kerneltest/f32test/server/t_dcnone.cpp
changeset 109 b3a1d9898418
parent 0 a41df078684a
child 245 647ab20fee2e
equal deleted inserted replaced
102:ef2a444a7410 109:b3a1d9898418
    11 // Contributors:
    11 // Contributors:
    12 //
    12 //
    13 // Description:
    13 // Description:
    14 //
    14 //
    15 
    15 
       
    16 #define __E32TEST_EXTENSION__
    16 #include <f32file.h>
    17 #include <f32file.h>
    17 #include <e32test.h>
    18 #include <e32test.h>
    18 #include <e32std.h>
    19 #include <e32std.h>
    19 #include <e32std_private.h>
    20 #include <e32std_private.h>
    20 #include <e32def.h>
    21 #include <e32def.h>
   117 // This test case is brought in by INC054580
   118 // This test case is brought in by INC054580
   118 // (NTT Renaming sys ¨Cfolder on C -drive on H2 allows user to access sys -files)
   119 // (NTT Renaming sys ¨Cfolder on C -drive on H2 allows user to access sys -files)
   119 //
   120 //
   120     {
   121     {
   121     TInt r = TheFs.Rename(_L("\\sys"), _L("\\sysbad"));
   122     TInt r = TheFs.Rename(_L("\\sys"), _L("\\sysbad"));
   122     test(r == KErrPermissionDenied);
   123     test_Value(r, r == KErrPermissionDenied);
   123     r = TheFs.Rename(_L("\\resource"), _L("\\resourcebad"));
   124     r = TheFs.Rename(_L("\\resource"), _L("\\resourcebad"));
   124     test(r == KErrPermissionDenied);
   125     test_Value(r, r == KErrPermissionDenied);
   125     r = TheFs.Rename(_L("\\private"), _L("\\privatebad"));
   126     r = TheFs.Rename(_L("\\private"), _L("\\privatebad"));
   126     test(r == KErrPermissionDenied);
   127     test_Value(r, r == KErrPermissionDenied);
   127     }
   128     }
   128 
   129 
   129 LOCAL_C void systemRFstest()
   130 LOCAL_C void systemRFstest()
   130 //
   131 //
   131 //
   132 //
   136 	
   137 	
   137 	mkdirname.Zero();
   138 	mkdirname.Zero();
   138 	mkdirname.Append(systestname);
   139 	mkdirname.Append(systestname);
   139 	mkdirname.Append(KMkDirSub);
   140 	mkdirname.Append(KMkDirSub);
   140 	r=TheFs.MkDirAll(mkdirname);	
   141 	r=TheFs.MkDirAll(mkdirname);	
   141 	test(r==KErrPermissionDenied);
   142 	test_Value(r, r == KErrPermissionDenied);
   142 
   143 
   143 	r=TheFs.RmDir(mkdirname);	
   144 	r=TheFs.RmDir(mkdirname);	
   144 	test(r==KErrPermissionDenied);
   145 	test_Value(r, r == KErrPermissionDenied);
   145 
   146 
   146 	r=TheFs.SetSubst(systestname,EDriveP);
   147 	r=TheFs.SetSubst(systestname,EDriveP);
   147 	test(r==KErrPermissionDenied);
   148 	test_Value(r, r == KErrPermissionDenied);
   148 	
   149 	
   149 	r=TheFs.SetSessionPath(systestname);
   150 	r=TheFs.SetSessionPath(systestname);
   150 	test(r==KErrPermissionDenied);
   151 	test_Value(r, r == KErrPermissionDenied);
   151 
   152 
   152 	TheFs.NotifyChange(ENotifyAll,aStat1,systestname);
   153 	TheFs.NotifyChange(ENotifyAll,aStat1,systestname);
   153 	test(aStat1==KErrPermissionDenied);
   154 	test(aStat1==KErrPermissionDenied);
   154 
   155 
   155 	systestfile=KSystemPath;
   156 	systestfile=KSystemPath;
   160 	
   161 	
   161 	oldName=KOldFile;
   162 	oldName=KOldFile;
   162 	oldName[0]=(TText)gDriveToTest;
   163 	oldName[0]=(TText)gDriveToTest;
   163 
   164 
   164 	r=TheFs.GetShortName(systestfile, shortfilename);
   165 	r=TheFs.GetShortName(systestfile, shortfilename);
   165 	test(r==KErrPermissionDenied);
   166 	test_Value(r, r == KErrPermissionDenied);
   166 
   167 
   167 	r=TheFs.GetLongName(systestfile1, longfilename);
   168 	r=TheFs.GetLongName(systestfile1, longfilename);
   168 	test(r==KErrPermissionDenied);
   169 	test_Value(r, r == KErrPermissionDenied);
   169 
   170 
   170 	r=file1.Create(TheFs,oldName,EFileWrite);
   171 	r=file1.Create(TheFs,oldName,EFileWrite);
   171 	test(r==KErrNone || r==KErrAlreadyExists);
   172 	test_Value(r, r == KErrNone || r==KErrAlreadyExists);
   172 	file1.Close();
   173 	file1.Close();
   173 
   174 
   174 	r=TheFs.Replace(oldName,systestfile);
   175 	r=TheFs.Replace(oldName,systestfile);
   175 	test(r==KErrPermissionDenied);
   176 	test_Value(r, r == KErrPermissionDenied);
   176 	
   177 	
   177 	r=TheFs.Rename(systestfile,systestfile1);
   178 	r=TheFs.Rename(systestfile,systestfile1);
   178 	test(r==KErrPermissionDenied);
   179 	test_Value(r, r == KErrPermissionDenied);
   179 	
   180 	
   180 	// check that the entry for the system directory itself can be retrieved with no error
   181 	// check that the entry for the system directory itself can be retrieved with no error
   181 	// - with or without a slash
   182 	// - with or without a slash
   182 	TPtrC restrictedDir(systestname.Ptr(), systestname.Length());
   183 	TPtrC restrictedDir(systestname.Ptr(), systestname.Length());
   183 	r=TheFs.Entry(restrictedDir, entry);
   184 	r=TheFs.Entry(restrictedDir, entry);
   184 	test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDir, r);
   185 	test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDir, r);
   185 	test(r==KErrNone);
   186 	test_KErrNone(r);
   186 	test (entry.iAtt & KEntryAttDir);
   187 	test (entry.iAtt & KEntryAttDir);
   187 
   188 
   188 	TPtrC restrictedDirWithNoBackSlash(restrictedDir.Ptr(), restrictedDir.Length()-1);
   189 	TPtrC restrictedDirWithNoBackSlash(restrictedDir.Ptr(), restrictedDir.Length()-1);
   189 	r=TheFs.Entry(restrictedDirWithNoBackSlash,entry);
   190 	r=TheFs.Entry(restrictedDirWithNoBackSlash,entry);
   190 	test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDirWithNoBackSlash, r);
   191 	test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDirWithNoBackSlash, r);
   191 	test(r==KErrNone);
   192 	test_KErrNone(r);
   192 
   193 
   193 	r=TheFs.Entry(systestfile1,entry);
   194 	r=TheFs.Entry(systestfile1,entry);
   194 	test(r==KErrPermissionDenied);
   195 	test_Value(r, r == KErrPermissionDenied);
   195 	
   196 	
   196 	r=TheFs.SetEntry(systestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly);
   197 	r=TheFs.SetEntry(systestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly);
   197 	test(r==KErrPermissionDenied);
   198 	test_Value(r, r == KErrPermissionDenied);
   198 
   199 
   199 	r=TheFs.Delete(systestfile1);
   200 	r=TheFs.Delete(systestfile1);
   200 	test(r==KErrPermissionDenied);
   201 	test_Value(r, r == KErrPermissionDenied);
   201 
   202 
   202 	}
   203 	}
   203 
   204 
   204 
   205 
   205 LOCAL_C void resourceRFstest()
   206 LOCAL_C void resourceRFstest()
   213 	
   214 	
   214 	mkdirname.Zero();
   215 	mkdirname.Zero();
   215 	mkdirname.Append(restestname);
   216 	mkdirname.Append(restestname);
   216 	mkdirname.Append(KMkDirSub);
   217 	mkdirname.Append(KMkDirSub);
   217 	r=TheFs.MkDirAll(mkdirname);	
   218 	r=TheFs.MkDirAll(mkdirname);	
   218 	test(r==KErrPermissionDenied);
   219 	test_Value(r, r == KErrPermissionDenied);
   219 
   220 
   220 	TheFs.RmDir(mkdirname);
   221 	TheFs.RmDir(mkdirname);
   221 	test(r==KErrPermissionDenied);
   222 	test_Value(r, r == KErrPermissionDenied);
   222 
   223 
   223 	r=TheFs.SetSubst(restestname,EDriveP);
   224 	r=TheFs.SetSubst(restestname,EDriveP);
   224 	test(r==KErrPermissionDenied);
   225 	test_Value(r, r == KErrPermissionDenied);
   225 	
   226 	
   226 	r=TheFs.RealName(_L("P:\\File.XXX"),realName);
   227 	r=TheFs.RealName(_L("P:\\File.XXX"),realName);
   227 	test(r==KErrNone);
   228 	test_KErrNone(r);
   228 
   229 
   229 	r=TheFs.SetSessionPath(restestname);
   230 	r=TheFs.SetSessionPath(restestname);
   230 	test(r==KErrNone);
   231 	test_KErrNone(r);
   231 	
   232 	
   232 	TheFs.NotifyChange(ENotifyAll,aStat4,restestname);
   233 	TheFs.NotifyChange(ENotifyAll,aStat4,restestname);
   233 	test(aStat4==KRequestPending);
   234 	test(aStat4==KRequestPending);
   234 
   235 
   235 
   236 
   241 	
   242 	
   242 	oldName=KOldFile;
   243 	oldName=KOldFile;
   243 	oldName[0]=(TText)gDriveToTest;
   244 	oldName[0]=(TText)gDriveToTest;
   244 
   245 
   245 	r=TheFs.GetShortName(restestfile, shortfilename);
   246 	r=TheFs.GetShortName(restestfile, shortfilename);
   246 	test(r==KErrNone || KErrPathNotFound);
   247 //	test_Value(r, r == KErrNone || r == KErrPathNotFound);
       
   248 	test(r == KErrNone || KErrPathNotFound);
   247 
   249 
   248 	r=TheFs.GetLongName(restestfile1, longfilename);
   250 	r=TheFs.GetLongName(restestfile1, longfilename);
   249 	test(r==KErrNone || KErrPathNotFound);
   251 //	test_Value(r, r == KErrNone || r == KErrPathNotFound);
       
   252 	test(r == KErrNone || KErrPathNotFound);
   250 
   253 
   251 	r=file1.Create(TheFs,oldName,EFileWrite);
   254 	r=file1.Create(TheFs,oldName,EFileWrite);
   252 	test(r==KErrNone || r==KErrAlreadyExists);
   255 	test_Value(r, r == KErrNone || r==KErrAlreadyExists);
   253 	file1.Close();
   256 	file1.Close();
   254 
   257 
   255 	r=TheFs.Replace(oldName,restestfile);
   258 	r=TheFs.Replace(oldName,restestfile);
   256 	test(r==KErrPermissionDenied);
   259 	test_Value(r, r == KErrPermissionDenied);
   257 	
   260 	
   258 	r=TheFs.Rename(restestfile,restestfile1);
   261 	r=TheFs.Rename(restestfile,restestfile1);
   259 	test(r==KErrPermissionDenied);
   262 	test_Value(r, r == KErrPermissionDenied);
   260 	
   263 	
   261 	// check that the entry for the resource directory itself can be retrieved with no error
   264 	// check that the entry for the resource directory itself can be retrieved with no error
   262 	// - with or without a slash
   265 	// - with or without a slash
   263 	TPtrC restrictedDir(restestname.Ptr(), restestname.Length());
   266 	TPtrC restrictedDir(restestname.Ptr(), restestname.Length());
   264 	r=TheFs.Entry(restrictedDir, entry);
   267 	r=TheFs.Entry(restrictedDir, entry);
   265 	test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDir, r);
   268 	test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDir, r);
   266 	test(r==KErrNone);
   269 	test_KErrNone(r);
   267 	test (entry.iAtt & KEntryAttDir);
   270 	test (entry.iAtt & KEntryAttDir);
   268 
   271 
   269 	TPtrC restrictedDirWithNoBackSlash(restrictedDir.Ptr(), restrictedDir.Length()-1);
   272 	TPtrC restrictedDirWithNoBackSlash(restrictedDir.Ptr(), restrictedDir.Length()-1);
   270 	r=TheFs.Entry(restrictedDirWithNoBackSlash,entry);
   273 	r=TheFs.Entry(restrictedDirWithNoBackSlash,entry);
   271 	test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDirWithNoBackSlash, r);
   274 	test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDirWithNoBackSlash, r);
   272 	test(r==KErrNone);
   275 	test_KErrNone(r);
   273 
   276 
   274 	r=TheFs.Entry(restestfile1,entry);
   277 	r=TheFs.Entry(restestfile1,entry);
   275 	test(r==KErrNone || r==KErrNotFound);
   278 	test_Value(r, r == KErrNone || r==KErrNotFound);
   276 
   279 
   277 	r=TheFs.SetEntry(restestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly);
   280 	r=TheFs.SetEntry(restestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly);
   278 	test(r==KErrPermissionDenied);
   281 	test_Value(r, r == KErrPermissionDenied);
   279 
   282 
   280 	r=TheFs.Delete(restestfile1);
   283 	r=TheFs.Delete(restestfile1);
   281 	test(r==KErrPermissionDenied);
   284 	test_Value(r, r == KErrPermissionDenied);
   282 
   285 
   283 	}
   286 	}
   284 
   287 
   285 
   288 
   286 LOCAL_C void privatefalseIDRFstest()
   289 LOCAL_C void privatefalseIDRFstest()
   294 	mkdirname.Zero();
   297 	mkdirname.Zero();
   295 	mkdirname.Append(pritestfalseidname);
   298 	mkdirname.Append(pritestfalseidname);
   296 	mkdirname.Append(KMkDirSub);
   299 	mkdirname.Append(KMkDirSub);
   297 
   300 
   298 	r=TheFs.MkDirAll(mkdirname);	
   301 	r=TheFs.MkDirAll(mkdirname);	
   299 	test(r==KErrPermissionDenied);
   302 	test_Value(r, r == KErrPermissionDenied);
   300 
   303 
   301 	r=TheFs.RmDir(mkdirname);	
   304 	r=TheFs.RmDir(mkdirname);	
   302 	test(r==KErrPermissionDenied);
   305 	test_Value(r, r == KErrPermissionDenied);
   303 
   306 
   304 	r=TheFs.SetSubst(pritestfalseidname,EDriveP);
   307 	r=TheFs.SetSubst(pritestfalseidname,EDriveP);
   305 	test(r==KErrPermissionDenied); 
   308 	test_Value(r, r == KErrPermissionDenied); 
   306 
   309 
   307 	TheFs.NotifyChange(ENotifyAll,aStat2,pritestfalseidname);
   310 	TheFs.NotifyChange(ENotifyAll,aStat2,pritestfalseidname);
   308 	test(aStat2==KErrPermissionDenied);
   311 	test(aStat2==KErrPermissionDenied);
   309 
   312 
   310 
   313 
   316 	
   319 	
   317 	oldName=KOldFile;
   320 	oldName=KOldFile;
   318 	oldName[0]=(TText)gDriveToTest;
   321 	oldName[0]=(TText)gDriveToTest;
   319 
   322 
   320 	r=TheFs.GetShortName(pritestfile, shortfilename);
   323 	r=TheFs.GetShortName(pritestfile, shortfilename);
   321 	test(r==KErrPermissionDenied);
   324 	test_Value(r, r == KErrPermissionDenied);
   322 
   325 
   323 	r=TheFs.GetLongName(pritestfile1, longfilename);
   326 	r=TheFs.GetLongName(pritestfile1, longfilename);
   324 	test(r==KErrPermissionDenied);
   327 	test_Value(r, r == KErrPermissionDenied);
   325 
   328 
   326 	r=file1.Create(TheFs,oldName,EFileWrite);
   329 	r=file1.Create(TheFs,oldName,EFileWrite);
   327 	test(r==KErrNone || r==KErrAlreadyExists);
   330 	test_Value(r, r == KErrNone || r==KErrAlreadyExists);
   328 	file1.Close();
   331 	file1.Close();
   329 
   332 
   330 	r=TheFs.Replace(oldName,pritestfile);
   333 	r=TheFs.Replace(oldName,pritestfile);
   331 	test(r==KErrPermissionDenied);
   334 	test_Value(r, r == KErrPermissionDenied);
   332 	
   335 	
   333 	r=TheFs.Rename(pritestfile,pritestfile1);
   336 	r=TheFs.Rename(pritestfile,pritestfile1);
   334 	test(r==KErrPermissionDenied);
   337 	test_Value(r, r == KErrPermissionDenied);
   335 	
   338 	
   336 	r=TheFs.Entry(pritestfile1,entry);
   339 	r=TheFs.Entry(pritestfile1,entry);
   337 	test(r==KErrPermissionDenied);
   340 	test_Value(r, r == KErrPermissionDenied);
   338 
   341 
   339 	r=TheFs.SetEntry(pritestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly);
   342 	r=TheFs.SetEntry(pritestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly);
   340 	test(r==KErrPermissionDenied);
   343 	test_Value(r, r == KErrPermissionDenied);
   341 
   344 
   342 	r=TheFs.Delete(pritestfile1);
   345 	r=TheFs.Delete(pritestfile1);
   343 	test(r==KErrPermissionDenied);
   346 	test_Value(r, r == KErrPermissionDenied);
   344 
   347 
   345 	}
   348 	}
   346 
   349 
   347 
   350 
   348 
   351 
   357 	mkdirname.Zero();
   360 	mkdirname.Zero();
   358 	mkdirname.Append(pritestname);
   361 	mkdirname.Append(pritestname);
   359 	mkdirname.Append(KMkDirSub);
   362 	mkdirname.Append(KMkDirSub);
   360 
   363 
   361 	r=TheFs.MkDirAll(mkdirname);	
   364 	r=TheFs.MkDirAll(mkdirname);	
   362 	test(r==KErrPermissionDenied);
   365 	test_Value(r, r == KErrPermissionDenied);
   363 
   366 
   364 	r=TheFs.RmDir(mkdirname);	
   367 	r=TheFs.RmDir(mkdirname);	
   365 	test(r==KErrPermissionDenied);
   368 	test_Value(r, r == KErrPermissionDenied);
   366 
   369 
   367 	r=TheFs.SetSubst(pritestname,EDriveP);
   370 	r=TheFs.SetSubst(pritestname,EDriveP);
   368 	test(r==KErrPermissionDenied); 
   371 	test_Value(r, r == KErrPermissionDenied); 
   369 
   372 
   370 	TheFs.NotifyChange(ENotifyAll,aStat2,pritestname);
   373 	TheFs.NotifyChange(ENotifyAll,aStat2,pritestname);
   371 	test(aStat2==KErrPermissionDenied);
   374 	test(aStat2==KErrPermissionDenied);
   372 
   375 
   373 
   376 
   379 	
   382 	
   380 	oldName=KOldFile;
   383 	oldName=KOldFile;
   381 	oldName[0]=(TText)gDriveToTest;
   384 	oldName[0]=(TText)gDriveToTest;
   382 
   385 
   383 	r=TheFs.GetShortName(pritestfile, shortfilename);
   386 	r=TheFs.GetShortName(pritestfile, shortfilename);
   384 	test(r==KErrPermissionDenied);
   387 	test_Value(r, r == KErrPermissionDenied);
   385 
   388 
   386 	r=TheFs.GetLongName(pritestfile1, longfilename);
   389 	r=TheFs.GetLongName(pritestfile1, longfilename);
   387 	test(r==KErrPermissionDenied);
   390 	test_Value(r, r == KErrPermissionDenied);
   388 
   391 
   389 	r=file1.Create(TheFs,oldName,EFileWrite);
   392 	r=file1.Create(TheFs,oldName,EFileWrite);
   390 	test(r==KErrNone || r==KErrAlreadyExists);
   393 	test_Value(r, r == KErrNone || r==KErrAlreadyExists);
   391 	file1.Close();
   394 	file1.Close();
   392 
   395 
   393 	r=TheFs.Replace(oldName,pritestfile);
   396 	r=TheFs.Replace(oldName,pritestfile);
   394 	test(r==KErrPermissionDenied);
   397 	test_Value(r, r == KErrPermissionDenied);
   395 	
   398 	
   396 	r=TheFs.Rename(pritestfile,pritestfile1);
   399 	r=TheFs.Rename(pritestfile,pritestfile1);
   397 	test(r==KErrPermissionDenied);
   400 	test_Value(r, r == KErrPermissionDenied);
   398 	
   401 	
   399 	r=TheFs.Entry(pritestfile1,entry);
   402 	r=TheFs.Entry(pritestfile1,entry);
   400 	test(r==KErrPermissionDenied);
   403 	test_Value(r, r == KErrPermissionDenied);
   401 
   404 
   402 	// check that the entry for the private directory itself can be retrieved with no error
   405 	// check that the entry for the private directory itself can be retrieved with no error
   403 	// - with or without a slash
   406 	// - with or without a slash
   404 	TPtrC restrictedDir(pritestname.Ptr(), pritestname.Length());
   407 	TPtrC restrictedDir(pritestname.Ptr(), pritestname.Length());
   405 	r=TheFs.Entry(restrictedDir, entry);
   408 	r=TheFs.Entry(restrictedDir, entry);
   406 	test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDir, r);
   409 	test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDir, r);
   407 	test(r==KErrNone);
   410 	test_KErrNone(r);
   408 	test (entry.iAtt & KEntryAttDir);
   411 	test (entry.iAtt & KEntryAttDir);
   409 
   412 
   410 	TPtrC restrictedDirWithNoBackSlash(restrictedDir.Ptr(), restrictedDir.Length()-1);
   413 	TPtrC restrictedDirWithNoBackSlash(restrictedDir.Ptr(), restrictedDir.Length()-1);
   411 	r=TheFs.Entry(restrictedDirWithNoBackSlash,entry);
   414 	r=TheFs.Entry(restrictedDirWithNoBackSlash,entry);
   412 	test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDirWithNoBackSlash, r);
   415 	test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDirWithNoBackSlash, r);
   413 	test(r==KErrNone);
   416 	test_KErrNone(r);
   414 
   417 
   415 	r=TheFs.SetEntry(pritestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly);
   418 	r=TheFs.SetEntry(pritestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly);
   416 	test(r==KErrPermissionDenied);
   419 	test_Value(r, r == KErrPermissionDenied);
   417 
   420 
   418 	r=TheFs.Delete(pritestfile1);
   421 	r=TheFs.Delete(pritestfile1);
   419 	test(r==KErrPermissionDenied);
   422 	test_Value(r, r == KErrPermissionDenied);
   420 
   423 
   421 	}
   424 	}
   422 
   425 
   423 
   426 
   424 LOCAL_C void privateSIDRFstest()
   427 LOCAL_C void privateSIDRFstest()
   431 
   434 
   432 	mkdirname.Zero();
   435 	mkdirname.Zero();
   433 	mkdirname.Append(theprivatepath);
   436 	mkdirname.Append(theprivatepath);
   434 	mkdirname.Append(KMkDirSub);
   437 	mkdirname.Append(KMkDirSub);
   435 	r=TheFs.MkDirAll(mkdirname);	
   438 	r=TheFs.MkDirAll(mkdirname);	
   436 	test(r==KErrNone);
   439 	test_KErrNone(r);
   437 
   440 
   438 	r=TheFs.RmDir(mkdirname);	
   441 	r=TheFs.RmDir(mkdirname);	
   439 	test(r==KErrNone);
   442 	test_KErrNone(r);
   440 
   443 
   441 	r=TheFs.SetSubst(theprivatepath,EDriveP);	
   444 	r=TheFs.SetSubst(theprivatepath,EDriveP);	
   442 	test(r==KErrPermissionDenied);
   445 	test_Value(r, r == KErrPermissionDenied);
   443 
   446 
   444 	r=TheFs.RealName(_L("P:\\File.XXX"),realName);
   447 	r=TheFs.RealName(_L("P:\\File.XXX"),realName);
   445 	test(r==KErrNone);
   448 	test_KErrNone(r);
   446 	
   449 	
   447 	r=TheFs.SetSessionPath(theprivatepath);
   450 	r=TheFs.SetSessionPath(theprivatepath);
   448 	test(r==KErrNone);
   451 	test_KErrNone(r);
   449 
   452 
   450 	TheFs.NotifyChange(ENotifyAll,aStat3,theprivatepath);
   453 	TheFs.NotifyChange(ENotifyAll,aStat3,theprivatepath);
   451 	test(aStat3==KRequestPending);
   454 	test(aStat3==KRequestPending);
   452 
   455 
   453 
   456 
   459 	
   462 	
   460 	oldName=KOldFile;
   463 	oldName=KOldFile;
   461 	oldName[0]=(TText)gDriveToTest;
   464 	oldName[0]=(TText)gDriveToTest;
   462 
   465 
   463 	r=TheFs.GetShortName(pritestfile, shortfilename);
   466 	r=TheFs.GetShortName(pritestfile, shortfilename);
   464 	test(r==KErrNone || KErrPathNotFound);
   467 //	test_Value(r, r == KErrNone || r == KErrPathNotFound);
       
   468 	test(r == KErrNone || KErrPathNotFound);
   465 
   469 
   466 	r=TheFs.GetLongName(pritestfile1, longfilename);
   470 	r=TheFs.GetLongName(pritestfile1, longfilename);
   467 	test(r==KErrNone || KErrPathNotFound);
   471 //	test_Value(r, r == KErrNone || r == KErrPathNotFound);
       
   472 	test(r == KErrNone || KErrPathNotFound);
   468 
   473 
   469 	r=file1.Create(TheFs,oldName,EFileWrite);
   474 	r=file1.Create(TheFs,oldName,EFileWrite);
   470 	test(r==KErrNone || r==KErrAlreadyExists);
   475 	test_Value(r, r == KErrNone || r==KErrAlreadyExists);
   471 	file1.Close();
   476 	file1.Close();
   472 
   477 
   473 	r=TheFs.Replace(oldName,pritestfile);
   478 	r=TheFs.Replace(oldName,pritestfile);
   474 	test(r==KErrNone);
   479 	test_KErrNone(r);
   475 	
   480 	
   476 	r=TheFs.Rename(pritestfile,pritestfile1);
   481 	r=TheFs.Rename(pritestfile,pritestfile1);
   477 	test(r==KErrNone || r==KErrAlreadyExists);
   482 	test_Value(r, r == KErrNone || r==KErrAlreadyExists);
   478 	
   483 	
   479 	r=TheFs.Entry(pritestfile1,entry);
   484 	r=TheFs.Entry(pritestfile1,entry);
   480 	test(r==KErrNone);
   485 	test_KErrNone(r);
   481 
   486 
   482 	//Test Entry with correct SID
   487 	//Test Entry with correct SID
   483 	r=TheFs.Entry(theprivatepath,entry);
   488 	r=TheFs.Entry(theprivatepath,entry);
   484 	test(r==KErrNone);
   489 	test_KErrNone(r);
   485 	
   490 	
   486 	//Test Entry with correct SID and without "//" appended
   491 	//Test Entry with correct SID and without "//" appended
   487 	r=TheFs.Entry(KPrivatePathTest1,entry);
   492 	r=TheFs.Entry(KPrivatePathTest1,entry);
   488 	test(r==KErrNone);
   493 	test_KErrNone(r);
   489 	
   494 	
   490 	//Test Entry with invalid SID, without // appended
   495 	//Test Entry with invalid SID, without // appended
   491 	r=TheFs.Entry(KPrivatePathTest2,entry);
   496 	r=TheFs.Entry(KPrivatePathTest2,entry);
   492 	test(r==KErrPermissionDenied);
   497 	test_Value(r, r == KErrPermissionDenied);
   493 	
   498 	
   494 	//Test Entry with invalid SID
   499 	//Test Entry with invalid SID
   495 	r=TheFs.Entry(KPrivatePathTest3,entry);
   500 	r=TheFs.Entry(KPrivatePathTest3,entry);
   496 	test(r==KErrPermissionDenied);
   501 	test_Value(r, r == KErrPermissionDenied);
   497 
   502 
   498 	r=TheFs.SetEntry(pritestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly);
   503 	r=TheFs.SetEntry(pritestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly);
   499 	test(r==KErrNone);
   504 	test_KErrNone(r);
   500 
   505 
   501 	r=TheFs.Delete(pritestfile1);
   506 	r=TheFs.Delete(pritestfile1);
   502 	test(r==KErrNone);
   507 	test_KErrNone(r);
   503 
   508 
   504 	}
   509 	}
   505 
   510 
   506 
   511 
   507 LOCAL_C void systemRFiletest()
   512 LOCAL_C void systemRFiletest()
   508 //
   513 //
   509 //
   514 //
   510 //
   515 //
   511 	{
   516 	{
   512 	r=TheFs.SetSessionPath(systestname);
   517 	r=TheFs.SetSessionPath(systestname);
   513 	test(r==KErrPermissionDenied);
   518 	test_Value(r, r == KErrPermissionDenied);
   514 
   519 
   515 	r=file1.Temp(TheFs,systestname,fromTemp,EFileWrite);
   520 	r=file1.Temp(TheFs,systestname,fromTemp,EFileWrite);
   516 	test(r==KErrPermissionDenied);
   521 	test_Value(r, r == KErrPermissionDenied);
   517 
   522 
   518 
   523 
   519 	TBuf<25> sysfilename;
   524 	TBuf<25> sysfilename;
   520 	sysfilename.Append(systestname);
   525 	sysfilename.Append(systestname);
   521 	sysfilename.Append(KFileSys);
   526 	sysfilename.Append(KFileSys);
   522 
   527 
   523 	r=file1.Create(TheFs,sysfilename,EFileWrite);
   528 	r=file1.Create(TheFs,sysfilename,EFileWrite);
   524 	test(r==KErrPermissionDenied);
   529 	test_Value(r, r == KErrPermissionDenied);
   525 
   530 
   526 	r=file1.Open(TheFs,sysfilename,EFileWrite);
   531 	r=file1.Open(TheFs,sysfilename,EFileWrite);
   527 	test(r==KErrPermissionDenied);
   532 	test_Value(r, r == KErrPermissionDenied);
   528 	
   533 	
   529 	r=file1.Open(TheFs,sysfilename,EFileRead);
   534 	r=file1.Open(TheFs,sysfilename,EFileRead);
   530 	test(r==KErrPermissionDenied);
   535 	test_Value(r, r == KErrPermissionDenied);
   531 	
   536 	
   532 	r=file1.Replace(TheFs,sysfilename,EFileWrite);
   537 	r=file1.Replace(TheFs,sysfilename,EFileWrite);
   533 	test(r==KErrPermissionDenied);
   538 	test_Value(r, r == KErrPermissionDenied);
   534 
   539 
   535 	TFindFile finder(TheFs);
   540 	TFindFile finder(TheFs);
   536 	CDir* dir = NULL;
   541 	CDir* dir = NULL;
   537 	r=finder.FindWildByDir(KWildFile, KWildPath, dir);
   542 	r=finder.FindWildByDir(KWildFile, KWildPath, dir);
   538 	if (!(r==KErrPermissionDenied))
   543 	if (!(r==KErrPermissionDenied))
   539 		test.Printf(_L("T_DCNONE: test find wildcards r = %d (expected KErrPermissionDenied)\n"), r);
   544 		test.Printf(_L("T_DCNONE: test find wildcards r = %d (expected KErrPermissionDenied)\n"), r);
   540 	test(r==KErrPermissionDenied);
   545 	test_Value(r, r == KErrPermissionDenied);
   541 	delete dir;
   546 	delete dir;
   542 	}
   547 	}
   543 
   548 
   544 LOCAL_C void resourceRFiletest()
   549 LOCAL_C void resourceRFiletest()
   545 //
   550 //
   546 //
   551 //
   547 //
   552 //
   548 	{
   553 	{
   549 	r=TheFs.SetSessionPath(restestname);
   554 	r=TheFs.SetSessionPath(restestname);
   550 	test(r==KErrNone);
   555 	test_KErrNone(r);
   551 
   556 
   552 	r=file1.Temp(TheFs,restestname,fromTemp,EFileWrite);
   557 	r=file1.Temp(TheFs,restestname,fromTemp,EFileWrite);
   553 	test(r==KErrPermissionDenied);
   558 	test_Value(r, r == KErrPermissionDenied);
   554 	file1.Close();
   559 	file1.Close();
   555 
   560 
   556 	r=file1.Create(TheFs,KFileRes,EFileWrite);
   561 	r=file1.Create(TheFs,KFileRes,EFileWrite);
   557 	test(r==KErrPermissionDenied);
   562 	test_Value(r, r == KErrPermissionDenied);
   558 	file1.Close();
   563 	file1.Close();
   559 
   564 
   560 	r=file1.Open(TheFs,KFileRes,EFileWrite);
   565 	r=file1.Open(TheFs,KFileRes,EFileWrite);
   561 	test(r==KErrPermissionDenied);
   566 	test_Value(r, r == KErrPermissionDenied);
   562 	file1.Close();
   567 	file1.Close();
   563 
   568 
   564 	r=file1.Open(TheFs,KFileRes,EFileRead|EFileShareReadersOnly);
   569 	r=file1.Open(TheFs,KFileRes,EFileRead|EFileShareReadersOnly);
   565 	test(r==KErrNone || r==KErrPathNotFound);
   570 	test_Value(r, r == KErrNone || r==KErrPathNotFound);
   566 	file1.Close();
   571 	file1.Close();
   567 
   572 
   568 	r=file1.Open(TheFs,KFileRes,EFileShareReadersOrWriters|EFileRead);
   573 	r=file1.Open(TheFs,KFileRes,EFileShareReadersOrWriters|EFileRead);
   569 	test(r==KErrNone || r==KErrPathNotFound);
   574 	test_Value(r, r == KErrNone || r==KErrPathNotFound);
   570 	file1.Close();
   575 	file1.Close();
   571 
   576 
   572 	r=file1.Open(TheFs,KFileRes,EFileShareReadersOrWriters|EFileWrite);
   577 	r=file1.Open(TheFs,KFileRes,EFileShareReadersOrWriters|EFileWrite);
   573 	test(r==KErrPermissionDenied);
   578 	test_Value(r, r == KErrPermissionDenied);
   574 	file1.Close();
   579 	file1.Close();
   575 
   580 
   576 	r=file1.Open(TheFs,KFileRes,EFileShareReadersOnly);
   581 	r=file1.Open(TheFs,KFileRes,EFileShareReadersOnly);
   577 	test(r==KErrNone || r==KErrPathNotFound);
   582 	test_Value(r, r == KErrNone || r==KErrPathNotFound);
   578 
   583 
   579 	r=file1.ChangeMode(EFileShareExclusive);	//this is not illegal though will prevent shared access to resource which is nit my fault but may be desirable to prevent
   584 	r=file1.ChangeMode(EFileShareExclusive);	//this is not illegal though will prevent shared access to resource which is nit my fault but may be desirable to prevent
   580 	test(r==KErrNone || r==KErrPathNotFound);
   585 	test_Value(r, r == KErrNone || r==KErrPathNotFound);
   581 
   586 
   582 	//this operation is prevented as you can not open a file for write access in the resource directory
   587 	//this operation is prevented as you can not open a file for write access in the resource directory
   583 	r=file1.Rename(KFileRes3);
   588 	r=file1.Rename(KFileRes3);
   584 	test(r==KErrPermissionDenied || r==KErrAccessDenied);
   589 	test_Value(r, r == KErrPermissionDenied || r==KErrAccessDenied);
   585 
   590 
   586 	file1.Close();
   591 	file1.Close();
   587 
   592 
   588 	r=file1.Replace(TheFs,KFileRes,EFileWrite);
   593 	r=file1.Replace(TheFs,KFileRes,EFileWrite);
   589 	test(r==KErrPermissionDenied);
   594 	test_Value(r, r == KErrPermissionDenied);
   590 	file1.Close();
   595 	file1.Close();
   591 
   596 
   592 	}
   597 	}
   593 
   598 
   594 
   599 
   597 //
   602 //
   598 //
   603 //
   599 	{
   604 	{
   600 
   605 
   601 	r=TheFs.SetSessionPath(pritestfalseidname);
   606 	r=TheFs.SetSessionPath(pritestfalseidname);
   602 	test(r==KErrPermissionDenied);
   607 	test_Value(r, r == KErrPermissionDenied);
   603 
   608 
   604 	r=file1.Temp(TheFs,pritestfalseidname,fromTemp,EFileWrite);
   609 	r=file1.Temp(TheFs,pritestfalseidname,fromTemp,EFileWrite);
   605 	test(r==KErrPermissionDenied);
   610 	test_Value(r, r == KErrPermissionDenied);
   606 
   611 
   607 	TBuf<25> prifilename;
   612 	TBuf<25> prifilename;
   608 	prifilename.Append(pritestname);
   613 	prifilename.Append(pritestname);
   609 	prifilename.Append(KFileSys);
   614 	prifilename.Append(KFileSys);
   610 
   615 
   611 	r=file1.Create(TheFs,prifilename,EFileWrite);
   616 	r=file1.Create(TheFs,prifilename,EFileWrite);
   612 	test(r==KErrPermissionDenied);
   617 	test_Value(r, r == KErrPermissionDenied);
   613 
   618 
   614 
   619 
   615 	r=file1.Open(TheFs,prifilename,EFileWrite);
   620 	r=file1.Open(TheFs,prifilename,EFileWrite);
   616 	test(r==KErrPermissionDenied);
   621 	test_Value(r, r == KErrPermissionDenied);
   617 
   622 
   618 	r=file1.Open(TheFs,prifilename,EFileRead);
   623 	r=file1.Open(TheFs,prifilename,EFileRead);
   619 	test(r==KErrPermissionDenied);
   624 	test_Value(r, r == KErrPermissionDenied);
   620 
   625 
   621 	
   626 	
   622 	r=file1.Replace(TheFs,prifilename,EFileWrite);
   627 	r=file1.Replace(TheFs,prifilename,EFileWrite);
   623 	test(r==KErrPermissionDenied);
   628 	test_Value(r, r == KErrPermissionDenied);
   624 
   629 
   625 	}
   630 	}
   626 
   631 
   627 
   632 
   628 
   633 
   631 //
   636 //
   632 //
   637 //
   633 	{
   638 	{
   634 
   639 
   635 	r=TheFs.SetSessionPath(pritestname);
   640 	r=TheFs.SetSessionPath(pritestname);
   636 	test(r==KErrPermissionDenied);
   641 	test_Value(r, r == KErrPermissionDenied);
   637 
   642 
   638 	r=file1.Temp(TheFs,pritestname,fromTemp,EFileWrite);
   643 	r=file1.Temp(TheFs,pritestname,fromTemp,EFileWrite);
   639 	test(r==KErrPermissionDenied);
   644 	test_Value(r, r == KErrPermissionDenied);
   640 
   645 
   641 	TBuf<25> prifilename;
   646 	TBuf<25> prifilename;
   642 	prifilename.Append(pritestname);
   647 	prifilename.Append(pritestname);
   643 	prifilename.Append(KFileSys);
   648 	prifilename.Append(KFileSys);
   644 
   649 
   645 	r=file1.Create(TheFs,prifilename,EFileWrite);
   650 	r=file1.Create(TheFs,prifilename,EFileWrite);
   646 	test(r==KErrPermissionDenied);
   651 	test_Value(r, r == KErrPermissionDenied);
   647 
   652 
   648 
   653 
   649 	r=file1.Open(TheFs,prifilename,EFileWrite);
   654 	r=file1.Open(TheFs,prifilename,EFileWrite);
   650 	test(r==KErrPermissionDenied);
   655 	test_Value(r, r == KErrPermissionDenied);
   651 
   656 
   652 	
   657 	
   653 	r=file1.Open(TheFs,prifilename,EFileRead);
   658 	r=file1.Open(TheFs,prifilename,EFileRead);
   654 	test(r==KErrPermissionDenied);
   659 	test_Value(r, r == KErrPermissionDenied);
   655 
   660 
   656 
   661 
   657 	r=file1.Replace(TheFs,prifilename,EFileWrite);
   662 	r=file1.Replace(TheFs,prifilename,EFileWrite);
   658 	test(r==KErrPermissionDenied);
   663 	test_Value(r, r == KErrPermissionDenied);
   659 
   664 
   660 	}
   665 	}
   661 
   666 
   662 LOCAL_C void privateSIDRFiletest()
   667 LOCAL_C void privateSIDRFiletest()
   663 //
   668 //
   664 //
   669 //
   665 //
   670 //
   666 	{
   671 	{
   667 
   672 
   668 	r=TheFs.SetSessionToPrivate(gTheDriveNum);
   673 	r=TheFs.SetSessionToPrivate(gTheDriveNum);
   669 	test(r==KErrNone);
   674 	test_KErrNone(r);
   670 		
   675 		
   671 	r=file1.Temp(TheFs,theprivatepath,fromTemp,EFileWrite);
   676 	r=file1.Temp(TheFs,theprivatepath,fromTemp,EFileWrite);
   672 	test(r==KErrNone);
   677 	test_KErrNone(r);
   673 	file1.Close();
   678 	file1.Close();
   674 	r=file1.Create(TheFs,KFilePri,EFileWrite);
   679 	r=file1.Create(TheFs,KFilePri,EFileWrite);
   675 	test(r==KErrNone || r==KErrAlreadyExists);
   680 	test_Value(r, r == KErrNone || r==KErrAlreadyExists);
   676 	file1.Close();
   681 	file1.Close();
   677 	r=file1.Open(TheFs,KFilePri,EFileWrite);
   682 	r=file1.Open(TheFs,KFilePri,EFileWrite);
   678 	test(r==KErrNone);
   683 	test_KErrNone(r);
   679 	file1.Close();
   684 	file1.Close();
   680 	r=file1.Open(TheFs,KFilePri,EFileRead);
   685 	r=file1.Open(TheFs,KFilePri,EFileRead);
   681 	test(r==KErrNone);
   686 	test_KErrNone(r);
   682 	file1.Close();
   687 	file1.Close();
   683 	r=file1.Replace(TheFs,KFilePri,EFileWrite);
   688 	r=file1.Replace(TheFs,KFilePri,EFileWrite);
   684 	test(r==KErrNone);
   689 	test_KErrNone(r);
   685 	r=file1.Rename(KFilePri3);
   690 	r=file1.Rename(KFilePri3);
   686 	test(r==KErrNone || r==KErrAlreadyExists);
   691 	test_Value(r, r == KErrNone || r==KErrAlreadyExists);
   687 	file1.Close();
   692 	file1.Close();
   688 
   693 
   689 	}
   694 	}
   690 
   695 
   691 
   696 
   697 	//system
   702 	//system
   698 
   703 
   699 	TBuf<30> dirNameBuf(KSystemPath);
   704 	TBuf<30> dirNameBuf(KSystemPath);
   700 	dirNameBuf[0]=(TText)gDriveToTest;
   705 	dirNameBuf[0]=(TText)gDriveToTest;
   701 	r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal);
   706 	r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal);
   702 	test(r==KErrPermissionDenied);
   707 	test_Value(r, r == KErrPermissionDenied);
   703 	dir.Close();
   708 	dir.Close();
   704 	r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries);
   709 	r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries);
   705 	test(r==KErrPermissionDenied);
   710 	test_Value(r, r == KErrPermissionDenied);
   706 	dirNameBuf.Zero();
   711 	dirNameBuf.Zero();
   707 	delete dirEntries;
   712 	delete dirEntries;
   708 	
   713 	
   709 	dirNameBuf=KPrivateFalseID;
   714 	dirNameBuf=KPrivateFalseID;
   710 	dirNameBuf[0]=(TText)gDriveToTest;
   715 	dirNameBuf[0]=(TText)gDriveToTest;
   711 	r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal);
   716 	r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal);
   712 	test(r==KErrPermissionDenied);
   717 	test_Value(r, r == KErrPermissionDenied);
   713 	dir.Close();
   718 	dir.Close();
   714 	r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries);
   719 	r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries);
   715 	test(r==KErrPermissionDenied);
   720 	test_Value(r, r == KErrPermissionDenied);
   716 	dirNameBuf.Zero();
   721 	dirNameBuf.Zero();
   717 	delete dirEntries;
   722 	delete dirEntries;
   718 
   723 
   719 	//Private
   724 	//Private
   720 	dirNameBuf=KPrivatePath;
   725 	dirNameBuf=KPrivatePath;
   721 	dirNameBuf[0]=(TText)gDriveToTest;
   726 	dirNameBuf[0]=(TText)gDriveToTest;
   722 	r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal);
   727 	r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal);
   723 	test(r==KErrPermissionDenied);
   728 	test_Value(r, r == KErrPermissionDenied);
   724 	dir.Close();
   729 	dir.Close();
   725 	r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries);
   730 	r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries);
   726 	test(r==KErrPermissionDenied);
   731 	test_Value(r, r == KErrPermissionDenied);
   727 	dirNameBuf.Zero();
   732 	dirNameBuf.Zero();
   728 	delete dirEntries;
   733 	delete dirEntries;
   729 	//Private/uid
   734 	//Private/uid
   730 	TheFs.PrivatePath(dirNameBuf);
   735 	TheFs.PrivatePath(dirNameBuf);
   731 	dirNameBuf.Insert(0,_L("?:"));
   736 	dirNameBuf.Insert(0,_L("?:"));
   732 	dirNameBuf[0]=(TText)gDriveToTest;
   737 	dirNameBuf[0]=(TText)gDriveToTest;
   733 	r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal);
   738 	r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal);
   734 	test(r==KErrNone);
   739 	test_KErrNone(r);
   735 	dir.Close();
   740 	dir.Close();
   736 	r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries);
   741 	r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries);
   737 	test(r==KErrNone);
   742 	test_KErrNone(r);
   738 	dirNameBuf.Zero();
   743 	dirNameBuf.Zero();
   739 	delete dirEntries;
   744 	delete dirEntries;
   740 	//Resource
   745 	//Resource
   741 	dirNameBuf=KResourcePath;
   746 	dirNameBuf=KResourcePath;
   742 	dirNameBuf[0]=(TText)gDriveToTest;
   747 	dirNameBuf[0]=(TText)gDriveToTest;
   743 	r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal);
   748 	r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal);
   744 	test(r==KErrNone);
   749 	test_KErrNone(r);
   745 	r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries);
   750 	r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries);
   746 	test(r==KErrNone);
   751 	test_KErrNone(r);
   747 	dir.Close();
   752 	dir.Close();
   748 	delete dirEntries;
   753 	delete dirEntries;
   749 	}
   754 	}
   750 
   755 
   751 
   756 
   753 //
   758 //
   754 //	test APIs with no capabilities
   759 //	test APIs with no capabilities
   755 //
   760 //
   756 	{
   761 	{
   757 	r=TheFs.FileSystemName(fsname,gTheDriveNum);
   762 	r=TheFs.FileSystemName(fsname,gTheDriveNum);
   758 	test(r==KErrNone);
   763 	test_KErrNone(r);
   759 	r = DismountFileSystem(TheFs, fsname, gTheDriveNum);
   764 	r = DismountFileSystem(TheFs, fsname, gTheDriveNum);
   760 	test(r==KErrPermissionDenied);
   765 	test_Value(r, r == KErrPermissionDenied);
   761 //	r=TheFs.RemoveFileSystem(fsname);	//can not test due to bug elsewhere fix exists
   766 //	r=TheFs.RemoveFileSystem(fsname);	//can not test due to bug elsewhere fix exists
   762 //	test(r==KErrPermissionDenied);
   767 //	test_Value(r, r == KErrPermissionDenied);
   763 //	r=TheFs.AddFileSystem(fsname);
   768 //	r=TheFs.AddFileSystem(fsname);
   764 //	test(r==KErrPermissionDenied);
   769 //	test_Value(r, r == KErrPermissionDenied);
   765 	r = MountFileSystem(TheFs, fsname, gTheDriveNum);
   770 	r = MountFileSystem(TheFs, fsname, gTheDriveNum);
   766 	test(r==KErrPermissionDenied);
   771 	test_Value(r, r == KErrPermissionDenied);
   767 	r=TheFs.SetDriveName(gTheDriveNum,KDriveName);
   772 	r=TheFs.SetDriveName(gTheDriveNum,KDriveName);
   768 	test(r==KErrPermissionDenied);
   773 	test_Value(r, r == KErrPermissionDenied);
   769 //	r=TheFs.SetVolumeLabel(KVolLable, gTheDriveNum);	//broken on wins C:
   774 //	r=TheFs.SetVolumeLabel(KVolLable, gTheDriveNum);	//broken on wins C:
   770 //	test(r==KErrPermissionDenied);
   775 //	test_Value(r, r == KErrPermissionDenied);
   771 
   776 
   772 	systemRFstest();
   777 	systemRFstest();
   773 	resourceRFstest();
   778 	resourceRFstest();
   774 	privateRFstest();
   779 	privateRFstest();
   775 	privateSIDRFstest();
   780 	privateSIDRFstest();
   790 	test(aStat1==KErrPermissionDenied);
   795 	test(aStat1==KErrPermissionDenied);
   791 	test(aStat2==KErrPermissionDenied);
   796 	test(aStat2==KErrPermissionDenied);
   792 	test(aStat3==KErrNone);
   797 	test(aStat3==KErrNone);
   793 	
   798 	
   794 	r=TheFs.SetSessionPath(systestname);
   799 	r=TheFs.SetSessionPath(systestname);
   795 	test(r==KErrPermissionDenied);
   800 	test_Value(r, r == KErrPermissionDenied);
   796 	
   801 	
   797 	
   802 	
   798 //Test RRawDisk class
   803 //Test RRawDisk class
   799 	r=rawdisk.Open(TheFs,gTheDriveNum);
   804 	r=rawdisk.Open(TheFs,gTheDriveNum);
   800 	test(r==KErrPermissionDenied);
   805 	test_Value(r, r == KErrPermissionDenied);
   801 //	rawdisk.Close();
   806 //	rawdisk.Close();
   802 
   807 
   803 	r=format.Open(TheFs,driveBuf,EHighDensity,count);
   808 	r=format.Open(TheFs,driveBuf,EHighDensity,count);
   804 	test(r==KErrPermissionDenied);
   809 	test_Value(r, r == KErrPermissionDenied);
   805 
   810 
   806 	RDirtest();
   811 	RDirtest();
   807 
   812 
   808 	driveBuf[0]=(TText)gDriveToTest;
   813 	driveBuf[0]=(TText)gDriveToTest;
   809 	r=TheFs.ScanDrive(driveBuf);
   814 	r=TheFs.ScanDrive(driveBuf);
   810 	test(r==KErrPermissionDenied);
   815 	test_Value(r, r == KErrPermissionDenied);
   811 	r=TheFs.CheckDisk(driveBuf);
   816 	r=TheFs.CheckDisk(driveBuf);
   812 	test(r==KErrPermissionDenied);
   817 	test_Value(r, r == KErrPermissionDenied);
   813 	}
   818 	}
   814 
   819 
   815 LOCAL_C void TestCaps()
   820 LOCAL_C void TestCaps()
   816 //
   821 //
   817 //	test format etc that require certain capabilities
   822 //	test format etc that require certain capabilities
   829 	r=RProcess().HasCapability(ECapability_None, __PLATSEC_DIAGNOSTIC_STRING(myDiagMsg));
   834 	r=RProcess().HasCapability(ECapability_None, __PLATSEC_DIAGNOSTIC_STRING(myDiagMsg));
   830 	test(r);
   835 	test(r);
   831 
   836 
   832 	driveBuf[0]=(TText)gDriveToTest;
   837 	driveBuf[0]=(TText)gDriveToTest;
   833 	r=TheFs.SessionPath(temp);
   838 	r=TheFs.SessionPath(temp);
   834 	test(r==KErrNone);
   839 	test_KErrNone(r);
   835 
   840 
   836 	r=TheFs.CreatePrivatePath(gTheDriveNum);
   841 	r=TheFs.CreatePrivatePath(gTheDriveNum);
   837 	test(r==KErrNone || r== KErrAlreadyExists);
   842 	test_Value(r, r == KErrNone || r== KErrAlreadyExists);
   838 
   843 
   839 	TBuf<18> tempPri;
   844 	TBuf<18> tempPri;
   840 	r=TheFs.PrivatePath(tempPri);
   845 	r=TheFs.PrivatePath(tempPri);
   841 	test(r==KErrNone);
   846 	test_KErrNone(r);
   842 	theprivatepath = _L("?:");
   847 	theprivatepath = _L("?:");
   843 	theprivatepath.Append(tempPri);
   848 	theprivatepath.Append(tempPri);
   844 
   849 
   845 	TestNoCaps();
   850 	TestNoCaps();
   846 
   851 
   847 	TFileName thesessionpath;
   852 	TFileName thesessionpath;
   848 	r=TheFs.SetSessionToPrivate(gTheDriveNum);
   853 	r=TheFs.SetSessionToPrivate(gTheDriveNum);
   849 	test(r==KErrNone);
   854 	test_KErrNone(r);
   850 	r=TheFs.SessionPath(thesessionpath);
   855 	r=TheFs.SessionPath(thesessionpath);
   851 	test(r==KErrNone);
   856 	test_KErrNone(r);
   852 	
   857 	
   853 	test(thesessionpath == theprivatepath);
   858 	test(thesessionpath == theprivatepath);
   854 
   859 
   855 	}
   860 	}
   856 
   861 
   860 // Create system and private directories for scan with and without DC
   865 // Create system and private directories for scan with and without DC
   861 //
   866 //
   862 	{
   867 	{
   863 	TInt r;
   868 	TInt r;
   864 	r = TheFs.MkDir(_L("\\normal\\"));
   869 	r = TheFs.MkDir(_L("\\normal\\"));
   865 	test(r == KErrNone || r == KErrAlreadyExists);
   870 	test_Value(r, r == KErrNone || r == KErrAlreadyExists);
   866 	r = TheFs.MkDir(_L("\\normal\\one\\"));
   871 	r = TheFs.MkDir(_L("\\normal\\one\\"));
   867 	test(r == KErrNone || r == KErrAlreadyExists);
   872 	test_Value(r, r == KErrNone || r == KErrAlreadyExists);
   868 	r = TheFs.MkDir(_L("\\normal\\two\\"));
   873 	r = TheFs.MkDir(_L("\\normal\\two\\"));
   869 	test(r == KErrNone || r == KErrAlreadyExists);
   874 	test_Value(r, r == KErrNone || r == KErrAlreadyExists);
   870 	r = TheFs.MkDir(_L("\\sys\\"));
   875 	r = TheFs.MkDir(_L("\\sys\\"));
   871 	test(r == KErrPermissionDenied);
   876 	test_Value(r, r == KErrPermissionDenied);
   872 	r = TheFs.MkDir(_L("\\sys\\one\\"));
   877 	r = TheFs.MkDir(_L("\\sys\\one\\"));
   873 	test(r == KErrPermissionDenied);
   878 	test_Value(r, r == KErrPermissionDenied);
   874 	r = TheFs.MkDir(_L("\\sys\\two\\"));
   879 	r = TheFs.MkDir(_L("\\sys\\two\\"));
   875 	test(r == KErrPermissionDenied);
   880 	test_Value(r, r == KErrPermissionDenied);
   876 	r = TheFs.MkDir(_L("\\private\\"));
   881 	r = TheFs.MkDir(_L("\\private\\"));
   877 	test(r == KErrPermissionDenied);
   882 	test_Value(r, r == KErrPermissionDenied);
   878 	r = TheFs.MkDir(_L("\\private\\one\\"));
   883 	r = TheFs.MkDir(_L("\\private\\one\\"));
   879 	test(r == KErrPermissionDenied);
   884 	test_Value(r, r == KErrPermissionDenied);
   880 	r = TheFs.MkDir(_L("\\private\\two\\"));
   885 	r = TheFs.MkDir(_L("\\private\\two\\"));
   881 	test(r == KErrPermissionDenied);
   886 	test_Value(r, r == KErrPermissionDenied);
   882 	r = TheFs.MkDir(_L("\\ZZZZZZ\\"));
   887 	r = TheFs.MkDir(_L("\\ZZZZZZ\\"));
   883 	test(r == KErrNone || r == KErrAlreadyExists);
   888 	test_Value(r, r == KErrNone || r == KErrAlreadyExists);
   884 	}
   889 	}
   885 
   890 
   886 TFileName dirName;
   891 TFileName dirName;
   887 
   892 
   888 LOCAL_C void ScanDir(const TDesC& aName, CDirScan::TScanDirection aDirection, TInt aError)
   893 LOCAL_C void ScanDir(const TDesC& aName, CDirScan::TScanDirection aDirection, TInt aError)
   889 	{
   894 	{
   890 	CDirScan* scanner = NULL;
   895 	CDirScan* scanner = NULL;
   891 	TRAP(r, scanner = CDirScan::NewL(TheFs));
   896 	TRAP(r, scanner = CDirScan::NewL(TheFs));
   892 	test(r == KErrNone && scanner);
   897 	test_Value(r, r == KErrNone && scanner);
   893 
   898 
   894 	TRAP(r, scanner->SetScanDataL(aName,KEntryAttDir,ESortByName|EAscending,aDirection));
   899 	TRAP(r, scanner->SetScanDataL(aName,KEntryAttDir,ESortByName|EAscending,aDirection));
   895 	test(r == KErrNone);
   900 	test_KErrNone(r);
   896 	
   901 	
   897 	CDir *entryList=NULL;
   902 	CDir *entryList=NULL;
   898 	for (;;)
   903 	for (;;)
   899 		{
   904 		{
   900 		TRAP(r, scanner->NextL(entryList));
   905 		TRAP(r, scanner->NextL(entryList));
   901 		test(r == aError);
   906 		test_Value(r, r == aError);
   902 		if (entryList==NULL)
   907 		if (entryList==NULL)
   903 			break;
   908 			break;
   904 		TInt count=entryList->Count();
   909 		TInt count=entryList->Count();
   905 		while (count--)
   910 		while (count--)
   906 			{
   911 			{
   935 		TBuf<30> privatepath;
   940 		TBuf<30> privatepath;
   936 		r=TheFs.PrivatePath(privatepath);
   941 		r=TheFs.PrivatePath(privatepath);
   937 		test.Printf(_L("Private Path is=%S"),&privatepath);
   942 		test.Printf(_L("Private Path is=%S"),&privatepath);
   938 		
   943 		
   939 		r = TheFs.MkDir(_L("\\Caged\\"));
   944 		r = TheFs.MkDir(_L("\\Caged\\"));
   940 		test(r==KErrNone || r==KErrAlreadyExists);
   945 		test_Value(r, r == KErrNone || r==KErrAlreadyExists);
   941 		
   946 		
   942 		CDir* entryCount=NULL;
   947 		CDir* entryCount=NULL;
   943 		r=TheFs.GetDir(_L("\\*.*"),KEntryAttNormal,ESortNone,entryCount);
   948 		r=TheFs.GetDir(_L("\\*.*"),KEntryAttNormal,ESortNone,entryCount);
   944 		test(r==KErrNone);
   949 		test_KErrNone(r);
   945 		TInt rootCount= entryCount->Count();
   950 		TInt rootCount= entryCount->Count();
   946 		
   951 		
   947 		delete entryCount;
   952 		delete entryCount;
   948 		entryCount=NULL;
   953 		entryCount=NULL;
   949 
   954 
   950 
   955 
   951 		//Testing Copy
   956 		//Testing Copy
   952 		CDir* entryCount2=NULL;
   957 		CDir* entryCount2=NULL;
   953 		r=fMan->Copy(_L("\\sys\\"),_L("\\Caged\\"));
   958 		r=fMan->Copy(_L("\\sys\\"),_L("\\Caged\\"));
   954 		test(r == KErrPermissionDenied);
   959 		test_Value(r, r == KErrPermissionDenied);
   955 		r=fMan->Copy(_L("\\*"),_L("\\Caged\\"));
   960 		r=fMan->Copy(_L("\\*"),_L("\\Caged\\"));
   956 		test(r == KErrNone);
   961 		test_KErrNone(r);
   957 		
   962 		
   958 		r=TheFs.GetDir(_L("\\Caged\\*.*"),KEntryAttNormal,ESortNone,entryCount2);
   963 		r=TheFs.GetDir(_L("\\Caged\\*.*"),KEntryAttNormal,ESortNone,entryCount2);
   959 		test(r==KErrNone);
   964 		test_KErrNone(r);
   960 		TInt cagedCount= entryCount2->Count();
   965 		TInt cagedCount= entryCount2->Count();
   961 		
   966 		
   962 		test(cagedCount==rootCount);
   967 		test(cagedCount==rootCount);
   963 		
   968 		
   964 		delete entryCount2;
   969 		delete entryCount2;
   965 		entryCount2=NULL;
   970 		entryCount2=NULL;
   966 		
   971 		
   967 		// Check if both copied sys and private are empty (no information is exposed)
   972 		// Check if both copied sys and private are empty (no information is exposed)
   968 		CDir* entryCount3=NULL;
   973 		CDir* entryCount3=NULL;
   969 		r=TheFs.GetDir(_L("\\Caged\\private\\*.*"),KEntryAttNormal|KEntryAttDir,ESortNone,entryCount3);
   974 		r=TheFs.GetDir(_L("\\Caged\\private\\*.*"),KEntryAttNormal|KEntryAttDir,ESortNone,entryCount3);
   970 		test(r==KErrPathNotFound);
   975 		test_Value(r, r == KErrPathNotFound);
   971 		delete entryCount3;
   976 		delete entryCount3;
   972 		entryCount3=NULL;
   977 		entryCount3=NULL;
   973 		
   978 		
   974 		CDir* entryCount4=NULL;
   979 		CDir* entryCount4=NULL;
   975 		r=TheFs.GetDir(_L("\\Caged\\sys\\*.*"),KEntryAttNormal|KEntryAttDir,ESortNone,entryCount4);
   980 		r=TheFs.GetDir(_L("\\Caged\\sys\\*.*"),KEntryAttNormal|KEntryAttDir,ESortNone,entryCount4);
   976 		test(r==KErrPathNotFound);
   981 		test_Value(r, r == KErrPathNotFound);
   977 		delete entryCount4;
   982 		delete entryCount4;
   978 		entryCount4=NULL;
   983 		entryCount4=NULL;
   979 
   984 
   980 	
   985 	
   981 		r=fMan->Copy(_L("\\private\\two\\moo"),_L("\\private\\two\\mew")); 
   986 		r=fMan->Copy(_L("\\private\\two\\moo"),_L("\\private\\two\\mew")); 
   982 		test(r == KErrPermissionDenied);
   987 		test_Value(r, r == KErrPermissionDenied);
   983 	
   988 	
   984 		// Create a test file
   989 		// Create a test file
   985 		RFile testFile;
   990 		RFile testFile;
   986 		r = testFile.Replace(TheFs, _L("\\capTest"),EFileWrite);
   991 		r = testFile.Replace(TheFs, _L("\\capTest"),EFileWrite);
   987 		test(r==KErrNone || r==KErrAlreadyExists);
   992 		test_Value(r, r == KErrNone || r==KErrAlreadyExists);
   988 		testFile.Close();
   993 		testFile.Close();
   989 		
   994 		
   990 		TFileName name;
   995 		TFileName name;
   991 		name = privatepath;
   996 		name = privatepath;
   992 		name.Append(_L("privateFile.tst"));
   997 		name.Append(_L("privateFile.tst"));
   993 		RFile privateFile;
   998 		RFile privateFile;
   994 		r = privateFile.Replace(TheFs, name,EFileWrite);
   999 		r = privateFile.Replace(TheFs, name,EFileWrite);
   995 		test(r==KErrNone || r==KErrAlreadyExists);
  1000 		test_Value(r, r == KErrNone || r==KErrAlreadyExists);
   996 		privateFile.Close();
  1001 		privateFile.Close();
   997 
  1002 
   998 	
  1003 	
   999 		r=fMan->Copy(_L("\\capTest"),_L("\\private\\two\\moo")); 
  1004 		r=fMan->Copy(_L("\\capTest"),_L("\\private\\two\\moo")); 
  1000 		test(r == KErrPermissionDenied);
  1005 		test_Value(r, r == KErrPermissionDenied);
  1001 		r=fMan->Copy(_L("\\capTest"),_L("\\sys\\bin\\moo")); 
  1006 		r=fMan->Copy(_L("\\capTest"),_L("\\sys\\bin\\moo")); 
  1002 		test(r == KErrPermissionDenied);
  1007 		test_Value(r, r == KErrPermissionDenied);
  1003 		r=fMan->Copy(_L("\\sys\\bin\\capTest"),_L("\\sys\\bin\\moo"));
  1008 		r=fMan->Copy(_L("\\sys\\bin\\capTest"),_L("\\sys\\bin\\moo"));
  1004 		test(r == KErrPermissionDenied);
  1009 		test_Value(r, r == KErrPermissionDenied);
  1005 		r=fMan->Copy(_L("\\sys\\*"),_L("\\"));
  1010 		r=fMan->Copy(_L("\\sys\\*"),_L("\\"));
  1006 		test (r==KErrPermissionDenied);
  1011 		test_Value(r, r == KErrPermissionDenied);
  1007 		r=fMan->Copy(name,_L("\\sys\\"));
  1012 		r=fMan->Copy(name,_L("\\sys\\"));
  1008 		test(r==KErrPermissionDenied);
  1013 		test_Value(r, r == KErrPermissionDenied);
  1009 
  1014 
  1010 		// Testing Move
  1015 		// Testing Move
  1011 		r=fMan->Move(_L("\\private\\two\\moo"),_L("\\private\\one\\moo"));
  1016 		r=fMan->Move(_L("\\private\\two\\moo"),_L("\\private\\one\\moo"));
  1012 		test(r == KErrPermissionDenied);
  1017 		test_Value(r, r == KErrPermissionDenied);
  1013 		r=fMan->Move(_L("\\private\\two\\moo.."),_L("\\private\\one\\moo"));
  1018 		r=fMan->Move(_L("\\private\\two\\moo.."),_L("\\private\\one\\moo"));
  1014 		test(r == KErrPermissionDenied);
  1019 		test_Value(r, r == KErrPermissionDenied);
  1015 		r=fMan->Move(_L("\\private\\two\\moo"),_L("\\private\\one\\moo.."));
  1020 		r=fMan->Move(_L("\\private\\two\\moo"),_L("\\private\\one\\moo.."));
  1016 		test(r == KErrPermissionDenied);
  1021 		test_Value(r, r == KErrPermissionDenied);
  1017 		r=fMan->Move(name,_L("\\privateFile.tst"));
  1022 		r=fMan->Move(name,_L("\\privateFile.tst"));
  1018 		test(r == KErrNone);
  1023 		test_KErrNone(r);
  1019 		r=fMan->Move(_L("\\privateFile.tst"),name);
  1024 		r=fMan->Move(_L("\\privateFile.tst"),name);
  1020 		test(r == KErrNone);
  1025 		test_KErrNone(r);
  1021 		r=fMan->Move(_L("\\capTest"),_L("\\private\\two\\moo")); 
  1026 		r=fMan->Move(_L("\\capTest"),_L("\\private\\two\\moo")); 
  1022 		test(r == KErrPermissionDenied);
  1027 		test_Value(r, r == KErrPermissionDenied);
  1023 		r=fMan->Move(_L("\\capTest"),_L("\\sys\\bin\\moo")); 
  1028 		r=fMan->Move(_L("\\capTest"),_L("\\sys\\bin\\moo")); 
  1024 		test(r == KErrPermissionDenied);
  1029 		test_Value(r, r == KErrPermissionDenied);
  1025 		r=fMan->Move(_L("\\sys\\bin\\capTest"),_L("\\sys\\bin\\moo"));
  1030 		r=fMan->Move(_L("\\sys\\bin\\capTest"),_L("\\sys\\bin\\moo"));
  1026 		test(r == KErrPermissionDenied);
  1031 		test_Value(r, r == KErrPermissionDenied);
  1027 		r=fMan->Move(_L("\\sys\\*"),_L("\\"));
  1032 		r=fMan->Move(_L("\\sys\\*"),_L("\\"));
  1028 		test (r==KErrPermissionDenied);
  1033 		test_Value(r, r == KErrPermissionDenied);
  1029 		r=fMan->Move(name,_L("\\sys\\"));
  1034 		r=fMan->Move(name,_L("\\sys\\"));
  1030 		test(r==KErrPermissionDenied);
  1035 		test_Value(r, r == KErrPermissionDenied);
  1031 
  1036 
  1032 
  1037 
  1033 		// Testing Attribs
  1038 		// Testing Attribs
  1034 		r=fMan->Attribs(_L("\\private\\two\\moo"),KEntryAttReadOnly,0,TTime(0)); 
  1039 		r=fMan->Attribs(_L("\\private\\two\\moo"),KEntryAttReadOnly,0,TTime(0)); 
  1035 		test(r == KErrPermissionDenied);
  1040 		test_Value(r, r == KErrPermissionDenied);
  1036 		r=fMan->Attribs(_L("\\private\\moo"),KEntryAttReadOnly,0,TTime(0)); 
  1041 		r=fMan->Attribs(_L("\\private\\moo"),KEntryAttReadOnly,0,TTime(0)); 
  1037 		test(r == KErrPermissionDenied);
  1042 		test_Value(r, r == KErrPermissionDenied);
  1038 		r=fMan->Attribs(name,KEntryAttReadOnly,0,TTime(0));
  1043 		r=fMan->Attribs(name,KEntryAttReadOnly,0,TTime(0));
  1039 		test(r == KErrNone);
  1044 		test_KErrNone(r);
  1040 		r=fMan->Attribs(name,0,KEntryAttReadOnly,TTime(0));
  1045 		r=fMan->Attribs(name,0,KEntryAttReadOnly,TTime(0));
  1041 		test(r == KErrNone);
  1046 		test_KErrNone(r);
  1042 
  1047 
  1043 
  1048 
  1044 		// Testing RmDir
  1049 		// Testing RmDir
  1045 		r=fMan->RmDir(_L("\\private\\"));
  1050 		r=fMan->RmDir(_L("\\private\\"));
  1046 		test(r == KErrPermissionDenied);
  1051 		test_Value(r, r == KErrPermissionDenied);
  1047 		r=fMan->RmDir(_L("\\private\\two\\"));
  1052 		r=fMan->RmDir(_L("\\private\\two\\"));
  1048 		test(r == KErrPermissionDenied);
  1053 		test_Value(r, r == KErrPermissionDenied);
  1049 		r=fMan->RmDir(_L("\\private\\tw?\\"));
  1054 		r=fMan->RmDir(_L("\\private\\tw?\\"));
  1050 		test(r == KErrPermissionDenied);
  1055 		test_Value(r, r == KErrPermissionDenied);
  1051 		r=fMan->RmDir(_L("\\sys\\"));
  1056 		r=fMan->RmDir(_L("\\sys\\"));
  1052 		test(r == KErrPermissionDenied);
  1057 		test_Value(r, r == KErrPermissionDenied);
  1053 		
  1058 		
  1054 		
  1059 		
  1055 		// Testing Rename
  1060 		// Testing Rename
  1056 		r=fMan->Rename(_L("\\private\\two\\moo"),_L("\\private\\two\\mew")); 
  1061 		r=fMan->Rename(_L("\\private\\two\\moo"),_L("\\private\\two\\mew")); 
  1057 		test(r == KErrPermissionDenied);
  1062 		test_Value(r, r == KErrPermissionDenied);
  1058 		
  1063 		
  1059 		// Testing Delete
  1064 		// Testing Delete
  1060 		r=fMan->Delete(_L("\\private\\two\\test")); 
  1065 		r=fMan->Delete(_L("\\private\\two\\test")); 
  1061 		test(r == KErrPermissionDenied);
  1066 		test_Value(r, r == KErrPermissionDenied);
  1062 		r=fMan->Delete(_L("\\private\\moo")); 
  1067 		r=fMan->Delete(_L("\\private\\moo")); 
  1063 		test(r == KErrPermissionDenied);
  1068 		test_Value(r, r == KErrPermissionDenied);
  1064 		r=fMan->Delete(_L("\\sys\\moo")); 
  1069 		r=fMan->Delete(_L("\\sys\\moo")); 
  1065 		test(r == KErrPermissionDenied);
  1070 		test_Value(r, r == KErrPermissionDenied);
  1066 		
  1071 		
  1067 
  1072 
  1068 		//Something that actually exists in Private
  1073 		//Something that actually exists in Private
  1069 		r=fMan->Rename(name,_L("\\private\\00000001\\moo")); 
  1074 		r=fMan->Rename(name,_L("\\private\\00000001\\moo")); 
  1070 		test(r == KErrNone);
  1075 		test_KErrNone(r);
  1071 		r=fMan->Rename(_L("\\private\\00000001\\moo"),name); 
  1076 		r=fMan->Rename(_L("\\private\\00000001\\moo"),name); 
  1072 		test(r == KErrNone);
  1077 		test_KErrNone(r);
  1073 		r=fMan->Copy(name,_L("\\private\\00000001\\moo")); 
  1078 		r=fMan->Copy(name,_L("\\private\\00000001\\moo")); 
  1074 		test(r == KErrNone);
  1079 		test_KErrNone(r);
  1075 		r=fMan->Delete(_L("\\private\\00000001\\moo")); 
  1080 		r=fMan->Delete(_L("\\private\\00000001\\moo")); 
  1076 		test(r == KErrNone);
  1081 		test_KErrNone(r);
  1077 
  1082 
  1078 		// Clean up the test data
  1083 		// Clean up the test data
  1079 		r=fMan->RmDir(_L("\\Caged\\")); 
  1084 		r=fMan->RmDir(_L("\\Caged\\")); 
  1080 		test(r == KErrNone);
  1085 		test_KErrNone(r);
  1081 		r=fMan->Delete(_L("\\capTest")); 
  1086 		r=fMan->Delete(_L("\\capTest")); 
  1082 		test(r == KErrNone);
  1087 		test_KErrNone(r);
  1083 		r=fMan->Delete(name); 
  1088 		r=fMan->Delete(name); 
  1084 		test(r == KErrNone);
  1089 		test_KErrNone(r);
  1085 		delete(fMan);
  1090 		delete(fMan);
  1086 		}
  1091 		}
  1087 	
  1092 	
  1088 	// CDirScan tests
  1093 	// CDirScan tests
  1089 	ScanDir(_L("\\"), CDirScan::EScanUpTree, KErrNone);
  1094 	ScanDir(_L("\\"), CDirScan::EScanUpTree, KErrNone);
  1099 // permitted in this case).
  1104 // permitted in this case).
  1100 //
  1105 //
  1101 	{
  1106 	{
  1102 	TInt r;
  1107 	TInt r;
  1103 	r = TheFs.RmDir(_L("\\normal\\one\\"));
  1108 	r = TheFs.RmDir(_L("\\normal\\one\\"));
  1104 	test(r == KErrNone);
  1109 	test_KErrNone(r);
  1105 	r = TheFs.RmDir(_L("\\normal\\two\\"));
  1110 	r = TheFs.RmDir(_L("\\normal\\two\\"));
  1106 	test(r == KErrNone);
  1111 	test_KErrNone(r);
  1107 	r = TheFs.RmDir(_L("\\normal\\"));
  1112 	r = TheFs.RmDir(_L("\\normal\\"));
  1108 	test(r == KErrNone);
  1113 	test_KErrNone(r);
  1109 	r = TheFs.RmDir(_L("\\sys\\one\\"));
  1114 	r = TheFs.RmDir(_L("\\sys\\one\\"));
  1110 	test(r == KErrPermissionDenied);
  1115 	test_Value(r, r == KErrPermissionDenied);
  1111 	r = TheFs.RmDir(_L("\\sys\\two\\"));
  1116 	r = TheFs.RmDir(_L("\\sys\\two\\"));
  1112 	test(r == KErrPermissionDenied);
  1117 	test_Value(r, r == KErrPermissionDenied);
  1113 	r = TheFs.RmDir(_L("\\sys\\"));
  1118 	r = TheFs.RmDir(_L("\\sys\\"));
  1114 	test(r == KErrPermissionDenied);
  1119 	test_Value(r, r == KErrPermissionDenied);
  1115 	r = TheFs.RmDir(_L("\\private\\one\\"));
  1120 	r = TheFs.RmDir(_L("\\private\\one\\"));
  1116 	test(r == KErrPermissionDenied);
  1121 	test_Value(r, r == KErrPermissionDenied);
  1117 	r = TheFs.RmDir(_L("\\private\\two\\"));
  1122 	r = TheFs.RmDir(_L("\\private\\two\\"));
  1118 	test(r == KErrPermissionDenied);
  1123 	test_Value(r, r == KErrPermissionDenied);
  1119 	r = TheFs.RmDir(_L("\\private\\"));
  1124 	r = TheFs.RmDir(_L("\\private\\"));
  1120 	test(r == KErrPermissionDenied);
  1125 	test_Value(r, r == KErrPermissionDenied);
  1121 	r = TheFs.RmDir(_L("\\ZZZZZZ\\"));
  1126 	r = TheFs.RmDir(_L("\\ZZZZZZ\\"));
  1122 	test(r == KErrNone);
  1127 	test_KErrNone(r);
  1123 	}
  1128 	}
  1124 
  1129 
  1125 TFileName gDirList[100];
  1130 TFileName gDirList[100];
  1126 TInt      gDirNum = 0;
  1131 TInt      gDirNum = 0;
  1127 
  1132 
  1133 //
  1138 //
  1134 	{
  1139 	{
  1135 	CDirScan* scanner = NULL;
  1140 	CDirScan* scanner = NULL;
  1136 	TInt r;
  1141 	TInt r;
  1137 	TRAP(r, scanner = CDirScan::NewL(TheFs));
  1142 	TRAP(r, scanner = CDirScan::NewL(TheFs));
  1138 	test(r == KErrNone && scanner);
  1143 	test_Value(r, r == KErrNone && scanner);
  1139 	TParse dirName;
  1144 	TParse dirName;
  1140 	TheFs.Parse(_L("\\"),dirName);
  1145 	TheFs.Parse(_L("\\"),dirName);
  1141 	TRAP(r, scanner->SetScanDataL(dirName.FullName(),KEntryAttDir,ESortByName|EAscending));
  1146 	TRAP(r, scanner->SetScanDataL(dirName.FullName(),KEntryAttDir,ESortByName|EAscending));
  1142 	test(r == KErrNone);
  1147 	test_KErrNone(r);
  1143 	CDir *entryList;
  1148 	CDir *entryList;
  1144 	test.Printf(_L("------ ALL DIRECTORIES ------\n"));
  1149 	test.Printf(_L("------ ALL DIRECTORIES ------\n"));
  1145 	for (;;)
  1150 	for (;;)
  1146 		{
  1151 		{
  1147 		scanner->NextL(entryList);
  1152 		scanner->NextL(entryList);
  1174 	ListDirs();
  1179 	ListDirs();
  1175 
  1180 
  1176 	CDirScan* scanner = NULL;
  1181 	CDirScan* scanner = NULL;
  1177 	TInt r;
  1182 	TInt r;
  1178 	TRAP(r, scanner = CDirScan::NewL(TheFs));
  1183 	TRAP(r, scanner = CDirScan::NewL(TheFs));
  1179 	test(r == KErrNone && scanner);
  1184 	test_Value(r, r == KErrNone && scanner);
  1180 	TParse dirName;
  1185 	TParse dirName;
  1181 	TheFs.Parse(_L("\\"),dirName);
  1186 	TheFs.Parse(_L("\\"),dirName);
  1182 	TRAP(r, scanner->SetScanDataL(dirName.FullName(),KEntryAttDir,ESortByName|EAscending));
  1187 	TRAP(r, scanner->SetScanDataL(dirName.FullName(),KEntryAttDir,ESortByName|EAscending));
  1183 	test(r == KErrNone);
  1188 	test_KErrNone(r);
  1184 	CDir *entryList = NULL;
  1189 	CDir *entryList = NULL;
  1185 	TInt  num = 0;
  1190 	TInt  num = 0;
  1186 	test.Printf(_L("------ ACCESSIBLE DIRECTORIES ------\n"));
  1191 	test.Printf(_L("------ ACCESSIBLE DIRECTORIES ------\n"));
  1187 	for (;;)
  1192 	for (;;)
  1188 		{
  1193 		{
  1213 		delete entryList;
  1218 		delete entryList;
  1214 		entryList=NULL;
  1219 		entryList=NULL;
  1215 		}
  1220 		}
  1216 	delete scanner;
  1221 	delete scanner;
  1217 	CleanDirs();
  1222 	CleanDirs();
  1218 	test(r == KErrNone);
  1223 	test_KErrNone(r);
  1219 	if (num < gDirNum)
  1224 	if (num < gDirNum)
  1220 		{
  1225 		{
  1221 		test.Printf(_L("Directory not as expected (%d found < %d expected\n"), num, gDirNum);
  1226 		test.Printf(_L("Directory not as expected (%d found < %d expected\n"), num, gDirNum);
  1222 		test(0);
  1227 		test(0);
  1223 		}
  1228 		}
  1244 //
  1249 //
  1245 	{
  1250 	{
  1246 	test.Next(_L("Delete test directory"));
  1251 	test.Next(_L("Delete test directory"));
  1247 	CFileMan* fMan=CFileMan::NewL(TheFs);
  1252 	CFileMan* fMan=CFileMan::NewL(TheFs);
  1248 	TInt r=fMan->RmDir(gSessionPath);
  1253 	TInt r=fMan->RmDir(gSessionPath);
  1249 	test(r==KErrNone);
  1254 	test_KErrNone(r);
  1250 	delete fMan;
  1255 	delete fMan;
  1251 	}
  1256 	}
  1252 
  1257 
  1253 GLDEF_C void CallTestsL(/*TChar aDriveLetter*/)
  1258 GLDEF_C void CallTestsL(/*TChar aDriveLetter*/)
  1254 //
  1259 //
  1269 	TBuf<30> sesspath;
  1274 	TBuf<30> sesspath;
  1270 	sesspath=_L("?:\\");
  1275 	sesspath=_L("?:\\");
  1271 	sesspath[0] = (TText)gDriveToTest;
  1276 	sesspath[0] = (TText)gDriveToTest;
  1272 
  1277 
  1273 	TInt r= TheFs.SetSessionPath(sesspath);
  1278 	TInt r= TheFs.SetSessionPath(sesspath);
  1274 	test(r==KErrNone);
  1279 	test_KErrNone(r);
  1275 
  1280 
  1276 	TBuf<2> cmd;
  1281 	TBuf<2> cmd;
  1277 	cmd.SetLength(1);
  1282 	cmd.SetLength(1);
  1278 	cmd[0] = (TText)gDriveToTest;
  1283 	cmd[0] = (TText)gDriveToTest;
  1279 	RProcess tp;
  1284 	RProcess tp;
  1280 	r=tp.Create(_L("clean_prepdc.exe"),sesspath);
  1285 	r=tp.Create(_L("clean_prepdc.exe"),sesspath);
  1281 	test(r==KErrNone);
  1286 	test_KErrNone(r);
  1282 	{
  1287 	{
  1283 	TRequestStatus ps;
  1288 	TRequestStatus ps;
  1284 	tp.Logon(ps);
  1289 	tp.Logon(ps);
  1285 	tp.Resume();
  1290 	tp.Resume();
  1286 	tp.Close();
  1291 	tp.Close();
  1290 	//check double mode ie that Defpath still works	
  1295 	//check double mode ie that Defpath still works	
  1291 	RFs fs1;
  1296 	RFs fs1;
  1292 	RFs fs2;
  1297 	RFs fs2;
  1293 	
  1298 	
  1294 	r=fs1.Connect();
  1299 	r=fs1.Connect();
  1295 	test(r==KErrNone);
  1300 	test_KErrNone(r);
  1296 	r=fs1.SessionPath(sesspath);
  1301 	r=fs1.SessionPath(sesspath);
  1297 	test(r==KErrNone);
  1302 	test_KErrNone(r);
  1298 	test.Printf(_L("session1 Path=%S"),&sesspath);
  1303 	test.Printf(_L("session1 Path=%S"),&sesspath);
  1299 
  1304 
  1300 	TBuf<30> privatepath;
  1305 	TBuf<30> privatepath;
  1301 	r=fs1.SetSessionToPrivate(gTheDriveNum);
  1306 	r=fs1.SetSessionToPrivate(gTheDriveNum);
  1302 	test(r==KErrNone);
  1307 	test_KErrNone(r);
  1303 	r=fs1.PrivatePath(privatepath);
  1308 	r=fs1.PrivatePath(privatepath);
  1304 	test(r==KErrNone);
  1309 	test_KErrNone(r);
  1305 	r=privatepath.Compare(KExpectedPrivatePath());
  1310 	r=privatepath.Compare(KExpectedPrivatePath());
  1306 	test(r==0);
  1311 	test_Value(r, r == 0);
  1307 	r=fs1.SessionPath(sesspath);
  1312 	r=fs1.SessionPath(sesspath);
  1308 	test(r==KErrNone);
  1313 	test_KErrNone(r);
  1309 	r=privatepath.Compare(sesspath.Mid(KPathPosition));
  1314 	r=privatepath.Compare(sesspath.Mid(KPathPosition));
  1310 	test(r==0);
  1315 	test_Value(r, r == 0);
  1311 	r=fs1.CreatePrivatePath(gTheDriveNum);
  1316 	r=fs1.CreatePrivatePath(gTheDriveNum);
  1312 	test(r==KErrNone);
  1317 	test_KErrNone(r);
  1313 	fs1.Close();
  1318 	fs1.Close();
  1314 
  1319 
  1315 	r=fs2.Connect();
  1320 	r=fs2.Connect();
  1316 	test(r==KErrNone);
  1321 	test_KErrNone(r);
  1317 	r=fs2.SessionPath(sesspath);
  1322 	r=fs2.SessionPath(sesspath);
  1318 	test(r==KErrNone);
  1323 	test_KErrNone(r);
  1319 	test.Printf(_L("session2 Path=%S"),&sesspath);
  1324 	test.Printf(_L("session2 Path=%S"),&sesspath);
  1320 	fs2.Close();
  1325 	fs2.Close();
  1321 
  1326 
  1322 	TestCaps();
  1327 	TestCaps();
  1323 	TestCaging();
  1328 	TestCaging();