabasePolicy() tests\n"));
1.258 + ::GetDatabaseRPolicyTest();
1.259 + ::GetDatabaseWPolicyTest();
1.260 + ::GetDatabaseSPolicyTest();
1.261 +
1.262 + ::InvalidPolicyArgTestsL();
1.263 +
1.264 + TheTest.Printf(_L("--Simple GetTablePolicy() tests\n"));
1.265 + TCapability caps1[] = {ECapabilityCommDD, ECapabilityPowerMgmt, ECapabilityTrustedUI};
1.266 + TCapability caps2[] = {ECapabilityMultimediaDD, ECapabilityReadDeviceData};
1.267 + ::GetTablePolicyTest(KTableName1, RDbs::EReadPolicy, TSecurityPolicy::ETypeC3, 0, 0, caps1, 3);
1.268 + ::GetTablePolicyTest(KTableName1, RDbs::EWritePolicy, TSecurityPolicy::ETypeC3, 0, 0, caps2, 2);
1.269 +
1.270 + TCapability caps3[] = {static_cast <TCapability> (TUint8(ECapability_None))};
1.271 + ::GetTablePolicyTest(KTableName2, RDbs::EReadPolicy, TSecurityPolicy::ETypeC3, 0, 0, caps3, 1);
1.272 + ::GetTablePolicyTest(KTableName2, RDbs::EWritePolicy, TSecurityPolicy::ETypeC3, 0, 0, caps2, 2);
1.273 +
1.274 + TCapability caps4[] = {ECapabilityReadUserData};
1.275 + ::GetTablePolicyTest(KTableName3, RDbs::EReadPolicy, TSecurityPolicy::ETypeC3, 0, 0, caps1, 3);
1.276 + ::GetTablePolicyTest(KTableName3, RDbs::EWritePolicy, TSecurityPolicy::ETypeC3, 0, 0, caps4, 1);
1.277 +
1.278 + TCapability caps5[] = {ECapabilityWriteUserData};
1.279 + ::GetTablePolicyTest(KTableName4, RDbs::EReadPolicy, TSecurityPolicy::ETypeC3, 0, 0, caps5, 1);
1.280 + ::GetTablePolicyTest(KTableName4, RDbs::EWritePolicy, TSecurityPolicy::ETypeC3, 0, 0, caps2, 2);
1.281 + }
1.282 +
1.283 +/**
1.284 +@SYMTestCaseID SYSLIB-DBMS-CT-0004
1.285 +@SYMTestCaseDesc Test RDbs::DatabaseNamesL(TDriveNumber, const TDesC&, TUid) -
1.286 + getting a list of secure shared databases.
1.287 +@SYMTestPriority High
1.288 +@SYMTestActions A call with valid arguments and result check
1.289 + A call with an invalid drive number.
1.290 + A call with a valid, but not presented in the system, drive number.
1.291 + A call with an invalid UID.
1.292 +@SYMTestExpectedResults The test must not fail.
1.293 +@SYMREQ REQ2429
1.294 + DBMS shall provide an API to apply security policies to database tables.
1.295 +*/
1.296 +static void GetDatabaseListTestL()
1.297 + {
1.298 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
1.299 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb2Name);
1.300 +
1.301 + TheDb1 = TDBSCUtils::CreateDatabase(TheDbs, KSecureDbUid, KDb1Name);
1.302 + TheDb1.Close();
1.303 +
1.304 + TheDb2 = TDBSCUtils::CreateDatabase(TheDbs, KSecureDbUid, KDb2Name);
1.305 + TheDb2.Close();
1.306 +
1.307 + TBuf<32> dbName;
1.308 + dbName.Copy(KDb1Name().Mid(KDatabaseNamePos));
1.309 + TEST(TDBSCUtils::IsDatabaseThereL(TheDbs, KSecureDbUid, EDriveC, dbName));
1.310 + dbName.Copy(KDb2Name().Mid(KDatabaseNamePos));
1.311 + TEST(TDBSCUtils::IsDatabaseThereL(TheDbs, KSecureDbUid, EDriveC, dbName));
1.312 +
1.313 + TheTest.Printf(_L("--An attempt to retrieve the list of database names for an UID, which security policy cannot be satisfied by the current test application\n"));
1.314 + CDbDatabaseNames* dbNames = NULL;
1.315 + TRAPD(err, dbNames = TheDbs.DatabaseNamesL(EDriveZ, KSecureDbUid2));
1.316 + delete dbNames;
1.317 + TEST2(err, KErrNone);
1.318 +
1.319 + ::InvalidPolicyArgTests2L();
1.320 + }
1.321 +
1.322 +/**
1.323 +@SYMTestCaseID SYSLIB-DBMS-CT-0005
1.324 +@SYMTestCaseDesc Test RDbs::CopyDatabase(const TDesC&, const TDesC&, TUid) -
1.325 + copying secure shared database .
1.326 +@SYMTestPriority High
1.327 +@SYMTestActions A call with valid arguments and result check
1.328 + A call with an invalid source database name.
1.329 + A call with an invalid target database name.
1.330 + A call with an invalid UID.
1.331 + An attempt to copy an opened database.
1.332 + An attempt to copy a database, which security policy cannot be satisfied.
1.333 + An attempt to copy a database with path specified in the database name.
1.334 + An attempt to copy non-existing database.
1.335 +@SYMTestExpectedResults The test must not fail.
1.336 +@SYMREQ REQ2429
1.337 + DBMS shall provide an API to apply security policies to database tables.
1.338 +*/
1.339 +static void CopyDatabaseTestL()
1.340 + {
1.341 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
1.342 + TheDb1 = TDBSCUtils::CreateDatabase(TheDbs, KSecureDbUid, KDb1Name);
1.343 + TheDb1.Close();
1.344 +
1.345 + TheTest.Printf(_L("--Simple copy test\n"));
1.346 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb3Name);
1.347 + TInt err = TheDbs.CopyDatabase(KDb1Name, KDb3Name, KSecureDbUid);
1.348 + TEST2(err, KErrNone);
1.349 + TBuf<32> dbName;
1.350 + dbName.Copy(KDb3Name().Mid(KDatabaseNamePos));
1.351 + TEST(TDBSCUtils::IsDatabaseThereL(TheDbs, KSecureDbUid, EDriveC, dbName));
1.352 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb3Name);
1.353 +
1.354 + TheTest.Printf(_L("--An attempt to copy a source database, which security policy cannot be satisfied by the current test application\n"));
1.355 + err = TheDbs.CopyDatabase(KProtDb1ZName, KDb3Name, KSecureDbUid2);
1.356 + TEST2(err, KErrPermissionDenied);
1.357 +
1.358 + TheTest.Printf(_L("--Null source database name\n"));
1.359 + err = TheDbs.CopyDatabase(KNullDesC, KDb3Name, KSecureDbUid);
1.360 + TEST2(err, KErrArgument);
1.361 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb3Name);
1.362 +
1.363 + TheTest.Printf(_L("--Source database name with not presented drive number\n"));
1.364 + TDriveNumber driveNumber = ::FirstNotPresentedDriveNumber();
1.365 + TChar driveChar;
1.366 + TEST2(RFs::DriveToChar(driveNumber, driveChar), KErrNone);
1.367 + TBuf<KDatabaseNamePos> drvBuf;
1.368 + drvBuf.Append(driveChar);
1.369 + drvBuf.Append(':');
1.370 + dbName.Copy(drvBuf);
1.371 + dbName.Append(KDb1Name().Mid(KDatabaseNamePos));
1.372 + err = TheDbs.CopyDatabase(dbName, KDb3Name, KSecureDbUid);
1.373 + TEST2(err, KErrNotReady);
1.374 +
1.375 + TheTest.Printf(_L("--Source database name - only with a drive letter and \":\"\n"));
1.376 + err = TheDbs.CopyDatabase(drvBuf, KDb3Name, KSecureDbUid);
1.377 + TEST2(err, KErrNotReady);
1.378 +
1.379 + TheTest.Printf(_L("--Source database name - only with a drive letter\n"));
1.380 + drvBuf.SetLength(1);
1.381 + err = TheDbs.CopyDatabase(drvBuf, KDb3Name, KSecureDbUid);
1.382 + TEST2(err, KErrArgument);
1.383 +
1.384 + TheTest.Printf(_L("--Null destination database name\n"));
1.385 + err = TheDbs.CopyDatabase(KDb1Name, KNullDesC, KSecureDbUid);
1.386 + TEST2(err, KErrArgument);
1.387 +
1.388 + TheTest.Printf(_L("--Destination database name with not presented drive number\n"));
1.389 + drvBuf.Append(':');
1.390 + dbName.Copy(drvBuf);
1.391 + dbName.Append(KDb3Name().Mid(KDatabaseNamePos));
1.392 + err = TheDbs.CopyDatabase(KDb1Name, dbName, KSecureDbUid);
1.393 + TEST2(err, KErrNotReady);
1.394 +
1.395 + TheTest.Printf(_L("--Destination database - ROM drive\n"));
1.396 + TDriveNumber romDriveNumber = ::FirstROMDriveNumber();
1.397 + TEST2(RFs::DriveToChar(romDriveNumber, driveChar), KErrNone);
1.398 + drvBuf[0] = static_cast <TText> (driveChar);
1.399 + dbName.Copy(drvBuf);
1.400 + dbName.Append(KDb3Name().Mid(KDatabaseNamePos));
1.401 + err = TheDbs.CopyDatabase(KDb1Name, dbName, KSecureDbUid);
1.402 + TEST2(err, KErrAccessDenied);
1.403 +
1.404 + TheTest.Printf(_L("--A source database with a valid name, but not presented in the system\n"));
1.405 + _LIT(KMissingDb, "C:asdhasfsudfygusdfuierfb.db");
1.406 + err = TheDbs.CopyDatabase(KMissingDb, KDb3Name, KSecureDbUid);
1.407 + TEST2(err, KErrNotFound);
1.408 +
1.409 + TheTest.Printf(_L("--A test with an open source database\n"));
1.410 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
1.411 + TheDb2 = TDBSCUtils::CreateDatabase(TheDbs, KSecureDbUid, KDb1Name);
1.412 + err = TheDbs.CopyDatabase(KDb1Name, KDb3Name, KSecureDbUid);
1.413 + TheDb2.Close();
1.414 + TEST2(err, KErrInUse);
1.415 +
1.416 + TheTest.Printf(_L("--An atempt to copy over an existing database\n"));
1.417 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb2Name);
1.418 + TheDb1 = TDBSCUtils::CreateDatabase(TheDbs, KSecureDbUid, KDb2Name);
1.419 + TheDb1.Close();
1.420 + err = TheDbs.CopyDatabase(KDb1Name, KDb2Name, KSecureDbUid);
1.421 + TEST2(err, KErrAlreadyExists);
1.422 +
1.423 + TheTest.Printf(_L("--Too long destination database name > KDbMaxName symbols\n"));
1.424 + _LIT(KTooLongDbName, "A_0123456789_0123456789_0123456789_0123456789_0123456789_0123456789_0123456789.db");
1.425 + err = TheDbs.CopyDatabase(KDb1Name, KTooLongDbName, KSecureDbUid);
1.426 + TEST2(err, KErrArgument);
1.427 +
1.428 + TheTest.Printf(_L("--Null UID\n"));
1.429 + err = TheDbs.CopyDatabase(KDb1Name, KDb3Name, KNullUid);
1.430 + TEST2(err, KErrArgument);
1.431 +
1.432 + TheTest.Printf(_L("--Invalid UID\n"));
1.433 + const TUid KInvalidUid = {0x490122};
1.434 + err = TheDbs.CopyDatabase(KDb1Name, KDb3Name, KInvalidUid);
1.435 + TEST2(err, KErrArgument);
1.436 +
1.437 + TheTest.Printf(_L("--An attempt to copy a database with the path specified in the name\n"));
1.438 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb2Name);
1.439 + _LIT(KSrcDbName2, "C:\\a.Db");
1.440 + _LIT(KDestDbName2, "C:\\b.dB");
1.441 + err = TheDbs.CopyDatabase(KSrcDbName2, KDestDbName2, KSecureDbUid);
1.442 + TEST2(err, KErrArgument);
1.443 + }
1.444 +
1.445 +/**
1.446 +@SYMTestCaseID SYSLIB-DBMS-CT-0006
1.447 +@SYMTestCaseDesc Test RDbs::Delete(const TDesC&, TUid) - deleting secure shared database .
1.448 +@SYMTestPriority High
1.449 +@SYMTestActions A call with valid arguments and result check
1.450 + A call with an invalid UID.
1.451 + A call with an invalid database name.
1.452 + An attempt to delete an opened database.
1.453 + An attempt to delete a database, which security policy cannot be satisfied.
1.454 + An attempt to delete a database with path specified in the database name.
1.455 + An attempt to delete non-existing database.
1.456 +@SYMTestExpectedResults The test must not fail.
1.457 +@SYMREQ REQ2429
1.458 + DBMS shall provide an API to apply security policies to database tables.
1.459 +*/
1.460 +static void DeleteDatabaseTestL()
1.461 + {
1.462 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
1.463 + TheDb1 = TDBSCUtils::CreateDatabase(TheDbs, KSecureDbUid, KDb1Name);
1.464 + TheDb1.Close();
1.465 +
1.466 + TheTest.Printf(_L("--Simple delete database test\n"));
1.467 + TInt err = TheDbs.DeleteDatabase(KDb1Name, KSecureDbUid);
1.468 + TEST2(err, KErrNone);
1.469 +
1.470 + TheTest.Printf(_L("--Null UID\n"));
1.471 + err = TheDbs.DeleteDatabase(KDb1Name, KNullUid);
1.472 + TEST2(err, KErrArgument);
1.473 +
1.474 + TheTest.Printf(_L("--Invalid UID\n"));
1.475 + const TUid KInvalidUid = {0x490122};
1.476 + err = TheDbs.DeleteDatabase(KDb1Name, KInvalidUid);
1.477 + TEST2(err, KErrArgument);
1.478 +
1.479 + TheTest.Printf(_L("--Null database name\n"));
1.480 + err = TheDbs.DeleteDatabase(KNullDesC, KSecureDbUid);
1.481 + TEST2(err, KErrArgument);
1.482 +
1.483 + TheTest.Printf(_L("--Non-existing database - no drive letter (the name is invalid)\n"));
1.484 + _LIT(KTooLongDbName, "A_0123456789_0123456789_0123456789_0123456789_0123456789_0123456789_0123456789.db");
1.485 + err = TheDbs.DeleteDatabase(KTooLongDbName, KSecureDbUid);
1.486 + TEST2(err, KErrArgument);
1.487 + _LIT(KInvDbName1, "UI789.db");
1.488 + err = TheDbs.DeleteDatabase(KInvDbName1, KSecureDbUid);
1.489 + TEST2(err, KErrArgument);
1.490 +
1.491 + TheTest.Printf(_L("--Non-existing database - valid db name\n"));
1.492 + _LIT(KMissingDbName1, "C:A0192345.db");
1.493 + err = TheDbs.DeleteDatabase(KMissingDbName1, KSecureDbUid);
1.494 + TEST2(err, KErrNotFound);
1.495 +
1.496 + TheTest.Printf(_L("--An attempt to delete a database with the path specified in the name\n"));
1.497 + _LIT(KMissingDbName2, "C:\\TEMP\\A0192345.db");
1.498 + err = TheDbs.DeleteDatabase(KMissingDbName2, KSecureDbUid);
1.499 + TEST2(err, KErrArgument);
1.500 +
1.501 + TheTest.Printf(_L("--An attempt to delete a database, which security policy cannot be satisfied by the current test application\n"));
1.502 + err = TheDbs.DeleteDatabase(KProtDb1CName, KSecureDbUid2);
1.503 + TEST2(err, KErrPermissionDenied);
1.504 +
1.505 + TheTest.Printf(_L("--An attempt to delete an open database\n"));
1.506 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
1.507 + TheDb1 = TDBSCUtils::CreateDatabase(TheDbs, KSecureDbUid, KDb1Name);
1.508 + err = TheDbs.DeleteDatabase(KDb1Name, KSecureDbUid);
1.509 + TEST2(err, KErrInUse);
1.510 + TheDb1.Close();
1.511 + }
1.512 +
1.513 +/**
1.514 +@SYMTestCaseID SYSLIB-DBMS-CT-0007
1.515 +@SYMTestCaseDesc Test RDbNamedDatabase::Create(RDbs&, const TDesC&, const TDesC&) -
1.516 + secure shared database creation.
1.517 +@SYMTestPriority High
1.518 +@SYMTestActions A call with valid arguments and result check
1.519 + An attempt to create already existing database.
1.520 + An attempt to create already existing and opened database.
1.521 + RDbNamedDatabase::Create() called with an invalid format string.
1.522 + RDbNamedDatabase::Create() called with a database name containing '\' symbols.
1.523 + An attempt to create a database, which security policy cannot be satisfied.
1.524 +@SYMTestExpectedResults The test must not fail.
1.525 +@SYMREQ REQ2429
1.526 + DBMS shall provide an API to apply security policies to database tables.
1.527 +*/
1.528 +static void CreateDatabaseL()
1.529 + {
1.530 + TheTest.Printf(_L("--Simple create database test\n"));
1.531 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
1.532 + TBuf<32> format;
1.533 + format.Copy(KSecure);
1.534 + format.Append(KSecureDbUid.Name());
1.535 + TInt err = TheDb1.Create(TheDbs, KDb1Name, format);
1.536 + TEST2(err, KErrNone);
1.537 +
1.538 + TheTest.Printf(_L("--An atempt to recreate an open database\n"));
1.539 + err = TheDb1.Create(TheDbs, KDb1Name, format);
1.540 + TEST2(err, KErrAlreadyExists);
1.541 + TheDb1.Close();
1.542 +
1.543 + TheTest.Printf(_L("--An atempt to recreate an existing database\n"));
1.544 + err = TheDb1.Create(TheDbs, KDb1Name, format);
1.545 + TEST2(err, KErrAlreadyExists);
1.546 +
1.547 + TheTest.Printf(_L("--Format string with \"SECURE\" keyword and some other words too\n"));
1.548 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
1.549 + format.Copy(_L("A "));
1.550 + format.Append(KSecure);
1.551 + format.Append(_L(" B"));
1.552 + format.Append(KSecureDbUid.Name());
1.553 + err = TheDb1.Create(TheDbs, KDb1Name, format);
1.554 + TheDb1.Close();
1.555 + TEST2(err, KErrNotSupported);
1.556 +
1.557 + TheTest.Printf(_L("--Format string with \"SeCuRe\" keyword\n"));
1.558 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
1.559 + format.Copy(_L("SeCuRe"));
1.560 + format.Append(KSecureDbUid.Name());
1.561 + err = TheDb1.Create(TheDbs, KDb1Name, format);
1.562 + TheDb1.Close();
1.563 + TEST2(err, KErrNone);
1.564 +
1.565 + TheTest.Printf(_L("--Format string with \"SECURED\" keyword\n"));
1.566 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
1.567 + format.Copy(_L("SECURED"));
1.568 + format.Append(KSecureDbUid.Name());
1.569 + err = TheDb1.Create(TheDbs, KDb1Name, format);
1.570 + TheDb1.Close();
1.571 + TEST2(err, KErrNotSupported);
1.572 +
1.573 + TheTest.Printf(_L("--Format string with a null uid\n"));
1.574 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
1.575 + format.Copy(_L("SECURE"));
1.576 + format.Append(KNullUid.Name());
1.577 + err = TheDb1.Create(TheDbs, KDb1Name, format);
1.578 + TheDb1.Close();
1.579 + TEST2(err, KErrArgument);
1.580 +
1.581 + TheTest.Printf(_L("--Format string with an invalid uid\n"));
1.582 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
1.583 + format.Copy(_L("SECURE"));
1.584 + const TUid KInvalidUid = {0x490122};
1.585 + format.Append(KInvalidUid.Name());
1.586 + err = TheDb1.Create(TheDbs, KDb1Name, format);
1.587 + TheDb1.Close();
1.588 + TEST2(err, KErrArgument);
1.589 +
1.590 + TheTest.Printf(_L("--Format string with a uid only\n"));
1.591 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
1.592 + format.Copy(KSecureDbUid.Name());
1.593 + err = TheDb1.Create(TheDbs, KDb1Name, format);
1.594 + TheDb1.Close();
1.595 + TEST2(err, KErrNotSupported);
1.596 +
1.597 + TheTest.Printf(_L("--Blank format string\n"));
1.598 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
1.599 + format.Zero();
1.600 + err = TheDb1.Create(TheDbs, KDb1Name, format);
1.601 + TheDb1.Close();
1.602 + TEST2(err, KErrNotSupported);
1.603 +
1.604 + TheTest.Printf(_L("--Valid format string + database name with a path\n"));
1.605 + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
1.606 + format.Copy(KSecure);
1.607 + format.Append(KSecureDbUid.Name());
1.608 + _LIT(KSrcDbName2, "C:\\a.Db");
1.609 + err = TheDb1.Create(TheDbs, KSrcDbName2, format);
1.610 + TheDb1.Close();
1.611 + TEST2(err, KErrArgument);
1.612 +
1.613 + TheTest.Printf(_L("--An attempt to create a database, which security policy cannot be satisfied by the current test application\n"));
1.614 + format.Copy(KSecure);
1.615 + format.Append(KSecureDbUid2.Name());
1.616 + err = TheDb1.Create(TheDbs, KProtDb2CName, format);
1.617 + TheDb1.Close();
1.618 + TEST2(err, KErrPermissionDenied);
1.619 + }
1.620 +
1.621 +static void INC057327L()
1.622 + {
1.623 + TRAPD(err,delete TheDbs.DatabaseNamesL(EDriveZ, TUid::Uid(0x12344321)));
1.624 + TheTest(err == KErrNone);
1.625 + }
1.626 +
1.627 +static void DoRunL()
1.628 + {
1.629 + TheTest.Start(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0003 Get database/table policies "));
1.630 + ::GetPolicyTestL();
1.631 +
1.632 + TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0004 Get databases list "));
1.633 + ::GetDatabaseListTestL();
1.634 +
1.635 + TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0005 Copy database "));
1.636 + ::CopyDatabaseTestL();
1.637 +
1.638 + TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0006 Delete database "));
1.639 + ::DeleteDatabaseTestL();
1.640 +
1.641 + TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0007 Create database "));
1.642 + ::CreateDatabaseL();
1.643 +
1.644 + TheTest.Next(_L("Database security"));
1.645 + ::DoDbTestL();
1.646 +
1.647 + TheTest.Next(_L("Table security"));
1.648 + ::DoTblTestL();
1.649 +
1.650 + TheTest.Next(_L("Test for INC057327"));
1.651 + ::INC057327L();
1.652 + }
1.653 +
1.654 +TInt E32Main()
1.655 + {
1.656 + __UHEAP_MARK;
1.657 + CTrapCleanup* tc = CTrapCleanup::New();
1.658 + TEST(tc != NULL);
1.659 +
1.660 + TInt err = TheDbs.Connect();
1.661 + TEST2(err, KErrNone);
1.662 +
1.663 + TRAP(err, ::DoRunL());
1.664 + TEST2(err, KErrNone);
1.665 +
1.666 + ::DeleteDatabases();
1.667 + TheDbs.Close();
1.668 +
1.669 + TheTest.End();
1.670 + TheTest.Close();
1.671 +
1.672 + delete tc;
1.673 +
1.674 + __UHEAP_MARKEND;
1.675 + User::Heap().Check();
1.676 + return KErrNone;
1.677 + }