Update contrib.
1 // Copyright (c) 2002-2009 Nokia Corporation and/or its subsidiary(-ies).
2 // All rights reserved.
3 // This component and the accompanying materials are made available
4 // under the terms of the License "Eclipse Public License v1.0"
5 // which accompanies this distribution, and is available
6 // at the URL "http://www.eclipse.org/legal/epl-v10.html".
8 // Initial Contributors:
9 // Nokia Corporation - initial contribution.
17 #include "t_property.h"
19 TSecureId TestSecureId;
20 TVendorId TestVendorId;
21 TCapability TestCaps[ECapability_Limit];
22 TCapability TestMissingCaps[ECapability_Limit];
24 TSecurityPolicy CorrectCapPolicy;
25 TSecurityPolicy IncorrectCapPolicy;
27 TUint TestPolicyCount=0;
31 TBool MakeTestSecurityPolicy()
33 TCapability* c =TestCaps;
34 TCapability* m =TestMissingCaps;
35 TUint t=++TestPolicyCount;
36 RDebug::Print(_L("Test policy %d\n"),t);
39 _LIT_SECURITY_POLICY_PASS(KSecurityPolicyPass);
40 CorrectCapPolicy = KSecurityPolicyPass;
41 _LIT_SECURITY_POLICY_FAIL(KSecurityPolicyFail);
42 IncorrectCapPolicy = KSecurityPolicyFail;
51 CorrectCapPolicy = TSecurityPolicy(c[0]);
52 IncorrectCapPolicy = TSecurityPolicy(m[0]);
55 CorrectCapPolicy = TSecurityPolicy(c[0],c[1]);
56 IncorrectCapPolicy = TSecurityPolicy(m[0],c[1]);
59 CorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2]);
60 IncorrectCapPolicy = TSecurityPolicy(c[0],m[1],c[2]);
63 CorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],c[3]);
64 IncorrectCapPolicy = TSecurityPolicy(c[0],c[1],m[2],c[3]);
67 CorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],c[3],c[4]);
68 IncorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],m[3],c[4]);
71 CorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],c[3],c[4],c[5]);
72 IncorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],c[3],m[4],c[5]);
75 CorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],c[3],c[4],c[5],c[6]);
76 IncorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],c[3],c[4],m[5],c[6]);
84 TSecureId id = TestSecureId;
85 TSecureId id2 = TSecureId((TUint32)TestVendorId);
89 CorrectCapPolicy = TSecurityPolicy(id);
90 IncorrectCapPolicy = TSecurityPolicy(id2);
93 CorrectCapPolicy = TSecurityPolicy(id,c[0]);
94 IncorrectCapPolicy = TSecurityPolicy(id2,c[0]);
97 CorrectCapPolicy = TSecurityPolicy(id,c[0],c[1]);
98 IncorrectCapPolicy = TSecurityPolicy(id2,c[0],c[1]);
101 CorrectCapPolicy = TSecurityPolicy(id,c[0],c[1],c[2]);
102 IncorrectCapPolicy = TSecurityPolicy(id2,c[0],c[1],c[2]);
110 TVendorId id = TestVendorId;
111 TVendorId id2 = TVendorId((TUint32)TestSecureId);
115 CorrectCapPolicy = TSecurityPolicy(id);
116 IncorrectCapPolicy = TSecurityPolicy(id2);
119 CorrectCapPolicy = TSecurityPolicy(id,c[0]);
120 IncorrectCapPolicy = TSecurityPolicy(id2,c[0]);
123 CorrectCapPolicy = TSecurityPolicy(id,c[0],c[1]);
124 IncorrectCapPolicy = TSecurityPolicy(id2,c[0],c[1]);
127 CorrectCapPolicy = TSecurityPolicy(id,c[0],c[1],c[2]);
128 IncorrectCapPolicy = TSecurityPolicy(id2,c[0],c[1],c[2]);
138 _LIT(KSecurityReadCapabilityName, "RProperty Security: Read Capability Basics");
140 class CPropSecurityReadCapability : public CTestProgram
143 CPropSecurityReadCapability(TUid aCategory, TUint aKey1, TUint aKey2, RProperty::TType aType) :
144 CTestProgram(KSecurityReadCapabilityName), iCategory(aCategory), iKey1(aKey1), iKey2(aKey2), iType(aType)
148 void Run(TUint aCount);
154 RProperty::TType iType;
157 void CPropSecurityReadCapability::Run(TUint aCount)
159 while(MakeTestSecurityPolicy())
160 for (TUint i = 0; i < aCount; ++i)
165 TInt r = prop1.Attach(iCategory, iKey1);
166 TF_ERROR(r, r == KErrNone);
167 r = prop2.Attach(iCategory, iKey2);
168 TF_ERROR(r, r == KErrNone);
170 // If the property has not been defined, the request will not complete until the property
171 // is defined and published.
172 // When defined if the caller does not have read capabilities the request completes
173 // with KErrPermissionDenied.
174 TRequestStatus status1;
175 prop1.Subscribe(status1);
176 TF_ERROR(status1.Int(), status1.Int() == KRequestPending);
177 r = prop1.Define(iCategory, iKey1, iType, IncorrectCapPolicy, CorrectCapPolicy);
178 TF_ERROR(r, r == KErrNone);
179 User::WaitForRequest(status1);
180 TF_ERROR(status1.Int(), status1.Int() == KErrPermissionDenied);
182 TRequestStatus status2;
183 prop2.Subscribe(status2);
184 TF_ERROR(status2.Int(), status2.Int() == KRequestPending);
185 r = prop2.Define(iCategory, iKey2, iType, CorrectCapPolicy, IncorrectCapPolicy);
186 TF_ERROR(r, r == KErrNone);
187 TF_ERROR(status2.Int(), status2.Int() == KRequestPending);
189 User::WaitForRequest(status2);
190 TF_ERROR(status2.Int(), status2.Int() == KErrCancel);
192 // If the Subscribe() caller does not have the read capabilities the request completes immediately
193 // with KErrPermissionDenied.
194 prop1.Subscribe(status1);
195 User::WaitForRequest(status1);
196 TF_ERROR(status1.Int(), status1.Int() == KErrPermissionDenied);
198 prop2.Subscribe(status2);
199 TF_ERROR(status2.Int(), status2.Int() == KRequestPending);
201 User::WaitForRequest(status2);
202 TF_ERROR(status2.Int(), status2.Int() == KErrCancel);
204 // If the caller does not have the read capabilities Get() fails with KErrPermissionDenied.
205 if (iType == RProperty::EInt)
208 r = prop1.Get(iCategory, iKey1, value);
209 TF_ERROR(r, r == KErrPermissionDenied);
210 r = prop2.Get(iCategory, iKey2, value);
211 TF_ERROR(r, r == KErrNone);
212 r = prop1.Get(value);
213 TF_ERROR(r, r == KErrPermissionDenied);
214 r = prop2.Get(value);
215 TF_ERROR(r, r == KErrNone);
221 r = prop1.Get(iCategory, iKey1, buf);
222 TF_ERROR(r, r == KErrPermissionDenied);
223 r = prop2.Get(iCategory, iKey2, buf);
224 TF_ERROR(r, r == KErrNone);
225 r = prop1.Get(iCategory, iKey1, buf8);
226 TF_ERROR(r, r == KErrPermissionDenied);
227 r = prop2.Get(iCategory, iKey2, buf8);
228 TF_ERROR(r, r == KErrNone);
230 TF_ERROR(r, r == KErrPermissionDenied);
232 TF_ERROR(r, r == KErrNone);
234 TF_ERROR(r, r == KErrPermissionDenied);
236 TF_ERROR(r, r == KErrNone);
239 r = prop1.Delete(iCategory, iKey1);
240 TF_ERROR(r, r == KErrNone);
241 r = prop2.Delete(iCategory, iKey2);
242 TF_ERROR(r, r == KErrNone);
248 _LIT(KSecurityWriteCapabilityName, "RProperty Security: Write Cpability Basics");
250 class CPropSecurityWriteCapability : public CTestProgram
253 CPropSecurityWriteCapability(TUid aCategory, TUint aKey1, TUint aKey2, RProperty::TType aType) :
254 CTestProgram(KSecurityWriteCapabilityName), iCategory(aCategory), iKey1(aKey1), iKey2(aKey2), iType(aType)
258 void Run(TUint aCount);
264 RProperty::TType iType;
267 void CPropSecurityWriteCapability::Run(TUint aCount)
269 while(MakeTestSecurityPolicy())
270 for (TUint i = 0; i < aCount; ++i)
275 TInt r = prop1.Attach(iCategory, iKey1);
276 TF_ERROR(r, r == KErrNone);
277 r = prop2.Attach(iCategory, iKey2);
278 TF_ERROR(r, r == KErrNone);
280 r = prop1.Define(iCategory, iKey1, iType, CorrectCapPolicy, IncorrectCapPolicy);
281 TF_ERROR(r, r == KErrNone);
282 r = prop2.Define(iCategory, iKey2, iType, IncorrectCapPolicy, CorrectCapPolicy);
283 TF_ERROR(r, r == KErrNone);
285 // If the caller does not have the write capabilities Set() fails with KErrPermissionDenied.
286 if (iType == RProperty::EInt)
289 r = prop1.Set(iCategory, iKey1, value);
290 TF_ERROR(r, r == KErrPermissionDenied);
291 r = prop2.Set(iCategory, iKey2, value);
292 TF_ERROR(r, r == KErrNone);
293 r = prop1.Set(value);
294 TF_ERROR(r, r == KErrPermissionDenied);
295 r = prop2.Set(value);
296 TF_ERROR(r, r == KErrNone);
300 TBuf<16> buf(_L("Foo"));
301 TBuf8<16> buf8((TUint8*) "Foo");
302 r = prop1.Set(iCategory, iKey1, buf);
303 TF_ERROR(r, r == KErrPermissionDenied);
304 r = prop2.Set(iCategory, iKey2, buf);
305 TF_ERROR(r, r == KErrNone);
306 r = prop1.Set(iCategory, iKey1, buf8);
307 TF_ERROR(r, r == KErrPermissionDenied);
308 r = prop2.Set(iCategory, iKey2, buf8);
309 TF_ERROR(r, r == KErrNone);
311 TF_ERROR(r, r == KErrPermissionDenied);
313 TF_ERROR(r, r == KErrNone);
315 TF_ERROR(r, r == KErrPermissionDenied);
317 TF_ERROR(r, r == KErrNone);
320 r = prop1.Delete(iCategory, iKey1);
321 TF_ERROR(r, r == KErrNone);
322 r = prop2.Delete(iCategory, iKey2);
323 TF_ERROR(r, r == KErrNone);
329 GLDEF_C TInt E32Main()
333 info.Set(RProcess());
334 TestSecureId = info.iSecureId;
335 TestVendorId = info.iVendorId;
339 for(TInt i=0; i<ECapability_Limit; i++)
341 if(info.iCaps.HasCapability((TCapability)i))
342 TestCaps[c++] = (TCapability)i;
344 TestMissingCaps[m++] = (TCapability)i;
346 __ASSERT_ALWAYS(c>=7,User::Panic(_L("not enough caps"), 1));
347 __ASSERT_ALWAYS(m>=6,User::Panic(_L("missing caps <6"), 1));
350 TInt len = User::CommandLineLength();
351 __ASSERT_ALWAYS(len, User::Panic(_L("t_prop_sec: bad args"), 0));
353 // Get arguments for the command line
354 TInt size = len * sizeof(TUint16);
355 HBufC8* hb = HBufC8::NewMax(size);
356 __ASSERT_ALWAYS(hb, User::Panic(_L("t_prop_sec: no memory"), 0));
357 TPtr cmd((TUint16*) hb->Ptr(), len);
358 User::CommandLine(cmd);
359 CPropSecurity::TArgs* args = (CPropSecurity::TArgs*) hb->Ptr();
361 CTestProgram::Start();
363 CTestProgram* progs[] =
365 new CPropSecurityReadCapability(args->iCategory, args->iSlaveKeySlot + 0, args->iSlaveKeySlot + 1,
367 new CPropSecurityReadCapability(args->iCategory, args->iSlaveKeySlot + 2, args->iSlaveKeySlot + 3,
368 RProperty::EByteArray),
369 new CPropSecurityWriteCapability(args->iCategory, args->iSlaveKeySlot + 4, args->iSlaveKeySlot + 5,
371 new CPropSecurityWriteCapability(args->iCategory, args->iSlaveKeySlot + 6, args->iSlaveKeySlot + 7,
372 RProperty::EByteArray),
377 TInt n = (sizeof(progs)/sizeof(*progs)) - 1;
378 for (i = 0; i < n; ++i)
380 __ASSERT_ALWAYS(progs[i], User::Panic(_L("t_property: no memory"), 0));
383 CTestProgram::LaunchGroup(progs, 2);
385 for (i = 0; i < n; ++i)