1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000
1.2 +++ b/os/security/cryptomgmtlibs/securitytestfw/test/testhandler2/t_policy.h Fri Jun 15 03:10:57 2012 +0200
1.3 @@ -0,0 +1,129 @@
1.4 +/*
1.5 +* Copyright (c) 2004-2009 Nokia Corporation and/or its subsidiary(-ies).
1.6 +* All rights reserved.
1.7 +* This component and the accompanying materials are made available
1.8 +* under the terms of the License "Eclipse Public License v1.0"
1.9 +* which accompanies this distribution, and is available
1.10 +* at the URL "http://www.eclipse.org/legal/epl-v10.html".
1.11 +*
1.12 +* Initial Contributors:
1.13 +* Nokia Corporation - initial contribution.
1.14 +*
1.15 +* Contributors:
1.16 +*
1.17 +* Description:
1.18 +* tpolicy.h
1.19 +*
1.20 +*/
1.21 +
1.22 +
1.23 +#ifndef __TPOLICY_H__
1.24 +#define __TPOLICY_H__
1.25 +
1.26 +#include "t_testaction.h"
1.27 +
1.28 +/**
1.29 + * This action is used to test whether security policies are correctly enforced.
1.30 + * This is done by specifying another test action to run, and the security
1.31 + * policy that is under test. The action is then run in a seprate process.
1.32 + * This happens multiple times, to test that it passes when the process has the
1.33 + * required security settings and failes when it does not.
1.34 + *
1.35 + * The action body can contain the the following elements:
1.36 + *
1.37 + * testexe: The path of the executable to use to run the test
1.38 + * excludedcapabilities: Capabilites not to assign to the test executable when performing failure tests
1.39 + * policy: The security policy to be tested for
1.40 + * preactions: Optional, contains test actions to run to perform setup before the test
1.41 + * passaction: The action under test, when expected to pass
1.42 + * failaction: The action under test, when expected to fail
1.43 + * postactions: Optonal, contains test actions to run to perform cleanup after the test
1.44 + *
1.45 + * A new script is created containing the preactions if present, the test action
1.46 + * and the postactions (if present). For failure tests, the testaction's expect
1.47 + * results is changed to KErrPermissionDenied.
1.48 + */
1.49 +class CPolicyTest : public CTestAction
1.50 + {
1.51 +public:
1.52 + static CPolicyTest* NewL(CConsoleBase& aConsole, Output& aOut,
1.53 + const TTestActionSpec& aTestActionSpec);
1.54 + static CPolicyTest* NewLC(CConsoleBase& aConsole, Output& aOut,
1.55 + const TTestActionSpec& aTestActionSpec);
1.56 + ~CPolicyTest();
1.57 +
1.58 +private:
1.59 + CPolicyTest(CConsoleBase& aConsole, Output& aOut);
1.60 + void ConstructL(const TTestActionSpec& aTestActionSpec);
1.61 +
1.62 +public:
1.63 + virtual void PerformAction(TRequestStatus& aStatus);
1.64 +
1.65 +private:
1.66 + // Methods overriden from CTestAction
1.67 + virtual void DoReportAction();
1.68 + virtual void DoCheckResult(TInt aError);
1.69 + virtual void PerformCancel();
1.70 + virtual void Reset();
1.71 +
1.72 + // Methods for parsing the test spec
1.73 + void BadUsageL(const TDesC& aMessage);
1.74 + void SetTestExeL(const TDesC8& aPath);
1.75 + void SetPolicyL(const TDesC8& aSpec);
1.76 + void SetTestActionL(const TDesC8& aPassAction, const TDesC8& aFailAction);
1.77 +
1.78 + // Methods for running the test
1.79 + void GetNextTest();
1.80 + void StartProcessL(const TDesC& aExe, const TDesC& aCommandLine, TRequestStatus& aStatus);
1.81 + void CheckProcessTermintationL();
1.82 + void SetupTestL(TRequestStatus& aStatus);
1.83 + void SetTestSecurityInfoL(TInt aSecureId, TInt aVendorId, TUint aCapSet, TRequestStatus& aStatus);
1.84 + void CheckSetCapsResultL();
1.85 + void RunTestL(TRequestStatus& aStatus);
1.86 + void ProcessResultsL(TRequestStatus& aStatus);
1.87 + void WriteScriptFileL(const TDesC& aPath, const TDesC8& aAction);
1.88 +
1.89 +private:
1.90 + enum TState
1.91 + {
1.92 + EInit,
1.93 + ESetupTest,
1.94 + ERunTest,
1.95 + EProcessResults,
1.96 + EFinished
1.97 + };
1.98 +
1.99 + enum TTestState
1.100 + {
1.101 + ETestNone,
1.102 + ETestFailSID,
1.103 + ETestFailVID,
1.104 + ETestFailCap,
1.105 + ETestPass,
1.106 + ETestFinished
1.107 + };
1.108 +
1.109 +private:
1.110 + RFs iFs; ///< File server handle
1.111 + TInt iProcessSecureId; ///< The secure id of this process
1.112 + TInt iProcessVendorId; ///< The vendor id of this process
1.113 +
1.114 + HBufC* iTestExe; ///< The path of the test harness to run
1.115 + TCapabilitySet iExcludedCaps; ///< Capabilties to exclude from failure tests
1.116 + TUint iSecureId; ///< The secure id of the policy under test, or zero
1.117 + TUint iVendorId; ///< The secure id of the policy under test, or zero
1.118 + RArray<TCapability> iCapabilities; ///< The capabilities of the policy under test
1.119 + HBufC8* iPreActions; ///< Script fragment for setup test actions
1.120 + HBufC8* iPassAction; ///< The action under test
1.121 + HBufC8* iFailAction; ///< The action under test
1.122 + HBufC8* iPostActions; ///< Script fragment for cleanup test actions
1.123 +
1.124 + TState iState; ///< The state we're in
1.125 + TTestState iTestState; ///< The test we're running when iState is ESetCaps or ERunTest
1.126 + TInt iCapIndex; ///< The capability we're testing when iTestState is ECapFailTests
1.127 + RProcess iProcess; ///< Used for running setcap and test harness
1.128 + TInt iFailCount; ///< Running count of tests failed
1.129 + TBuf16<50> iTestExeTmpNewPath; ///< stores the executable as executable_policytest.exe
1.130 + };
1.131 +
1.132 +#endif