os/persistentdata/persistentstorage/dbms/tdbms/t_dbplatsec.cpp
changeset 0 bde4ae8d615e
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/os/persistentdata/persistentstorage/dbms/tdbms/t_dbplatsec.cpp	Fri Jun 15 03:10:57 2012 +0200
     1.3 @@ -0,0 +1,674 @@
     1.4 +// Copyright (c) 2004-2009 Nokia Corporation and/or its subsidiary(-ies).
     1.5 +// All rights reserved.
     1.6 +// This component and the accompanying materials are made available
     1.7 +// under the terms of "Eclipse Public License v1.0"
     1.8 +// which accompanies this distribution, and is available
     1.9 +// at the URL "http://www.eclipse.org/legal/epl-v10.html".
    1.10 +//
    1.11 +// Initial Contributors:
    1.12 +// Nokia Corporation - initial contribution.
    1.13 +//
    1.14 +// Contributors:
    1.15 +//
    1.16 +// Description:
    1.17 +// DBMS security policy - testing new APIs
    1.18 +// All tests assume that drive C is presented in the system and is not a ROM drive.
    1.19 +// Please, ensure that t_dbenvcreate test is executed before t_dbplatsec<N>/t_dbplatsecperf tests!
    1.20 +// Please, ensure that t_dbenvdestroy test is executed after t_dbplatsec<N>/t_dbplatsecperf tests!
    1.21 +// 
    1.22 +//
    1.23 +
    1.24 +#include <d32dbms.h>
    1.25 +#include <e32test.h>
    1.26 +#include "t_dbplatsecdef.h"
    1.27 +#include "t_dbplatsecutl.h"
    1.28 +#include "t_dbplatsecdb.h"
    1.29 +#include "t_dbplatsectbl.h"
    1.30 +
    1.31 +//Global definitions
    1.32 +RTest 				TheTest(_L("t_dbplatsec : DBMS platform security testing"));
    1.33 +RDbs 				TheDbs;
    1.34 +RDbNamedDatabase 	TheDb1;
    1.35 +RDbNamedDatabase 	TheDb2;
    1.36 +RDbTable			TheTbl1;
    1.37 +RDbTable			TheTbl2;
    1.38 +
    1.39 +void 		DeleteDatabases();
    1.40 +TDBSCUtils 	TheDbscUtils(TheTest, &DeleteDatabases);
    1.41 +
    1.42 +void DeleteDatabases()
    1.43 +	{
    1.44 +	TheTbl1.Close();
    1.45 +	TheTbl2.Close();
    1.46 +	TheDb2.Close();
    1.47 +	TheDb1.Close();
    1.48 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
    1.49 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb2Name);
    1.50 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb3Name);
    1.51 +	}
    1.52 +
    1.53 +static void GetDatabaseRPolicyTest()
    1.54 +	{
    1.55 +	TSecurityPolicy policy;
    1.56 +	TInt err = TheDbs.GetDatabasePolicy(KSecureDbUid, RDbs::EReadPolicy, policy);
    1.57 +	TEST2(err, KErrNone);
    1.58 +	TCompiledSecurityPolicy testSecurityPolicy(policy);
    1.59 +	TSecurityPolicy::TType type = testSecurityPolicy.Type();
    1.60 +	TEST(type == TSecurityPolicy::ETypeC3);
    1.61 +	TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityCommDD));
    1.62 +	TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityPowerMgmt));
    1.63 +	TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityTrustedUI));
    1.64 +	}
    1.65 +
    1.66 +static void GetDatabaseWPolicyTest()
    1.67 +	{
    1.68 +	TSecurityPolicy policy;
    1.69 +	TInt err = TheDbs.GetDatabasePolicy(KSecureDbUid, RDbs::EWritePolicy, policy);
    1.70 +	TEST2(err, KErrNone);
    1.71 +	TCompiledSecurityPolicy testSecurityPolicy(policy);
    1.72 +	TSecurityPolicy::TType type = testSecurityPolicy.Type();
    1.73 +	TEST(type == TSecurityPolicy::ETypeC3);
    1.74 +	TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityMultimediaDD));
    1.75 +	TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityReadDeviceData));
    1.76 +	TEST(TDBSCUtils::HasCapability(testSecurityPolicy, static_cast <TCapability> (TUint8(ECapability_None))));
    1.77 +	}
    1.78 +
    1.79 +static void GetDatabaseSPolicyTest()
    1.80 +	{
    1.81 +	TSecurityPolicy policy;
    1.82 +	TInt err = TheDbs.GetDatabasePolicy(KSecureDbUid, RDbs::ESchemaPolicy, policy);
    1.83 +	TEST2(err, KErrNone);
    1.84 +	TCompiledSecurityPolicy testSecurityPolicy(policy);
    1.85 +	TSecurityPolicy::TType type = testSecurityPolicy.Type();
    1.86 +	TEST(type == TSecurityPolicy::ETypeC7);
    1.87 +	TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityWriteDeviceData));
    1.88 +	TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityDRM));
    1.89 +	TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityProtServ));
    1.90 +	TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityDiskAdmin));
    1.91 +	TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityNetworkControl));
    1.92 +	TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilityWriteUserData));
    1.93 +	TEST(TDBSCUtils::HasCapability(testSecurityPolicy, ECapabilitySwEvent));
    1.94 +	}
    1.95 +
    1.96 +static void GetTablePolicyTest(const TDesC& aTableName,
    1.97 +							   RDbs::TPolicyType aPolicyType,
    1.98 +							   TSecurityPolicy::TType aType,
    1.99 +							   TSecureId aSecureId,
   1.100 +							   TVendorId aVendorId,
   1.101 +							   const TCapability* aCapabilities, TInt aCapCount)
   1.102 +	{
   1.103 +	TSecurityPolicy policy;
   1.104 +	TInt err = TheDbs.GetTablePolicy(KSecureDbUid, aTableName, aPolicyType, policy);
   1.105 +	TEST2(err, KErrNone);
   1.106 +	TCompiledSecurityPolicy testSecurityPolicy(policy);
   1.107 +	TEST(testSecurityPolicy.Type() == aType);
   1.108 +	for(TInt i=0;i<aCapCount;++i)
   1.109 +		{
   1.110 +		TEST(TDBSCUtils::HasCapability(testSecurityPolicy, aCapabilities[i]));
   1.111 +		}
   1.112 +	if(testSecurityPolicy.Type() == TSecurityPolicy::ETypeS3)
   1.113 +		{
   1.114 +		TEST(testSecurityPolicy.SecureId() == aSecureId);
   1.115 +		}
   1.116 +	else if(testSecurityPolicy.Type() == TSecurityPolicy::ETypeV3)
   1.117 +		{
   1.118 +		TEST(testSecurityPolicy.VendorId() == aVendorId);
   1.119 +		}
   1.120 +	}
   1.121 +
   1.122 +//Tests RDbs::GetDatabasePolicy()/RDbs::GetTablePolicy() with invalid arguments
   1.123 +static void InvalidPolicyArgTestsL()
   1.124 +	{
   1.125 +	TheTest.Printf(_L("--Invalid UID\n"));
   1.126 +	const TUid KInvalidUid = {0x490122};
   1.127 +	TSecurityPolicy policy;
   1.128 +	TInt err = TheDbs.GetDatabasePolicy(KInvalidUid, RDbs::EWritePolicy, policy);
   1.129 +	TEST2(err, KErrArgument);
   1.130 +	err = TheDbs.GetDatabasePolicy(KNullUid, RDbs::EWritePolicy, policy);
   1.131 +	TEST2(err, KErrArgument);
   1.132 +	err = TheDbs.GetTablePolicy(KInvalidUid, KTableName1, RDbs::EWritePolicy, policy);
   1.133 +	TEST2(err, KErrArgument);
   1.134 +	err = TheDbs.GetTablePolicy(KNullUid, KTableName1, RDbs::EWritePolicy, policy);
   1.135 +	TEST2(err, KErrArgument);
   1.136 +
   1.137 +	TheTest.Printf(_L("--Invalid policy type\n"));
   1.138 +	err = TheDbs.GetDatabasePolicy(KSecureDbUid, static_cast <RDbs::TPolicyType> (100), policy);
   1.139 +	TEST2(err, KErrArgument);
   1.140 +	err = TheDbs.GetTablePolicy(KSecureDbUid, KTableName2, static_cast <RDbs::TPolicyType> (101), policy);
   1.141 +	TEST2(err, KErrArgument);
   1.142 +
   1.143 +	TheTest.Printf(_L("--Table name, which is not in the policy file\n"));
   1.144 +	_LIT(KMissingTableName, "AAAAAA");
   1.145 +	err = TheDbs.GetTablePolicy(KSecureDbUid, KMissingTableName, RDbs::EWritePolicy, policy);
   1.146 +	TEST2(err, KErrNone);//This must be the related database policy
   1.147 +	TSecurityPolicy dbPolicy;
   1.148 +	err = TheDbs.GetDatabasePolicy(KSecureDbUid, RDbs::EWritePolicy, dbPolicy);
   1.149 +	TEST2(err, KErrNone);
   1.150 +	TCompiledSecurityPolicy sp1(policy);
   1.151 +	TCompiledSecurityPolicy sp2(dbPolicy);
   1.152 +	TEST(sp1 == sp2);
   1.153 +
   1.154 +	TheTest.Printf(_L("--Table name - zero length\n"));
   1.155 +	_LIT(KInvTableName, "");
   1.156 +	err = TheDbs.GetTablePolicy(KSecureDbUid, KInvTableName, RDbs::EWritePolicy, policy);
   1.157 +	TEST2(err, KErrArgument);
   1.158 +
   1.159 +	TheTest.Printf(_L("--Table name - Schema policy request\n"));
   1.160 +	err = TheDbs.GetTablePolicy(KSecureDbUid, KTableName3, RDbs::ESchemaPolicy, policy);
   1.161 +	TEST2(err, KErrNotSupported);
   1.162 +	}
   1.163 +
   1.164 +//Returns a valid drive number, but not presented in the system
   1.165 +static TDriveNumber FirstNotPresentedDriveNumber()
   1.166 +	{
   1.167 +	RFs fs;
   1.168 +	TEST2(fs.Connect(), KErrNone);
   1.169 +	TDriveNumber drvNumber = static_cast <TDriveNumber> (1000);
   1.170 +	for(TInt i=EDriveA;i<=EDriveZ;++i)
   1.171 +		{
   1.172 +		TDriveInfo driveInfo;
   1.173 +		if(fs.Drive(driveInfo, static_cast <TDriveNumber> (i)) == KErrNone)
   1.174 +			{
   1.175 +			if(driveInfo.iType == EMediaNotPresent)
   1.176 +				{
   1.177 +				drvNumber = static_cast <TDriveNumber> (i);
   1.178 +				break;
   1.179 +				}
   1.180 +			}
   1.181 +		}
   1.182 +	fs.Close();
   1.183 +	TEST(drvNumber <= EDriveZ);
   1.184 +	return drvNumber;
   1.185 +	}
   1.186 +
   1.187 +//Returns the first valid ROM drive number.
   1.188 +static TDriveNumber FirstROMDriveNumber()
   1.189 +	{
   1.190 +	RFs fs;
   1.191 +	TEST2(fs.Connect(), KErrNone);
   1.192 +	TDriveNumber drvNumber = static_cast <TDriveNumber> (1000);
   1.193 +	for(TInt i=EDriveA;i<=EDriveZ;++i)
   1.194 +		{
   1.195 +		TDriveInfo driveInfo;
   1.196 +		if(fs.Drive(driveInfo, static_cast <TDriveNumber> (i)) == KErrNone)
   1.197 +			{
   1.198 +			if(driveInfo.iDriveAtt & KDriveAttRom)
   1.199 +				{
   1.200 +				drvNumber = static_cast <TDriveNumber> (i);
   1.201 +				break;
   1.202 +				}
   1.203 +			}
   1.204 +		}
   1.205 +	fs.Close();
   1.206 +	TEST(drvNumber <= EDriveZ);
   1.207 +	return drvNumber;
   1.208 +	}
   1.209 +
   1.210 +//Tests RDbs::DatabaseNamesL() with invalid arguments
   1.211 +static void InvalidPolicyArgTests2L()
   1.212 +	{
   1.213 +	CDbDatabaseNames* dbNames = NULL;
   1.214 +
   1.215 +	TheTest.Printf(_L("--Invalid UID\n"));
   1.216 +	const TUid KInvalidUid = {0x490122};
   1.217 +	TRAPD(err, dbNames = TheDbs.DatabaseNamesL(EDriveC, KInvalidUid));
   1.218 +	TEST2(err, KErrArgument);
   1.219 +	TEST(dbNames == NULL);
   1.220 +
   1.221 +	TheTest.Printf(_L("--Null UID\n"));
   1.222 +	TRAP(err, dbNames = TheDbs.DatabaseNamesL(EDriveC, KNullUid));
   1.223 +	TEST2(err, KErrArgument);
   1.224 +	TEST(dbNames == NULL);
   1.225 +
   1.226 +	TheTest.Printf(_L("--Invalid drive\n"));
   1.227 +	TRAP(err, dbNames = TheDbs.DatabaseNamesL(static_cast <TDriveNumber> (-1), KSecureDbUid));
   1.228 +	TEST2(err, KErrBadName);
   1.229 +	TEST(dbNames == NULL);
   1.230 +	TRAP(err, TheDbs.DatabaseNamesL(static_cast <TDriveNumber> (1765), KSecureDbUid));
   1.231 +	TEST2(err, KErrBadName);
   1.232 +	TEST(dbNames == NULL);
   1.233 +
   1.234 +	TheTest.Printf(_L("--Valid drive number, but not presented in the system\n"));
   1.235 +	TDriveNumber driveNumber = ::FirstNotPresentedDriveNumber();
   1.236 +	TRAP(err, dbNames = TheDbs.DatabaseNamesL(driveNumber, KSecureDbUid));
   1.237 +	TEST2(err, KErrNotReady);
   1.238 +	TEST(dbNames == NULL);
   1.239 +	}
   1.240 +
   1.241 +/**
   1.242 +@SYMTestCaseID SYSLIB-DBMS-CT-0003
   1.243 +@SYMTestCaseDesc Test RDbs::GetDatabasePolicy(), RDbs::GetTablePolicy()
   1.244 +                 getting database or table security policies.
   1.245 +@SYMTestPriority High
   1.246 +@SYMTestActions  A call with valid arguments and result check.
   1.247 +				 A call with an invalid UID.
   1.248 +				 A call with an invalid security policy type.
   1.249 +				 A call with a table name, not presented in the policy file.
   1.250 +				 A call requesting schema security policy of a table.
   1.251 +@SYMTestExpectedResults The test must not fail.
   1.252 +@SYMREQ          REQ2429
   1.253 +                 DBMS shall provide an API to apply security policies to database tables.
   1.254 +*/
   1.255 +static void GetPolicyTestL()
   1.256 +	{
   1.257 +	TheTest.Printf(_L("--Simple GetDatabasePolicy() tests\n"));
   1.258 +	::GetDatabaseRPolicyTest();
   1.259 +	::GetDatabaseWPolicyTest();
   1.260 +	::GetDatabaseSPolicyTest();
   1.261 +
   1.262 +	::InvalidPolicyArgTestsL();
   1.263 +
   1.264 +	TheTest.Printf(_L("--Simple GetTablePolicy() tests\n"));
   1.265 +	TCapability caps1[] = {ECapabilityCommDD, ECapabilityPowerMgmt, ECapabilityTrustedUI};
   1.266 +	TCapability caps2[] = {ECapabilityMultimediaDD, ECapabilityReadDeviceData};
   1.267 +	::GetTablePolicyTest(KTableName1, RDbs::EReadPolicy, TSecurityPolicy::ETypeC3, 0, 0, caps1, 3);
   1.268 +	::GetTablePolicyTest(KTableName1, RDbs::EWritePolicy, TSecurityPolicy::ETypeC3, 0, 0, caps2, 2);
   1.269 +
   1.270 +	TCapability caps3[] = {static_cast <TCapability> (TUint8(ECapability_None))};
   1.271 +	::GetTablePolicyTest(KTableName2, RDbs::EReadPolicy, TSecurityPolicy::ETypeC3, 0, 0, caps3, 1);
   1.272 +	::GetTablePolicyTest(KTableName2, RDbs::EWritePolicy, TSecurityPolicy::ETypeC3, 0, 0, caps2, 2);
   1.273 +
   1.274 +	TCapability caps4[] = {ECapabilityReadUserData};
   1.275 +	::GetTablePolicyTest(KTableName3, RDbs::EReadPolicy, TSecurityPolicy::ETypeC3, 0, 0, caps1, 3);
   1.276 +	::GetTablePolicyTest(KTableName3, RDbs::EWritePolicy, TSecurityPolicy::ETypeC3, 0, 0, caps4, 1);
   1.277 +
   1.278 +	TCapability caps5[] = {ECapabilityWriteUserData};
   1.279 +	::GetTablePolicyTest(KTableName4, RDbs::EReadPolicy, TSecurityPolicy::ETypeC3, 0, 0, caps5, 1);
   1.280 +	::GetTablePolicyTest(KTableName4, RDbs::EWritePolicy, TSecurityPolicy::ETypeC3, 0, 0, caps2, 2);
   1.281 +	}
   1.282 +
   1.283 +/**
   1.284 +@SYMTestCaseID SYSLIB-DBMS-CT-0004
   1.285 +@SYMTestCaseDesc Test RDbs::DatabaseNamesL(TDriveNumber, const TDesC&, TUid) -
   1.286 +                 getting a list of secure shared databases.
   1.287 +@SYMTestPriority High
   1.288 +@SYMTestActions  A call with valid arguments and result check
   1.289 +				 A call with an invalid drive number.
   1.290 +				 A call with a valid, but not presented in the system, drive number.
   1.291 +				 A call with an invalid UID.
   1.292 +@SYMTestExpectedResults The test must not fail.
   1.293 +@SYMREQ          REQ2429
   1.294 +                 DBMS shall provide an API to apply security policies to database tables.
   1.295 +*/
   1.296 +static void GetDatabaseListTestL()
   1.297 +	{
   1.298 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
   1.299 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb2Name);
   1.300 +
   1.301 +	TheDb1 = TDBSCUtils::CreateDatabase(TheDbs, KSecureDbUid, KDb1Name);
   1.302 +	TheDb1.Close();
   1.303 +
   1.304 +	TheDb2 = TDBSCUtils::CreateDatabase(TheDbs, KSecureDbUid, KDb2Name);
   1.305 +	TheDb2.Close();
   1.306 +
   1.307 +	TBuf<32> dbName;
   1.308 +	dbName.Copy(KDb1Name().Mid(KDatabaseNamePos));
   1.309 +	TEST(TDBSCUtils::IsDatabaseThereL(TheDbs, KSecureDbUid, EDriveC, dbName));
   1.310 +	dbName.Copy(KDb2Name().Mid(KDatabaseNamePos));
   1.311 +	TEST(TDBSCUtils::IsDatabaseThereL(TheDbs, KSecureDbUid, EDriveC, dbName));
   1.312 +
   1.313 +	TheTest.Printf(_L("--An attempt to retrieve the list of database names for an UID, which security policy cannot be satisfied by the current test application\n"));
   1.314 +	CDbDatabaseNames* dbNames = NULL;
   1.315 +	TRAPD(err, dbNames = TheDbs.DatabaseNamesL(EDriveZ, KSecureDbUid2));
   1.316 +	delete dbNames;
   1.317 +	TEST2(err, KErrNone);
   1.318 +
   1.319 +	::InvalidPolicyArgTests2L();
   1.320 +	}
   1.321 +
   1.322 +/**
   1.323 +@SYMTestCaseID SYSLIB-DBMS-CT-0005
   1.324 +@SYMTestCaseDesc Test RDbs::CopyDatabase(const TDesC&, const TDesC&, TUid) -
   1.325 +                 copying secure shared database .
   1.326 +@SYMTestPriority High
   1.327 +@SYMTestActions  A call with valid arguments and result check
   1.328 +                 A call with an invalid source database name.
   1.329 +				 A call with an invalid target database name.
   1.330 +				 A call with an invalid UID.
   1.331 +				 An attempt to copy an opened database.
   1.332 +				 An attempt to copy a database, which security policy cannot be satisfied.
   1.333 +				 An attempt to copy a database with path specified in the database name.
   1.334 +				 An attempt to copy non-existing database.
   1.335 +@SYMTestExpectedResults The test must not fail.
   1.336 +@SYMREQ          REQ2429
   1.337 +                 DBMS shall provide an API to apply security policies to database tables.
   1.338 +*/
   1.339 +static void CopyDatabaseTestL()
   1.340 +	{
   1.341 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
   1.342 +	TheDb1 = TDBSCUtils::CreateDatabase(TheDbs, KSecureDbUid, KDb1Name);
   1.343 +	TheDb1.Close();
   1.344 +
   1.345 +	TheTest.Printf(_L("--Simple copy test\n"));
   1.346 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb3Name);
   1.347 +	TInt err = TheDbs.CopyDatabase(KDb1Name, KDb3Name, KSecureDbUid);
   1.348 +	TEST2(err, KErrNone);
   1.349 +	TBuf<32> dbName;
   1.350 +	dbName.Copy(KDb3Name().Mid(KDatabaseNamePos));
   1.351 +	TEST(TDBSCUtils::IsDatabaseThereL(TheDbs, KSecureDbUid, EDriveC, dbName));
   1.352 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb3Name);
   1.353 +
   1.354 +	TheTest.Printf(_L("--An attempt to copy a source database, which security policy cannot be satisfied by the current test application\n"));
   1.355 +	err = TheDbs.CopyDatabase(KProtDb1ZName, KDb3Name, KSecureDbUid2);
   1.356 +	TEST2(err, KErrPermissionDenied);
   1.357 +
   1.358 +	TheTest.Printf(_L("--Null source database name\n"));
   1.359 +	err = TheDbs.CopyDatabase(KNullDesC, KDb3Name, KSecureDbUid);
   1.360 +	TEST2(err, KErrArgument);
   1.361 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb3Name);
   1.362 +
   1.363 +	TheTest.Printf(_L("--Source database name with not presented drive number\n"));
   1.364 +	TDriveNumber driveNumber = ::FirstNotPresentedDriveNumber();
   1.365 +	TChar driveChar;
   1.366 +	TEST2(RFs::DriveToChar(driveNumber, driveChar), KErrNone);
   1.367 +	TBuf<KDatabaseNamePos> drvBuf;
   1.368 +	drvBuf.Append(driveChar);
   1.369 +	drvBuf.Append(':');
   1.370 +	dbName.Copy(drvBuf);
   1.371 +	dbName.Append(KDb1Name().Mid(KDatabaseNamePos));
   1.372 +	err = TheDbs.CopyDatabase(dbName, KDb3Name, KSecureDbUid);
   1.373 +	TEST2(err, KErrNotReady);
   1.374 +
   1.375 +	TheTest.Printf(_L("--Source database name - only with a drive letter and \":\"\n"));
   1.376 +	err = TheDbs.CopyDatabase(drvBuf, KDb3Name, KSecureDbUid);
   1.377 +	TEST2(err, KErrNotReady);
   1.378 +
   1.379 +	TheTest.Printf(_L("--Source database name - only with a drive letter\n"));
   1.380 +	drvBuf.SetLength(1);
   1.381 +	err = TheDbs.CopyDatabase(drvBuf, KDb3Name, KSecureDbUid);
   1.382 +	TEST2(err, KErrArgument);
   1.383 +
   1.384 +	TheTest.Printf(_L("--Null destination database name\n"));
   1.385 +	err = TheDbs.CopyDatabase(KDb1Name, KNullDesC, KSecureDbUid);
   1.386 +	TEST2(err, KErrArgument);
   1.387 +
   1.388 +	TheTest.Printf(_L("--Destination database name with not presented drive number\n"));
   1.389 +	drvBuf.Append(':');
   1.390 +	dbName.Copy(drvBuf);
   1.391 +	dbName.Append(KDb3Name().Mid(KDatabaseNamePos));
   1.392 +	err = TheDbs.CopyDatabase(KDb1Name, dbName, KSecureDbUid);
   1.393 +	TEST2(err, KErrNotReady);
   1.394 +
   1.395 +	TheTest.Printf(_L("--Destination database - ROM drive\n"));
   1.396 +	TDriveNumber romDriveNumber = ::FirstROMDriveNumber();
   1.397 +	TEST2(RFs::DriveToChar(romDriveNumber, driveChar), KErrNone);
   1.398 +	drvBuf[0] = static_cast <TText> (driveChar);
   1.399 +	dbName.Copy(drvBuf);
   1.400 +	dbName.Append(KDb3Name().Mid(KDatabaseNamePos));
   1.401 +	err = TheDbs.CopyDatabase(KDb1Name, dbName, KSecureDbUid);
   1.402 +	TEST2(err, KErrAccessDenied);
   1.403 +
   1.404 +	TheTest.Printf(_L("--A source database with a valid name, but not presented in the system\n"));
   1.405 +	_LIT(KMissingDb, "C:asdhasfsudfygusdfuierfb.db");
   1.406 +	err = TheDbs.CopyDatabase(KMissingDb, KDb3Name, KSecureDbUid);
   1.407 +	TEST2(err, KErrNotFound);
   1.408 +
   1.409 +	TheTest.Printf(_L("--A test with an open source database\n"));
   1.410 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
   1.411 +	TheDb2 = TDBSCUtils::CreateDatabase(TheDbs, KSecureDbUid, KDb1Name);
   1.412 +	err = TheDbs.CopyDatabase(KDb1Name, KDb3Name, KSecureDbUid);
   1.413 +	TheDb2.Close();
   1.414 +	TEST2(err, KErrInUse);
   1.415 +
   1.416 +	TheTest.Printf(_L("--An atempt to copy over an existing database\n"));
   1.417 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb2Name);
   1.418 +	TheDb1 = TDBSCUtils::CreateDatabase(TheDbs, KSecureDbUid, KDb2Name);
   1.419 +	TheDb1.Close();
   1.420 +	err = TheDbs.CopyDatabase(KDb1Name, KDb2Name, KSecureDbUid);
   1.421 +	TEST2(err, KErrAlreadyExists);
   1.422 +
   1.423 +	TheTest.Printf(_L("--Too long destination database name > KDbMaxName symbols\n"));
   1.424 +	_LIT(KTooLongDbName, "A_0123456789_0123456789_0123456789_0123456789_0123456789_0123456789_0123456789.db");
   1.425 +	err = TheDbs.CopyDatabase(KDb1Name, KTooLongDbName, KSecureDbUid);
   1.426 +	TEST2(err, KErrArgument);
   1.427 +
   1.428 +	TheTest.Printf(_L("--Null UID\n"));
   1.429 +	err = TheDbs.CopyDatabase(KDb1Name, KDb3Name, KNullUid);
   1.430 +	TEST2(err, KErrArgument);
   1.431 +
   1.432 +	TheTest.Printf(_L("--Invalid UID\n"));
   1.433 +	const TUid KInvalidUid = {0x490122};
   1.434 +	err = TheDbs.CopyDatabase(KDb1Name, KDb3Name, KInvalidUid);
   1.435 +	TEST2(err, KErrArgument);
   1.436 +
   1.437 +	TheTest.Printf(_L("--An attempt to copy a database with the path specified in the name\n"));
   1.438 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb2Name);
   1.439 +	_LIT(KSrcDbName2, "C:\\a.Db");
   1.440 +	_LIT(KDestDbName2, "C:\\b.dB");
   1.441 +	err = TheDbs.CopyDatabase(KSrcDbName2, KDestDbName2, KSecureDbUid);
   1.442 +	TEST2(err, KErrArgument);
   1.443 +	}
   1.444 +
   1.445 +/**
   1.446 +@SYMTestCaseID SYSLIB-DBMS-CT-0006
   1.447 +@SYMTestCaseDesc Test RDbs::Delete(const TDesC&, TUid) - deleting secure shared database .
   1.448 +@SYMTestPriority High
   1.449 +@SYMTestActions  A call with valid arguments and result check
   1.450 +                 A call with an invalid UID.
   1.451 +				 A call with an invalid database name.
   1.452 +				 An attempt to delete an opened database.
   1.453 +				 An attempt to delete a database, which security policy cannot be satisfied.
   1.454 +				 An attempt to delete a database with path specified in the database name.
   1.455 +				 An attempt to delete non-existing database.
   1.456 +@SYMTestExpectedResults The test must not fail.
   1.457 +@SYMREQ          REQ2429
   1.458 +                 DBMS shall provide an API to apply security policies to database tables.
   1.459 +*/
   1.460 +static void DeleteDatabaseTestL()
   1.461 +	{
   1.462 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
   1.463 +	TheDb1 = TDBSCUtils::CreateDatabase(TheDbs, KSecureDbUid, KDb1Name);
   1.464 +	TheDb1.Close();
   1.465 +
   1.466 +	TheTest.Printf(_L("--Simple delete database test\n"));
   1.467 +	TInt err = TheDbs.DeleteDatabase(KDb1Name, KSecureDbUid);
   1.468 +	TEST2(err, KErrNone);
   1.469 +
   1.470 +	TheTest.Printf(_L("--Null UID\n"));
   1.471 +	err = TheDbs.DeleteDatabase(KDb1Name, KNullUid);
   1.472 +	TEST2(err, KErrArgument);
   1.473 +
   1.474 +	TheTest.Printf(_L("--Invalid UID\n"));
   1.475 +	const TUid KInvalidUid = {0x490122};
   1.476 +	err = TheDbs.DeleteDatabase(KDb1Name, KInvalidUid);
   1.477 +	TEST2(err, KErrArgument);
   1.478 +
   1.479 +	TheTest.Printf(_L("--Null database name\n"));
   1.480 +	err = TheDbs.DeleteDatabase(KNullDesC, KSecureDbUid);
   1.481 +	TEST2(err, KErrArgument);
   1.482 +
   1.483 +	TheTest.Printf(_L("--Non-existing database - no drive letter (the name is invalid)\n"));
   1.484 +	_LIT(KTooLongDbName, "A_0123456789_0123456789_0123456789_0123456789_0123456789_0123456789_0123456789.db");
   1.485 +	err = TheDbs.DeleteDatabase(KTooLongDbName, KSecureDbUid);
   1.486 +	TEST2(err, KErrArgument);
   1.487 +	_LIT(KInvDbName1, "UI789.db");
   1.488 +	err = TheDbs.DeleteDatabase(KInvDbName1, KSecureDbUid);
   1.489 +	TEST2(err, KErrArgument);
   1.490 +
   1.491 +	TheTest.Printf(_L("--Non-existing database - valid db name\n"));
   1.492 +	_LIT(KMissingDbName1, "C:A0192345.db");
   1.493 +	err = TheDbs.DeleteDatabase(KMissingDbName1, KSecureDbUid);
   1.494 +	TEST2(err, KErrNotFound);
   1.495 +
   1.496 +	TheTest.Printf(_L("--An attempt to delete a database with the path specified in the name\n"));
   1.497 +	_LIT(KMissingDbName2, "C:\\TEMP\\A0192345.db");
   1.498 +	err = TheDbs.DeleteDatabase(KMissingDbName2, KSecureDbUid);
   1.499 +	TEST2(err, KErrArgument);
   1.500 +
   1.501 +	TheTest.Printf(_L("--An attempt to delete a database, which security policy cannot be satisfied by the current test application\n"));
   1.502 +	err = TheDbs.DeleteDatabase(KProtDb1CName, KSecureDbUid2);
   1.503 +	TEST2(err, KErrPermissionDenied);
   1.504 +
   1.505 +	TheTest.Printf(_L("--An attempt to delete an open database\n"));
   1.506 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
   1.507 +	TheDb1 = TDBSCUtils::CreateDatabase(TheDbs, KSecureDbUid, KDb1Name);
   1.508 +	err = TheDbs.DeleteDatabase(KDb1Name, KSecureDbUid);
   1.509 +	TEST2(err, KErrInUse);
   1.510 +	TheDb1.Close();
   1.511 +	}
   1.512 +
   1.513 +/**
   1.514 +@SYMTestCaseID SYSLIB-DBMS-CT-0007
   1.515 +@SYMTestCaseDesc Test RDbNamedDatabase::Create(RDbs&, const TDesC&, const TDesC&) -
   1.516 +                 secure shared database creation.
   1.517 +@SYMTestPriority High
   1.518 +@SYMTestActions  A call with valid arguments and result check
   1.519 +                 An attempt to create already existing database.
   1.520 +				 An attempt to create already existing and opened database.
   1.521 +				 RDbNamedDatabase::Create() called with an invalid format string.
   1.522 +				 RDbNamedDatabase::Create() called with a database name containing '\' symbols.
   1.523 +				 An attempt to create a database, which security policy cannot be satisfied.
   1.524 +@SYMTestExpectedResults The test must not fail.
   1.525 +@SYMREQ          REQ2429
   1.526 +                 DBMS shall provide an API to apply security policies to database tables.
   1.527 +*/
   1.528 +static void CreateDatabaseL()
   1.529 +	{
   1.530 +	TheTest.Printf(_L("--Simple create database test\n"));
   1.531 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
   1.532 +	TBuf<32> format;
   1.533 +	format.Copy(KSecure);
   1.534 +	format.Append(KSecureDbUid.Name());
   1.535 +	TInt err = TheDb1.Create(TheDbs, KDb1Name, format);
   1.536 +	TEST2(err, KErrNone);
   1.537 +
   1.538 +	TheTest.Printf(_L("--An atempt to recreate an open database\n"));
   1.539 +	err = TheDb1.Create(TheDbs, KDb1Name, format);
   1.540 +	TEST2(err, KErrAlreadyExists);
   1.541 +	TheDb1.Close();
   1.542 +
   1.543 +	TheTest.Printf(_L("--An atempt to recreate an existing database\n"));
   1.544 +	err = TheDb1.Create(TheDbs, KDb1Name, format);
   1.545 +	TEST2(err, KErrAlreadyExists);
   1.546 +
   1.547 +	TheTest.Printf(_L("--Format string with \"SECURE\" keyword and some other words too\n"));
   1.548 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
   1.549 +	format.Copy(_L("A "));
   1.550 +	format.Append(KSecure);
   1.551 +	format.Append(_L(" B"));
   1.552 +	format.Append(KSecureDbUid.Name());
   1.553 +	err = TheDb1.Create(TheDbs, KDb1Name, format);
   1.554 +	TheDb1.Close();
   1.555 +	TEST2(err, KErrNotSupported);
   1.556 +
   1.557 +	TheTest.Printf(_L("--Format string with \"SeCuRe\" keyword\n"));
   1.558 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
   1.559 +	format.Copy(_L("SeCuRe"));
   1.560 +	format.Append(KSecureDbUid.Name());
   1.561 +	err = TheDb1.Create(TheDbs, KDb1Name, format);
   1.562 +	TheDb1.Close();
   1.563 +	TEST2(err, KErrNone);
   1.564 +
   1.565 +	TheTest.Printf(_L("--Format string with \"SECURED\" keyword\n"));
   1.566 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
   1.567 +	format.Copy(_L("SECURED"));
   1.568 +	format.Append(KSecureDbUid.Name());
   1.569 +	err = TheDb1.Create(TheDbs, KDb1Name, format);
   1.570 +	TheDb1.Close();
   1.571 +	TEST2(err, KErrNotSupported);
   1.572 +
   1.573 +	TheTest.Printf(_L("--Format string with a null uid\n"));
   1.574 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
   1.575 +	format.Copy(_L("SECURE"));
   1.576 +	format.Append(KNullUid.Name());
   1.577 +	err = TheDb1.Create(TheDbs, KDb1Name, format);
   1.578 +	TheDb1.Close();
   1.579 +	TEST2(err, KErrArgument);
   1.580 +
   1.581 +	TheTest.Printf(_L("--Format string with an invalid uid\n"));
   1.582 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
   1.583 +	format.Copy(_L("SECURE"));
   1.584 +	const TUid KInvalidUid = {0x490122};
   1.585 +	format.Append(KInvalidUid.Name());
   1.586 +	err = TheDb1.Create(TheDbs, KDb1Name, format);
   1.587 +	TheDb1.Close();
   1.588 +	TEST2(err, KErrArgument);
   1.589 +
   1.590 +	TheTest.Printf(_L("--Format string with a uid only\n"));
   1.591 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
   1.592 +	format.Copy(KSecureDbUid.Name());
   1.593 +	err = TheDb1.Create(TheDbs, KDb1Name, format);
   1.594 +	TheDb1.Close();
   1.595 +	TEST2(err, KErrNotSupported);
   1.596 +
   1.597 +	TheTest.Printf(_L("--Blank format string\n"));
   1.598 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
   1.599 +	format.Zero();
   1.600 +	err = TheDb1.Create(TheDbs, KDb1Name, format);
   1.601 +	TheDb1.Close();
   1.602 +	TEST2(err, KErrNotSupported);
   1.603 +
   1.604 +	TheTest.Printf(_L("--Valid format string + database name with a path\n"));
   1.605 +	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDb1Name);
   1.606 +	format.Copy(KSecure);
   1.607 +	format.Append(KSecureDbUid.Name());
   1.608 +	_LIT(KSrcDbName2, "C:\\a.Db");
   1.609 +	err = TheDb1.Create(TheDbs, KSrcDbName2, format);
   1.610 +	TheDb1.Close();
   1.611 +	TEST2(err, KErrArgument);
   1.612 +
   1.613 +	TheTest.Printf(_L("--An attempt to create a database, which security policy cannot be satisfied by the current test application\n"));
   1.614 +	format.Copy(KSecure);
   1.615 +	format.Append(KSecureDbUid2.Name());
   1.616 +	err = TheDb1.Create(TheDbs, KProtDb2CName, format);
   1.617 +	TheDb1.Close();
   1.618 +	TEST2(err, KErrPermissionDenied);
   1.619 +	}
   1.620 +
   1.621 +static void INC057327L()
   1.622 +    {
   1.623 +     TRAPD(err,delete TheDbs.DatabaseNamesL(EDriveZ, TUid::Uid(0x12344321)));
   1.624 +     TheTest(err == KErrNone);
   1.625 +    }
   1.626 +
   1.627 +static void DoRunL()
   1.628 +	{
   1.629 +	TheTest.Start(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0003 Get database/table policies "));
   1.630 +	::GetPolicyTestL();
   1.631 +
   1.632 +	TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0004 Get databases list "));
   1.633 +	::GetDatabaseListTestL();
   1.634 +
   1.635 +	TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0005 Copy database "));
   1.636 +	::CopyDatabaseTestL();
   1.637 +
   1.638 +	TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0006 Delete database "));
   1.639 +	::DeleteDatabaseTestL();
   1.640 +
   1.641 +	TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0007 Create database "));
   1.642 +	::CreateDatabaseL();
   1.643 +
   1.644 +	TheTest.Next(_L("Database security"));
   1.645 +	::DoDbTestL();
   1.646 +
   1.647 +	TheTest.Next(_L("Table security"));
   1.648 +	::DoTblTestL();
   1.649 +
   1.650 +	TheTest.Next(_L("Test for INC057327"));
   1.651 +	::INC057327L();
   1.652 +	}
   1.653 +
   1.654 +TInt E32Main()
   1.655 +    {
   1.656 +	__UHEAP_MARK;
   1.657 +	CTrapCleanup* tc = CTrapCleanup::New();
   1.658 +	TEST(tc != NULL);
   1.659 +
   1.660 +	TInt err = TheDbs.Connect();
   1.661 +	TEST2(err, KErrNone);
   1.662 +
   1.663 +	TRAP(err, ::DoRunL());
   1.664 +	TEST2(err, KErrNone);
   1.665 +
   1.666 +	::DeleteDatabases();
   1.667 +	TheDbs.Close();
   1.668 +
   1.669 +	TheTest.End();
   1.670 +	TheTest.Close();
   1.671 +
   1.672 +	delete tc;
   1.673 +
   1.674 +	__UHEAP_MARKEND;
   1.675 +	User::Heap().Check();
   1.676 +	return KErrNone;
   1.677 +    }