130 |
131 |
131 oldName=KOldFile; |
132 oldName=KOldFile; |
132 oldName[0]=(TText)gDriveToTest; |
133 oldName[0]=(TText)gDriveToTest; |
133 |
134 |
134 r=TheFs.GetShortName(systestfile, shortfilename); |
135 r=TheFs.GetShortName(systestfile, shortfilename); |
135 test(r==KErrPermissionDenied); |
136 test_Value(r, r == KErrPermissionDenied); |
136 |
137 |
137 r=TheFs.GetLongName(systestfile1, longfilename); |
138 r=TheFs.GetLongName(systestfile1, longfilename); |
138 test(r==KErrPermissionDenied); |
139 test_Value(r, r == KErrPermissionDenied); |
139 |
140 |
140 r=file1.Create(TheFs,oldName,EFileWrite); |
141 r=file1.Create(TheFs,oldName,EFileWrite); |
141 test(r==KErrNone || r==KErrAlreadyExists); |
142 test_Value(r, r == KErrNone || r==KErrAlreadyExists); |
142 file1.Close(); |
143 file1.Close(); |
143 |
144 |
144 r=TheFs.Replace(oldName,systestfile); |
145 r=TheFs.Replace(oldName,systestfile); |
145 test(r==KErrPermissionDenied); |
146 test_Value(r, r == KErrPermissionDenied); |
146 |
147 |
147 r=TheFs.Rename(systestfile,systestfile1); |
148 r=TheFs.Rename(systestfile,systestfile1); |
148 test(r==KErrPermissionDenied); |
149 test_Value(r, r == KErrPermissionDenied); |
149 |
150 |
150 r=TheFs.Entry(systestfile1,entry); |
151 r=TheFs.Entry(systestfile1,entry); |
151 test(r==KErrPermissionDenied); |
152 test_Value(r, r == KErrPermissionDenied); |
152 |
153 |
153 r=TheFs.SetEntry(systestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly); |
154 r=TheFs.SetEntry(systestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly); |
154 test(r==KErrPermissionDenied); |
155 test_Value(r, r == KErrPermissionDenied); |
155 |
156 |
156 r=TheFs.Delete(systestfile1); |
157 r=TheFs.Delete(systestfile1); |
157 test(r==KErrPermissionDenied); |
158 test_Value(r, r == KErrPermissionDenied); |
158 |
159 |
159 |
160 |
160 // DEF141257: Security Issue in File Server |
161 // DEF141257: Security Issue in File Server |
161 // Test that we can't access the system drive by preceding it with a dot character |
162 // Test that we can't access the system drive by preceding it with a dot character |
162 _LIT(KSystemPathDot, "?:\\.Sys\\"); |
163 _LIT(KSystemPathDot, "?:\\.Sys\\"); |
166 SysTestFileDot=KSystemPathDot; |
167 SysTestFileDot=KSystemPathDot; |
167 SysTestFileDot[0]=(TText)('A' + gTheDriveNum); |
168 SysTestFileDot[0]=(TText)('A' + gTheDriveNum); |
168 SysTestFileDot.Append(KFileSys); |
169 SysTestFileDot.Append(KFileSys); |
169 RFile file; |
170 RFile file; |
170 r = file.Replace(TheFs, SysTestFileDot, EFileWrite); |
171 r = file.Replace(TheFs, SysTestFileDot, EFileWrite); |
171 test(r==KErrPathNotFound); |
172 test_Value(r, r == KErrPathNotFound); |
172 |
173 |
173 // try creating a subst drive for "\.SYS"... |
174 // try creating a subst drive for "\.SYS"... |
174 TBuf<40> SysTestNameDot; |
175 TBuf<40> SysTestNameDot; |
175 SysTestNameDot=KSystemPathDot; |
176 SysTestNameDot=KSystemPathDot; |
176 SysTestNameDot[0]=(TText)('A' + gTheDriveNum); |
177 SysTestNameDot[0]=(TText)('A' + gTheDriveNum); |
177 r=TheFs.SetSubst(SysTestNameDot,EDriveA); |
178 r=TheFs.SetSubst(SysTestNameDot,EDriveA); |
178 test(r==KErrNone); |
179 test_KErrNone(r); |
179 |
180 |
180 // try creating a file using substituted drive... |
181 // try creating a file using substituted drive... |
181 TBuf<40> SubstTestFile = _L("A:\\"); |
182 TBuf<40> SubstTestFile = _L("A:\\"); |
182 SubstTestFile.Append(KFileSys); |
183 SubstTestFile.Append(KFileSys); |
183 |
184 |
184 r = file.Replace(TheFs, SubstTestFile, EFileWrite); |
185 r = file.Replace(TheFs, SubstTestFile, EFileWrite); |
185 test(r==KErrPathNotFound); |
186 test_Value(r, r == KErrPathNotFound); |
186 |
187 |
187 r = TheFs.SetSubst(_L(""),EDriveA); |
188 r = TheFs.SetSubst(_L(""),EDriveA); |
188 test(r==KErrNone); |
189 test_KErrNone(r); |
189 |
190 |
190 |
191 |
191 |
192 |
192 // try listing files in "\.SYS" |
193 // try listing files in "\.SYS" |
193 _LIT(KWildPathDot, "Z:\\.SYS\\"); |
194 _LIT(KWildPathDot, "Z:\\.SYS\\"); |
194 TFindFile finder(TheFs); |
195 TFindFile finder(TheFs); |
195 CDir* dir = NULL; |
196 CDir* dir = NULL; |
196 r=finder.FindWildByDir(KWildFile, KWildPathDot, dir); |
197 r=finder.FindWildByDir(KWildFile, KWildPathDot, dir); |
197 test(r==KErrNotFound); |
198 test_Value(r, r == KErrNotFound); |
198 delete dir; |
199 delete dir; |
199 |
200 |
200 // Deliberately create a directory called "\.SYS" |
201 // Deliberately create a directory called "\.SYS" |
201 // and verify shortname is NOT the same as "SYS" |
202 // and verify shortname is NOT the same as "SYS" |
202 mkdirname.Zero(); |
203 mkdirname.Zero(); |
203 mkdirname.Append(KSystemPathDot); |
204 mkdirname.Append(KSystemPathDot); |
204 mkdirname[0]=(TText)('A' + gTheDriveNum); |
205 mkdirname[0]=(TText)('A' + gTheDriveNum); |
205 r=TheFs.MkDirAll(mkdirname); |
206 r=TheFs.MkDirAll(mkdirname); |
206 test(r==KErrNone); |
207 test_KErrNone(r); |
207 |
208 |
208 r=TheFs.GetShortName(mkdirname, shortfilename); |
209 r=TheFs.GetShortName(mkdirname, shortfilename); |
209 test(r==KErrNone || r==KErrNotSupported); // short names not supported on LFFS |
210 test_Value(r, r == KErrNone || r==KErrNotSupported); // short names not supported on LFFS |
210 // r = shortfilename.Compare(_L("SYS~1")); |
211 // r = shortfilename.Compare(_L("SYS~1")); |
211 // test(r==KErrNone); |
212 // test_KErrNone(r); |
212 r = shortfilename.Compare(_L("SYS")); |
213 r = shortfilename.Compare(_L("SYS")); |
213 test (r != 0); |
214 test (r != 0); |
214 |
215 |
215 r = TheFs.RmDir(mkdirname); |
216 r = TheFs.RmDir(mkdirname); |
216 test(r==KErrNone); |
217 test_KErrNone(r); |
217 |
218 |
218 // Deliberately create a directory called "\..SYS" |
219 // Deliberately create a directory called "\..SYS" |
219 // and verify shortname is NOT the same as "SYS" |
220 // and verify shortname is NOT the same as "SYS" |
220 _LIT(KSystemPathDotDot, "?:\\..Sys\\"); |
221 _LIT(KSystemPathDotDot, "?:\\..Sys\\"); |
221 mkdirname.Zero(); |
222 mkdirname.Zero(); |
222 mkdirname.Append(KSystemPathDotDot); |
223 mkdirname.Append(KSystemPathDotDot); |
223 mkdirname[0]=(TText)('A' + gTheDriveNum); |
224 mkdirname[0]=(TText)('A' + gTheDriveNum); |
224 r=TheFs.MkDirAll(mkdirname); |
225 r=TheFs.MkDirAll(mkdirname); |
225 test(r==KErrNone); |
226 test_KErrNone(r); |
226 |
227 |
227 r=TheFs.GetShortName(mkdirname, shortfilename); |
228 r=TheFs.GetShortName(mkdirname, shortfilename); |
228 test(r==KErrNone || r==KErrNotSupported); // short names not supported on LFFS |
229 test_Value(r, r == KErrNone || r==KErrNotSupported); // short names not supported on LFFS |
229 // r = shortfilename.Compare(_L("_.SYS")); |
230 // r = shortfilename.Compare(_L("_.SYS")); |
230 // test(r==KErrNone); |
231 // test_KErrNone(r); |
231 r = shortfilename.Compare(_L("SYS")); |
232 r = shortfilename.Compare(_L("SYS")); |
232 test (r != 0); |
233 test (r != 0); |
233 |
234 |
234 r = TheFs.RmDir(mkdirname); |
235 r = TheFs.RmDir(mkdirname); |
235 test(r==KErrNone); |
236 test_KErrNone(r); |
236 } |
237 } |
237 |
238 |
238 |
239 |
239 LOCAL_C void resourceRFstest() |
240 LOCAL_C void resourceRFstest() |
240 // |
241 // |
247 |
248 |
248 mkdirname.Zero(); |
249 mkdirname.Zero(); |
249 mkdirname.Append(restestname); |
250 mkdirname.Append(restestname); |
250 mkdirname.Append(KMkDirSub); |
251 mkdirname.Append(KMkDirSub); |
251 r=TheFs.MkDirAll(mkdirname); |
252 r=TheFs.MkDirAll(mkdirname); |
252 test(r==KErrPermissionDenied); |
253 test_Value(r, r == KErrPermissionDenied); |
253 |
254 |
254 TheFs.RmDir(mkdirname); |
255 TheFs.RmDir(mkdirname); |
255 test(r==KErrPermissionDenied); |
256 test_Value(r, r == KErrPermissionDenied); |
256 |
257 |
257 // Change due to defect DEF099546 fix |
258 // Change due to defect DEF099546 fix |
258 // TCB capability is required for following operation. |
259 // TCB capability is required for following operation. |
259 r=TheFs.SetSubst(restestname,EDriveS); |
260 r=TheFs.SetSubst(restestname,EDriveS); |
260 //test(r==KErrNone); |
261 //test_KErrNone(r); |
261 test(r==KErrPermissionDenied); |
262 test_Value(r, r == KErrPermissionDenied); |
262 |
263 |
263 // SetSubst will fail. |
264 // SetSubst will fail. |
264 //r=TheFs.RealName(_L("S:\\File.XXX"),realName); |
265 //r=TheFs.RealName(_L("S:\\File.XXX"),realName); |
265 //test(r==KErrNone); |
266 //test_KErrNone(r); |
266 |
267 |
267 //r=TheFs.SetSubst(_L(""),EDriveS); |
268 //r=TheFs.SetSubst(_L(""),EDriveS); |
268 //test(r==KErrNone); |
269 //test_KErrNone(r); |
269 |
270 |
270 r=TheFs.SetSessionPath(restestname); |
271 r=TheFs.SetSessionPath(restestname); |
271 test(r==KErrNone); |
272 test_KErrNone(r); |
272 |
273 |
273 TheFs.NotifyChange(ENotifyAll,aStat4,restestname); |
274 TheFs.NotifyChange(ENotifyAll,aStat4,restestname); |
274 test(aStat4==KRequestPending); |
275 test(aStat4==KRequestPending); |
275 |
276 |
276 |
277 |
282 |
283 |
283 oldName=KOldFile; |
284 oldName=KOldFile; |
284 oldName[0]=(TText)gDriveToTest; |
285 oldName[0]=(TText)gDriveToTest; |
285 |
286 |
286 r=TheFs.GetShortName(restestfile, shortfilename); |
287 r=TheFs.GetShortName(restestfile, shortfilename); |
287 test(r==KErrNone || KErrPathNotFound); |
288 test(r == KErrNone || KErrPathNotFound); |
|
289 // test_Value(r, r == KErrNone || r == KErrPathNotFound); |
288 |
290 |
289 r=TheFs.GetLongName(restestfile1, longfilename); |
291 r=TheFs.GetLongName(restestfile1, longfilename); |
290 test(r==KErrNone || KErrPathNotFound); |
292 test(r == KErrNone || KErrPathNotFound); |
|
293 // test_Value(r, r == KErrNone || r == KErrPathNotFound); |
291 |
294 |
292 r=file1.Create(TheFs,oldName,EFileWrite); |
295 r=file1.Create(TheFs,oldName,EFileWrite); |
293 test(r==KErrNone || r==KErrAlreadyExists); |
296 test_Value(r, r == KErrNone || r==KErrAlreadyExists); |
294 file1.Close(); |
297 file1.Close(); |
295 |
298 |
296 r=TheFs.Replace(oldName,restestfile); |
299 r=TheFs.Replace(oldName,restestfile); |
297 test(r==KErrPermissionDenied); |
300 test_Value(r, r == KErrPermissionDenied); |
298 |
301 |
299 r=TheFs.Rename(restestfile,restestfile1); |
302 r=TheFs.Rename(restestfile,restestfile1); |
300 test(r==KErrPermissionDenied); |
303 test_Value(r, r == KErrPermissionDenied); |
301 |
304 |
302 r=TheFs.Entry(restestfile1,entry); |
305 r=TheFs.Entry(restestfile1,entry); |
303 test(r==KErrNone || KErrPathNotFound); |
306 test(r == KErrNone || KErrPathNotFound); |
|
307 // test_Value(r, r == KErrNone || r == KErrPathNotFound); |
304 |
308 |
305 r=TheFs.SetEntry(restestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly); |
309 r=TheFs.SetEntry(restestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly); |
306 test(r==KErrPermissionDenied); |
310 test_Value(r, r == KErrPermissionDenied); |
307 |
311 |
308 r=TheFs.Delete(restestfile1); |
312 r=TheFs.Delete(restestfile1); |
309 test(r==KErrPermissionDenied); |
313 test_Value(r, r == KErrPermissionDenied); |
310 } |
314 } |
311 |
315 |
312 |
316 |
313 LOCAL_C void privateFalseIDRFstest() |
317 LOCAL_C void privateFalseIDRFstest() |
314 // |
318 // |
345 |
349 |
346 oldName=KOldFile; |
350 oldName=KOldFile; |
347 oldName[0]=(TText)gDriveToTest; |
351 oldName[0]=(TText)gDriveToTest; |
348 |
352 |
349 r=TheFs.GetShortName(pritestfile, shortfilename); |
353 r=TheFs.GetShortName(pritestfile, shortfilename); |
350 test(r==KErrPermissionDenied); |
354 test_Value(r, r == KErrPermissionDenied); |
351 |
355 |
352 r=TheFs.GetLongName(pritestfile1, longfilename); |
356 r=TheFs.GetLongName(pritestfile1, longfilename); |
353 test(r==KErrPermissionDenied); |
357 test_Value(r, r == KErrPermissionDenied); |
354 |
358 |
355 r=file1.Create(TheFs,oldName,EFileWrite); |
359 r=file1.Create(TheFs,oldName,EFileWrite); |
356 test(r==KErrNone || r==KErrAlreadyExists); |
360 test_Value(r, r == KErrNone || r==KErrAlreadyExists); |
357 file1.Close(); |
361 file1.Close(); |
358 |
362 |
359 r=TheFs.Replace(oldName,pritestfile); |
363 r=TheFs.Replace(oldName,pritestfile); |
360 test(r==KErrPermissionDenied); |
364 test_Value(r, r == KErrPermissionDenied); |
361 |
365 |
362 r=TheFs.Rename(pritestfile,pritestfile1); |
366 r=TheFs.Rename(pritestfile,pritestfile1); |
363 test(r==KErrPermissionDenied); |
367 test_Value(r, r == KErrPermissionDenied); |
364 |
368 |
365 r=TheFs.Entry(pritestfile1,entry); |
369 r=TheFs.Entry(pritestfile1,entry); |
366 test(r==KErrPermissionDenied); |
370 test_Value(r, r == KErrPermissionDenied); |
367 |
371 |
368 r=TheFs.SetEntry(pritestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly); |
372 r=TheFs.SetEntry(pritestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly); |
369 test(r==KErrPermissionDenied); |
373 test_Value(r, r == KErrPermissionDenied); |
370 |
374 |
371 r=TheFs.Delete(pritestfile1); |
375 r=TheFs.Delete(pritestfile1); |
372 test(r==KErrPermissionDenied); |
376 test_Value(r, r == KErrPermissionDenied); |
373 |
377 |
374 } |
378 } |
375 |
379 |
376 |
380 |
377 |
381 |
411 |
415 |
412 oldName=KOldFile; |
416 oldName=KOldFile; |
413 oldName[0]=(TText)gDriveToTest; |
417 oldName[0]=(TText)gDriveToTest; |
414 |
418 |
415 r=TheFs.GetShortName(pritestfile, shortfilename); |
419 r=TheFs.GetShortName(pritestfile, shortfilename); |
416 test(r==KErrPermissionDenied); |
420 test_Value(r, r == KErrPermissionDenied); |
417 |
421 |
418 r=TheFs.GetLongName(pritestfile1, longfilename); |
422 r=TheFs.GetLongName(pritestfile1, longfilename); |
419 test(r==KErrPermissionDenied); |
423 test_Value(r, r == KErrPermissionDenied); |
420 |
424 |
421 r=file1.Create(TheFs,oldName,EFileWrite); |
425 r=file1.Create(TheFs,oldName,EFileWrite); |
422 test(r==KErrNone || r==KErrAlreadyExists); |
426 test_Value(r, r == KErrNone || r==KErrAlreadyExists); |
423 file1.Close(); |
427 file1.Close(); |
424 |
428 |
425 r=TheFs.Replace(oldName,pritestfile); |
429 r=TheFs.Replace(oldName,pritestfile); |
426 test(r==KErrPermissionDenied); |
430 test_Value(r, r == KErrPermissionDenied); |
427 |
431 |
428 r=TheFs.Rename(pritestfile,pritestfile1); |
432 r=TheFs.Rename(pritestfile,pritestfile1); |
429 test(r==KErrPermissionDenied); |
433 test_Value(r, r == KErrPermissionDenied); |
430 |
434 |
431 r=TheFs.Entry(pritestfile1,entry); |
435 r=TheFs.Entry(pritestfile1,entry); |
432 test(r==KErrPermissionDenied); |
436 test_Value(r, r == KErrPermissionDenied); |
433 |
437 |
434 r=TheFs.SetEntry(pritestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly); |
438 r=TheFs.SetEntry(pritestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly); |
435 test(r==KErrPermissionDenied); |
439 test_Value(r, r == KErrPermissionDenied); |
436 |
440 |
437 r=TheFs.Delete(pritestfile1); |
441 r=TheFs.Delete(pritestfile1); |
438 test(r==KErrPermissionDenied); |
442 test_Value(r, r == KErrPermissionDenied); |
439 |
443 |
440 } |
444 } |
441 |
445 |
442 |
446 |
443 LOCAL_C void privateSIDRFstest() |
447 LOCAL_C void privateSIDRFstest() |
481 |
485 |
482 oldName=KOldFile; |
486 oldName=KOldFile; |
483 oldName[0]=(TText)gDriveToTest; |
487 oldName[0]=(TText)gDriveToTest; |
484 |
488 |
485 r=TheFs.GetShortName(pritestfile, shortfilename); |
489 r=TheFs.GetShortName(pritestfile, shortfilename); |
486 test(r==KErrNone || KErrPathNotFound); |
490 test(r == KErrNone || KErrPathNotFound); |
|
491 // test_Value(r, r == KErrNone || r == KErrPathNotFound); |
487 |
492 |
488 r=TheFs.GetLongName(pritestfile1, longfilename); |
493 r=TheFs.GetLongName(pritestfile1, longfilename); |
489 test(r==KErrNone || KErrPathNotFound); |
494 test(r == KErrNone || KErrPathNotFound); |
|
495 // test_Value(r, r == KErrNone || r == KErrPathNotFound); |
490 |
496 |
491 r=file1.Create(TheFs,oldName,EFileWrite); |
497 r=file1.Create(TheFs,oldName,EFileWrite); |
492 test(r==KErrNone || r==KErrAlreadyExists); |
498 test_Value(r, r == KErrNone || r==KErrAlreadyExists); |
493 file1.Close(); |
499 file1.Close(); |
494 |
500 |
495 r=TheFs.Replace(oldName,pritestfile); |
501 r=TheFs.Replace(oldName,pritestfile); |
496 test(r==KErrNone); |
502 test_KErrNone(r); |
497 |
503 |
498 r=TheFs.Rename(pritestfile,pritestfile1); |
504 r=TheFs.Rename(pritestfile,pritestfile1); |
499 test(r==KErrNone || r==KErrAlreadyExists); |
505 test_Value(r, r == KErrNone || r==KErrAlreadyExists); |
500 |
506 |
501 r=TheFs.Entry(pritestfile1,entry); |
507 r=TheFs.Entry(pritestfile1,entry); |
502 test(r==KErrNone); |
508 test_KErrNone(r); |
503 |
509 |
504 r=TheFs.SetEntry(pritestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly); |
510 r=TheFs.SetEntry(pritestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly); |
505 test(r==KErrNone); |
511 test_KErrNone(r); |
506 |
512 |
507 r=TheFs.Delete(pritestfile1); |
513 r=TheFs.Delete(pritestfile1); |
508 test(r==KErrNone); |
514 test_KErrNone(r); |
509 } |
515 } |
510 |
516 |
511 LOCAL_C void systemRFiletest() |
517 LOCAL_C void systemRFiletest() |
512 // |
518 // |
513 // |
519 // |
514 // |
520 // |
515 { |
521 { |
516 //RFile testing with session path set to //system// |
522 //RFile testing with session path set to //system// |
517 |
523 |
518 r=TheFs.SetSessionPath(systestname); |
524 r=TheFs.SetSessionPath(systestname); |
519 test(r==KErrPermissionDenied); |
525 test_Value(r, r == KErrPermissionDenied); |
520 |
526 |
521 r=file1.Temp(TheFs,systestname,fromTemp,EFileWrite); |
527 r=file1.Temp(TheFs,systestname,fromTemp,EFileWrite); |
522 test(r==KErrPermissionDenied); |
528 test_Value(r, r == KErrPermissionDenied); |
523 |
529 |
524 TBuf<25> sysfilename; |
530 TBuf<25> sysfilename; |
525 sysfilename.Append(systestname); |
531 sysfilename.Append(systestname); |
526 sysfilename.Append(KFileSys); |
532 sysfilename.Append(KFileSys); |
527 r=file1.Create(TheFs,sysfilename,EFileWrite); |
533 r=file1.Create(TheFs,sysfilename,EFileWrite); |
528 test(r==KErrPermissionDenied); |
534 test_Value(r, r == KErrPermissionDenied); |
529 |
535 |
530 r=file1.Open(TheFs,sysfilename,EFileWrite); |
536 r=file1.Open(TheFs,sysfilename,EFileWrite); |
531 test(r==KErrPermissionDenied); |
537 test_Value(r, r == KErrPermissionDenied); |
532 |
538 |
533 r=file1.Open(TheFs,sysfilename,EFileRead); |
539 r=file1.Open(TheFs,sysfilename,EFileRead); |
534 test(r==KErrPermissionDenied); |
540 test_Value(r, r == KErrPermissionDenied); |
535 |
541 |
536 r=file1.Replace(TheFs,sysfilename,EFileWrite); |
542 r=file1.Replace(TheFs,sysfilename,EFileWrite); |
537 test(r==KErrPermissionDenied); |
543 test_Value(r, r == KErrPermissionDenied); |
538 |
544 |
539 TFindFile finder(TheFs); |
545 TFindFile finder(TheFs); |
540 CDir* dir = NULL; |
546 CDir* dir = NULL; |
541 r=finder.FindWildByDir(KWildFile, KWildPath, dir); |
547 r=finder.FindWildByDir(KWildFile, KWildPath, dir); |
542 if (!(r==KErrPermissionDenied)) |
548 if (!(r==KErrPermissionDenied)) |
543 test.Printf(_L("T_DCDISKADMIN: test find wildcards r = %d (expected KErrPermissionDenied)\n"), r); |
549 test.Printf(_L("T_DCDISKADMIN: test find wildcards r = %d (expected KErrPermissionDenied)\n"), r); |
544 test(r==KErrPermissionDenied); |
550 test_Value(r, r == KErrPermissionDenied); |
545 delete dir; |
551 delete dir; |
546 } |
552 } |
547 |
553 |
548 LOCAL_C void resourceRFiletest() |
554 LOCAL_C void resourceRFiletest() |
549 // |
555 // |
550 // |
556 // |
551 // |
557 // |
552 { |
558 { |
553 //RFile testing with session path set to //resource// |
559 //RFile testing with session path set to //resource// |
554 r=TheFs.SetSessionPath(restestname); |
560 r=TheFs.SetSessionPath(restestname); |
555 test(r==KErrNone); |
561 test_KErrNone(r); |
556 |
562 |
557 r=file1.Temp(TheFs,restestname,fromTemp,EFileWrite); |
563 r=file1.Temp(TheFs,restestname,fromTemp,EFileWrite); |
558 test(r==KErrPermissionDenied); |
564 test_Value(r, r == KErrPermissionDenied); |
559 file1.Close(); |
565 file1.Close(); |
560 |
566 |
561 r=file1.Create(TheFs,KFileRes,EFileWrite); |
567 r=file1.Create(TheFs,KFileRes,EFileWrite); |
562 test(r==KErrPermissionDenied); |
568 test_Value(r, r == KErrPermissionDenied); |
563 file1.Close(); |
569 file1.Close(); |
564 |
570 |
565 r=file1.Open(TheFs,KFileRes,EFileWrite); |
571 r=file1.Open(TheFs,KFileRes,EFileWrite); |
566 test(r==KErrPermissionDenied); |
572 test_Value(r, r == KErrPermissionDenied); |
567 file1.Close(); |
573 file1.Close(); |
568 |
574 |
569 r=file1.Open(TheFs,KFileRes,EFileRead|EFileShareReadersOnly); |
575 r=file1.Open(TheFs,KFileRes,EFileRead|EFileShareReadersOnly); |
570 test(r==KErrNone || r==KErrPathNotFound); |
576 test_Value(r, r == KErrNone || r==KErrPathNotFound); |
571 file1.Close(); |
577 file1.Close(); |
572 |
578 |
573 r=file1.Open(TheFs,KFileRes,EFileShareReadersOrWriters|EFileRead); |
579 r=file1.Open(TheFs,KFileRes,EFileShareReadersOrWriters|EFileRead); |
574 test(r==KErrNone || r==KErrPathNotFound); |
580 test_Value(r, r == KErrNone || r==KErrPathNotFound); |
575 file1.Close(); |
581 file1.Close(); |
576 |
582 |
577 r=file1.Open(TheFs,KFileRes,EFileShareReadersOrWriters|EFileWrite); |
583 r=file1.Open(TheFs,KFileRes,EFileShareReadersOrWriters|EFileWrite); |
578 test(r==KErrPermissionDenied); |
584 test_Value(r, r == KErrPermissionDenied); |
579 file1.Close(); |
585 file1.Close(); |
580 |
586 |
581 r=file1.Open(TheFs,KFileRes,EFileShareReadersOnly); |
587 r=file1.Open(TheFs,KFileRes,EFileShareReadersOnly); |
582 test(r==KErrNone); |
588 test_KErrNone(r); |
583 |
589 |
584 r=file1.ChangeMode(EFileShareExclusive); |
590 r=file1.ChangeMode(EFileShareExclusive); |
585 test(r==KErrNone); |
591 test_KErrNone(r); |
586 |
592 |
587 //this operation is prevented as you can not open a file for write access in the resource directory |
593 //this operation is prevented as you can not open a file for write access in the resource directory |
588 r=file1.Rename(KFileRes3); |
594 r=file1.Rename(KFileRes3); |
589 test(r==KErrPermissionDenied || r==KErrAccessDenied); |
595 test_Value(r, r == KErrPermissionDenied || r==KErrAccessDenied); |
590 file1.Close(); |
596 file1.Close(); |
591 |
597 |
592 r=file1.Replace(TheFs,KFileRes,EFileWrite); |
598 r=file1.Replace(TheFs,KFileRes,EFileWrite); |
593 test(r==KErrPermissionDenied); |
599 test_Value(r, r == KErrPermissionDenied); |
594 file1.Close(); |
600 file1.Close(); |
595 |
601 |
596 } |
602 } |
597 |
603 |
598 |
604 |
600 // |
606 // |
601 //RFile testing with session path set to //Private//falseID |
607 //RFile testing with session path set to //Private//falseID |
602 // |
608 // |
603 { |
609 { |
604 r=TheFs.SetSessionPath(pritestfalseidname); |
610 r=TheFs.SetSessionPath(pritestfalseidname); |
605 test(r==KErrPermissionDenied); |
611 test_Value(r, r == KErrPermissionDenied); |
606 |
612 |
607 r=file1.Temp(TheFs,pritestfalseidname,fromTemp,EFileWrite); |
613 r=file1.Temp(TheFs,pritestfalseidname,fromTemp,EFileWrite); |
608 test(r==KErrPermissionDenied); |
614 test_Value(r, r == KErrPermissionDenied); |
609 |
615 |
610 TBuf<25> prifilename; |
616 TBuf<25> prifilename; |
611 prifilename.Append(pritestname); |
617 prifilename.Append(pritestname); |
612 prifilename.Append(KFileSys); |
618 prifilename.Append(KFileSys); |
613 |
619 |
614 r=file1.Create(TheFs,prifilename,EFileWrite); |
620 r=file1.Create(TheFs,prifilename,EFileWrite); |
615 test(r==KErrPermissionDenied); |
621 test_Value(r, r == KErrPermissionDenied); |
616 |
622 |
617 r=file1.Open(TheFs,prifilename,EFileWrite); |
623 r=file1.Open(TheFs,prifilename,EFileWrite); |
618 test(r==KErrPermissionDenied); |
624 test_Value(r, r == KErrPermissionDenied); |
619 |
625 |
620 r=file1.Open(TheFs,prifilename,EFileRead); |
626 r=file1.Open(TheFs,prifilename,EFileRead); |
621 test(r==KErrPermissionDenied); |
627 test_Value(r, r == KErrPermissionDenied); |
622 |
628 |
623 r=file1.Replace(TheFs,prifilename,EFileWrite); |
629 r=file1.Replace(TheFs,prifilename,EFileWrite); |
624 test(r==KErrPermissionDenied); |
630 test_Value(r, r == KErrPermissionDenied); |
625 } |
631 } |
626 |
632 |
627 |
633 |
628 LOCAL_C void privateRFiletest() |
634 LOCAL_C void privateRFiletest() |
629 // |
635 // |
630 //RFile testing with session path set to //Private// |
636 //RFile testing with session path set to //Private// |
631 // |
637 // |
632 { |
638 { |
633 r=TheFs.SetSessionPath(pritestname); |
639 r=TheFs.SetSessionPath(pritestname); |
634 test(r==KErrPermissionDenied); |
640 test_Value(r, r == KErrPermissionDenied); |
635 |
641 |
636 r=file1.Temp(TheFs,pritestname,fromTemp,EFileWrite); |
642 r=file1.Temp(TheFs,pritestname,fromTemp,EFileWrite); |
637 test(r==KErrPermissionDenied); |
643 test_Value(r, r == KErrPermissionDenied); |
638 |
644 |
639 TBuf<25> prifilename; |
645 TBuf<25> prifilename; |
640 prifilename.Append(pritestname); |
646 prifilename.Append(pritestname); |
641 prifilename.Append(KFileSys); |
647 prifilename.Append(KFileSys); |
642 |
648 |
643 r=file1.Create(TheFs,prifilename,EFileWrite); |
649 r=file1.Create(TheFs,prifilename,EFileWrite); |
644 test(r==KErrPermissionDenied); |
650 test_Value(r, r == KErrPermissionDenied); |
645 |
651 |
646 r=file1.Open(TheFs,prifilename,EFileWrite); |
652 r=file1.Open(TheFs,prifilename,EFileWrite); |
647 test(r==KErrPermissionDenied); |
653 test_Value(r, r == KErrPermissionDenied); |
648 |
654 |
649 r=file1.Open(TheFs,prifilename,EFileRead); |
655 r=file1.Open(TheFs,prifilename,EFileRead); |
650 test(r==KErrPermissionDenied); |
656 test_Value(r, r == KErrPermissionDenied); |
651 |
657 |
652 r=file1.Replace(TheFs,prifilename,EFileWrite); |
658 r=file1.Replace(TheFs,prifilename,EFileWrite); |
653 test(r==KErrPermissionDenied); |
659 test_Value(r, r == KErrPermissionDenied); |
654 } |
660 } |
655 |
661 |
656 |
662 |
657 LOCAL_C void privateSIDRFiletest() |
663 LOCAL_C void privateSIDRFiletest() |
658 // |
664 // |
659 //Rfile Testing with session path set to //Private//UID// |
665 //Rfile Testing with session path set to //Private//UID// |
660 // |
666 // |
661 { |
667 { |
662 r=TheFs.SetSessionToPrivate(gTheDriveNum); |
668 r=TheFs.SetSessionToPrivate(gTheDriveNum); |
663 test(r==KErrNone); |
669 test_KErrNone(r); |
664 |
670 |
665 r=file1.Temp(TheFs,theprivatepath,fromTemp,EFileWrite); |
671 r=file1.Temp(TheFs,theprivatepath,fromTemp,EFileWrite); |
666 test(r==KErrNone); |
672 test_KErrNone(r); |
667 file1.Close(); |
673 file1.Close(); |
668 |
674 |
669 r=file1.Create(TheFs,KFilePri,EFileWrite); |
675 r=file1.Create(TheFs,KFilePri,EFileWrite); |
670 test(r==KErrNone || r==KErrAlreadyExists); |
676 test_Value(r, r == KErrNone || r==KErrAlreadyExists); |
671 file1.Close(); |
677 file1.Close(); |
672 |
678 |
673 r=file1.Open(TheFs,KFilePri,EFileWrite); |
679 r=file1.Open(TheFs,KFilePri,EFileWrite); |
674 test(r==KErrNone); |
680 test_KErrNone(r); |
675 file1.Close(); |
681 file1.Close(); |
676 |
682 |
677 r=file1.Open(TheFs,KFilePri,EFileRead); |
683 r=file1.Open(TheFs,KFilePri,EFileRead); |
678 test(r==KErrNone); |
684 test_KErrNone(r); |
679 file1.Close(); |
685 file1.Close(); |
680 |
686 |
681 r=file1.Replace(TheFs,KFilePri,EFileWrite); |
687 r=file1.Replace(TheFs,KFilePri,EFileWrite); |
682 test(r==KErrNone); |
688 test_KErrNone(r); |
683 |
689 |
684 r=file1.Rename(KFilePri3); |
690 r=file1.Rename(KFilePri3); |
685 test(r==KErrNone || r==KErrAlreadyExists); |
691 test_Value(r, r == KErrNone || r==KErrAlreadyExists); |
686 file1.Close(); |
692 file1.Close(); |
687 } |
693 } |
688 |
694 |
689 |
695 |
690 LOCAL_C void RDirtest() |
696 LOCAL_C void RDirtest() |
695 //system |
701 //system |
696 dirNameBuf.Zero(); |
702 dirNameBuf.Zero(); |
697 dirNameBuf = KSystemPath; |
703 dirNameBuf = KSystemPath; |
698 dirNameBuf[0]=(TText)gDriveToTest; |
704 dirNameBuf[0]=(TText)gDriveToTest; |
699 r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal); |
705 r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal); |
700 test(r==KErrPermissionDenied); |
706 test_Value(r, r == KErrPermissionDenied); |
701 dir.Close(); |
707 dir.Close(); |
702 r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries); |
708 r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries); |
703 test(r==KErrPermissionDenied); |
709 test_Value(r, r == KErrPermissionDenied); |
704 dirNameBuf.Zero(); |
710 dirNameBuf.Zero(); |
705 delete dirEntries; |
711 delete dirEntries; |
706 //Private//falseid |
712 //Private//falseid |
707 dirNameBuf=KPrivateFalseID; |
713 dirNameBuf=KPrivateFalseID; |
708 dirNameBuf[0]=(TText)gDriveToTest; |
714 dirNameBuf[0]=(TText)gDriveToTest; |
709 r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal); |
715 r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal); |
710 test(r==KErrPermissionDenied); |
716 test_Value(r, r == KErrPermissionDenied); |
711 dir.Close(); |
717 dir.Close(); |
712 r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries); |
718 r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries); |
713 test(r==KErrPermissionDenied); |
719 test_Value(r, r == KErrPermissionDenied); |
714 dirNameBuf.Zero(); |
720 dirNameBuf.Zero(); |
715 delete dirEntries; |
721 delete dirEntries; |
716 //Private |
722 //Private |
717 dirNameBuf=KPrivatePath; |
723 dirNameBuf=KPrivatePath; |
718 dirNameBuf[0]=(TText)gDriveToTest; |
724 dirNameBuf[0]=(TText)gDriveToTest; |
719 r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal); |
725 r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal); |
720 test(r==KErrPermissionDenied); |
726 test_Value(r, r == KErrPermissionDenied); |
721 dir.Close(); |
727 dir.Close(); |
722 r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries); |
728 r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries); |
723 test(r==KErrPermissionDenied); |
729 test_Value(r, r == KErrPermissionDenied); |
724 dirNameBuf.Zero(); |
730 dirNameBuf.Zero(); |
725 delete dirEntries; |
731 delete dirEntries; |
726 //Private/uid |
732 //Private/uid |
727 TheFs.PrivatePath(dirNameBuf); |
733 TheFs.PrivatePath(dirNameBuf); |
728 dirNameBuf.Insert(0,_L("?:")); |
734 dirNameBuf.Insert(0,_L("?:")); |
729 dirNameBuf[0]=(TText)gDriveToTest; |
735 dirNameBuf[0]=(TText)gDriveToTest; |
730 r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal); |
736 r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal); |
731 test(r==KErrNone); |
737 test_KErrNone(r); |
732 dir.Close(); |
738 dir.Close(); |
733 r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries); |
739 r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries); |
734 test(r==KErrNone); |
740 test_KErrNone(r); |
735 dirNameBuf.Zero(); |
741 dirNameBuf.Zero(); |
736 delete dirEntries; |
742 delete dirEntries; |
737 //Resource |
743 //Resource |
738 dirNameBuf=KResourcePath; |
744 dirNameBuf=KResourcePath; |
739 dirNameBuf[0]=(TText)gDriveToTest; |
745 dirNameBuf[0]=(TText)gDriveToTest; |
740 r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal); |
746 r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal); |
741 test(r==KErrNone || r==KErrPathNotFound || r==KErrNotFound); |
747 test_Value(r, r == KErrNone || r==KErrPathNotFound || r==KErrNotFound); |
742 r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries); |
748 r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries); |
743 test(r==KErrNone || r==KErrPathNotFound || r==KErrNotFound); |
749 test_Value(r, r == KErrNone || r==KErrPathNotFound || r==KErrNotFound); |
744 dir.Close(); |
750 dir.Close(); |
745 delete dirEntries; |
751 delete dirEntries; |
746 } |
752 } |
747 |
753 |
748 |
754 |
787 test(aStat1==KErrPermissionDenied); |
793 test(aStat1==KErrPermissionDenied); |
788 test(aStat2==KErrPermissionDenied); |
794 test(aStat2==KErrPermissionDenied); |
789 test(aStat3==KErrNone); |
795 test(aStat3==KErrNone); |
790 |
796 |
791 r=TheFs.SetSessionPath(systestname); |
797 r=TheFs.SetSessionPath(systestname); |
792 test(r==KErrPermissionDenied); |
798 test_Value(r, r == KErrPermissionDenied); |
793 |
799 |
794 //Test RRawDisk class |
800 //Test RRawDisk class |
795 r=rawdisk.Open(TheFs,gTheDriveNum); |
801 r=rawdisk.Open(TheFs,gTheDriveNum); |
796 test(r==KErrPermissionDenied); |
802 test_Value(r, r == KErrPermissionDenied); |
797 rawdisk.Close(); |
803 rawdisk.Close(); |
798 |
804 |
799 RDirtest(); |
805 RDirtest(); |
800 |
806 |
801 #ifdef __WINS__ |
807 #ifdef __WINS__ |
802 if (User::UpperCase(driveBuf[0]) != 'C') |
808 if (User::UpperCase(driveBuf[0]) != 'C') |
803 #endif |
809 #endif |
804 { |
810 { |
805 //Test RFormat class |
811 //Test RFormat class |
806 r=format.Open(TheFs,driveBuf,EHighDensity,count); |
812 r=format.Open(TheFs,driveBuf,EHighDensity,count); |
807 test(r==KErrNone); |
813 test_KErrNone(r); |
808 |
814 |
809 while(count) |
815 while(count) |
810 { |
816 { |
811 TInt r=format.Next(count); |
817 TInt r=format.Next(count); |
812 test(r==KErrNone); |
818 test_KErrNone(r); |
813 } |
819 } |
814 format.Close(); |
820 format.Close(); |
815 } |
821 } |
816 |
822 |
817 driveBuf[0]=(TText)gDriveToTest; |
823 driveBuf[0]=(TText)gDriveToTest; |
818 r=TheFs.ScanDrive(driveBuf); |
824 r=TheFs.ScanDrive(driveBuf); |
819 test(r==KErrNone || r==KErrNotSupported); |
825 test_Value(r, r == KErrNone || r==KErrNotSupported); |
820 r=TheFs.CheckDisk(driveBuf); |
826 r=TheFs.CheckDisk(driveBuf); |
821 test(r==KErrNone || r==KErrNotSupported); |
827 test_Value(r, r == KErrNone || r==KErrNotSupported); |
822 } |
828 } |
823 |
829 |
824 |
830 |
825 |
831 |
826 LOCAL_C void TestCaps() |
832 LOCAL_C void TestCaps() |