160 |
161 |
161 oldName=KOldFile; |
162 oldName=KOldFile; |
162 oldName[0]=(TText)gDriveToTest; |
163 oldName[0]=(TText)gDriveToTest; |
163 |
164 |
164 r=TheFs.GetShortName(systestfile, shortfilename); |
165 r=TheFs.GetShortName(systestfile, shortfilename); |
165 test(r==KErrPermissionDenied); |
166 test_Value(r, r == KErrPermissionDenied); |
166 |
167 |
167 r=TheFs.GetLongName(systestfile1, longfilename); |
168 r=TheFs.GetLongName(systestfile1, longfilename); |
168 test(r==KErrPermissionDenied); |
169 test_Value(r, r == KErrPermissionDenied); |
169 |
170 |
170 r=file1.Create(TheFs,oldName,EFileWrite); |
171 r=file1.Create(TheFs,oldName,EFileWrite); |
171 test(r==KErrNone || r==KErrAlreadyExists); |
172 test_Value(r, r == KErrNone || r==KErrAlreadyExists); |
172 file1.Close(); |
173 file1.Close(); |
173 |
174 |
174 r=TheFs.Replace(oldName,systestfile); |
175 r=TheFs.Replace(oldName,systestfile); |
175 test(r==KErrPermissionDenied); |
176 test_Value(r, r == KErrPermissionDenied); |
176 |
177 |
177 r=TheFs.Rename(systestfile,systestfile1); |
178 r=TheFs.Rename(systestfile,systestfile1); |
178 test(r==KErrPermissionDenied); |
179 test_Value(r, r == KErrPermissionDenied); |
179 |
180 |
180 // check that the entry for the system directory itself can be retrieved with no error |
181 // check that the entry for the system directory itself can be retrieved with no error |
181 // - with or without a slash |
182 // - with or without a slash |
182 TPtrC restrictedDir(systestname.Ptr(), systestname.Length()); |
183 TPtrC restrictedDir(systestname.Ptr(), systestname.Length()); |
183 r=TheFs.Entry(restrictedDir, entry); |
184 r=TheFs.Entry(restrictedDir, entry); |
184 test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDir, r); |
185 test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDir, r); |
185 test(r==KErrNone); |
186 test_KErrNone(r); |
186 test (entry.iAtt & KEntryAttDir); |
187 test (entry.iAtt & KEntryAttDir); |
187 |
188 |
188 TPtrC restrictedDirWithNoBackSlash(restrictedDir.Ptr(), restrictedDir.Length()-1); |
189 TPtrC restrictedDirWithNoBackSlash(restrictedDir.Ptr(), restrictedDir.Length()-1); |
189 r=TheFs.Entry(restrictedDirWithNoBackSlash,entry); |
190 r=TheFs.Entry(restrictedDirWithNoBackSlash,entry); |
190 test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDirWithNoBackSlash, r); |
191 test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDirWithNoBackSlash, r); |
191 test(r==KErrNone); |
192 test_KErrNone(r); |
192 |
193 |
193 r=TheFs.Entry(systestfile1,entry); |
194 r=TheFs.Entry(systestfile1,entry); |
194 test(r==KErrPermissionDenied); |
195 test_Value(r, r == KErrPermissionDenied); |
195 |
196 |
196 r=TheFs.SetEntry(systestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly); |
197 r=TheFs.SetEntry(systestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly); |
197 test(r==KErrPermissionDenied); |
198 test_Value(r, r == KErrPermissionDenied); |
198 |
199 |
199 r=TheFs.Delete(systestfile1); |
200 r=TheFs.Delete(systestfile1); |
200 test(r==KErrPermissionDenied); |
201 test_Value(r, r == KErrPermissionDenied); |
201 |
202 |
202 } |
203 } |
203 |
204 |
204 |
205 |
205 LOCAL_C void resourceRFstest() |
206 LOCAL_C void resourceRFstest() |
241 |
242 |
242 oldName=KOldFile; |
243 oldName=KOldFile; |
243 oldName[0]=(TText)gDriveToTest; |
244 oldName[0]=(TText)gDriveToTest; |
244 |
245 |
245 r=TheFs.GetShortName(restestfile, shortfilename); |
246 r=TheFs.GetShortName(restestfile, shortfilename); |
246 test(r==KErrNone || KErrPathNotFound); |
247 // test_Value(r, r == KErrNone || r == KErrPathNotFound); |
|
248 test(r == KErrNone || KErrPathNotFound); |
247 |
249 |
248 r=TheFs.GetLongName(restestfile1, longfilename); |
250 r=TheFs.GetLongName(restestfile1, longfilename); |
249 test(r==KErrNone || KErrPathNotFound); |
251 // test_Value(r, r == KErrNone || r == KErrPathNotFound); |
|
252 test(r == KErrNone || KErrPathNotFound); |
250 |
253 |
251 r=file1.Create(TheFs,oldName,EFileWrite); |
254 r=file1.Create(TheFs,oldName,EFileWrite); |
252 test(r==KErrNone || r==KErrAlreadyExists); |
255 test_Value(r, r == KErrNone || r==KErrAlreadyExists); |
253 file1.Close(); |
256 file1.Close(); |
254 |
257 |
255 r=TheFs.Replace(oldName,restestfile); |
258 r=TheFs.Replace(oldName,restestfile); |
256 test(r==KErrPermissionDenied); |
259 test_Value(r, r == KErrPermissionDenied); |
257 |
260 |
258 r=TheFs.Rename(restestfile,restestfile1); |
261 r=TheFs.Rename(restestfile,restestfile1); |
259 test(r==KErrPermissionDenied); |
262 test_Value(r, r == KErrPermissionDenied); |
260 |
263 |
261 // check that the entry for the resource directory itself can be retrieved with no error |
264 // check that the entry for the resource directory itself can be retrieved with no error |
262 // - with or without a slash |
265 // - with or without a slash |
263 TPtrC restrictedDir(restestname.Ptr(), restestname.Length()); |
266 TPtrC restrictedDir(restestname.Ptr(), restestname.Length()); |
264 r=TheFs.Entry(restrictedDir, entry); |
267 r=TheFs.Entry(restrictedDir, entry); |
265 test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDir, r); |
268 test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDir, r); |
266 test(r==KErrNone); |
269 test_KErrNone(r); |
267 test (entry.iAtt & KEntryAttDir); |
270 test (entry.iAtt & KEntryAttDir); |
268 |
271 |
269 TPtrC restrictedDirWithNoBackSlash(restrictedDir.Ptr(), restrictedDir.Length()-1); |
272 TPtrC restrictedDirWithNoBackSlash(restrictedDir.Ptr(), restrictedDir.Length()-1); |
270 r=TheFs.Entry(restrictedDirWithNoBackSlash,entry); |
273 r=TheFs.Entry(restrictedDirWithNoBackSlash,entry); |
271 test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDirWithNoBackSlash, r); |
274 test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDirWithNoBackSlash, r); |
272 test(r==KErrNone); |
275 test_KErrNone(r); |
273 |
276 |
274 r=TheFs.Entry(restestfile1,entry); |
277 r=TheFs.Entry(restestfile1,entry); |
275 test(r==KErrNone || r==KErrNotFound); |
278 test_Value(r, r == KErrNone || r==KErrNotFound); |
276 |
279 |
277 r=TheFs.SetEntry(restestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly); |
280 r=TheFs.SetEntry(restestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly); |
278 test(r==KErrPermissionDenied); |
281 test_Value(r, r == KErrPermissionDenied); |
279 |
282 |
280 r=TheFs.Delete(restestfile1); |
283 r=TheFs.Delete(restestfile1); |
281 test(r==KErrPermissionDenied); |
284 test_Value(r, r == KErrPermissionDenied); |
282 |
285 |
283 } |
286 } |
284 |
287 |
285 |
288 |
286 LOCAL_C void privatefalseIDRFstest() |
289 LOCAL_C void privatefalseIDRFstest() |
379 |
382 |
380 oldName=KOldFile; |
383 oldName=KOldFile; |
381 oldName[0]=(TText)gDriveToTest; |
384 oldName[0]=(TText)gDriveToTest; |
382 |
385 |
383 r=TheFs.GetShortName(pritestfile, shortfilename); |
386 r=TheFs.GetShortName(pritestfile, shortfilename); |
384 test(r==KErrPermissionDenied); |
387 test_Value(r, r == KErrPermissionDenied); |
385 |
388 |
386 r=TheFs.GetLongName(pritestfile1, longfilename); |
389 r=TheFs.GetLongName(pritestfile1, longfilename); |
387 test(r==KErrPermissionDenied); |
390 test_Value(r, r == KErrPermissionDenied); |
388 |
391 |
389 r=file1.Create(TheFs,oldName,EFileWrite); |
392 r=file1.Create(TheFs,oldName,EFileWrite); |
390 test(r==KErrNone || r==KErrAlreadyExists); |
393 test_Value(r, r == KErrNone || r==KErrAlreadyExists); |
391 file1.Close(); |
394 file1.Close(); |
392 |
395 |
393 r=TheFs.Replace(oldName,pritestfile); |
396 r=TheFs.Replace(oldName,pritestfile); |
394 test(r==KErrPermissionDenied); |
397 test_Value(r, r == KErrPermissionDenied); |
395 |
398 |
396 r=TheFs.Rename(pritestfile,pritestfile1); |
399 r=TheFs.Rename(pritestfile,pritestfile1); |
397 test(r==KErrPermissionDenied); |
400 test_Value(r, r == KErrPermissionDenied); |
398 |
401 |
399 r=TheFs.Entry(pritestfile1,entry); |
402 r=TheFs.Entry(pritestfile1,entry); |
400 test(r==KErrPermissionDenied); |
403 test_Value(r, r == KErrPermissionDenied); |
401 |
404 |
402 // check that the entry for the private directory itself can be retrieved with no error |
405 // check that the entry for the private directory itself can be retrieved with no error |
403 // - with or without a slash |
406 // - with or without a slash |
404 TPtrC restrictedDir(pritestname.Ptr(), pritestname.Length()); |
407 TPtrC restrictedDir(pritestname.Ptr(), pritestname.Length()); |
405 r=TheFs.Entry(restrictedDir, entry); |
408 r=TheFs.Entry(restrictedDir, entry); |
406 test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDir, r); |
409 test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDir, r); |
407 test(r==KErrNone); |
410 test_KErrNone(r); |
408 test (entry.iAtt & KEntryAttDir); |
411 test (entry.iAtt & KEntryAttDir); |
409 |
412 |
410 TPtrC restrictedDirWithNoBackSlash(restrictedDir.Ptr(), restrictedDir.Length()-1); |
413 TPtrC restrictedDirWithNoBackSlash(restrictedDir.Ptr(), restrictedDir.Length()-1); |
411 r=TheFs.Entry(restrictedDirWithNoBackSlash,entry); |
414 r=TheFs.Entry(restrictedDirWithNoBackSlash,entry); |
412 test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDirWithNoBackSlash, r); |
415 test.Printf(_L("RFs::Entry(%S) returned %d"), &restrictedDirWithNoBackSlash, r); |
413 test(r==KErrNone); |
416 test_KErrNone(r); |
414 |
417 |
415 r=TheFs.SetEntry(pritestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly); |
418 r=TheFs.SetEntry(pritestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly); |
416 test(r==KErrPermissionDenied); |
419 test_Value(r, r == KErrPermissionDenied); |
417 |
420 |
418 r=TheFs.Delete(pritestfile1); |
421 r=TheFs.Delete(pritestfile1); |
419 test(r==KErrPermissionDenied); |
422 test_Value(r, r == KErrPermissionDenied); |
420 |
423 |
421 } |
424 } |
422 |
425 |
423 |
426 |
424 LOCAL_C void privateSIDRFstest() |
427 LOCAL_C void privateSIDRFstest() |
459 |
462 |
460 oldName=KOldFile; |
463 oldName=KOldFile; |
461 oldName[0]=(TText)gDriveToTest; |
464 oldName[0]=(TText)gDriveToTest; |
462 |
465 |
463 r=TheFs.GetShortName(pritestfile, shortfilename); |
466 r=TheFs.GetShortName(pritestfile, shortfilename); |
464 test(r==KErrNone || KErrPathNotFound); |
467 // test_Value(r, r == KErrNone || r == KErrPathNotFound); |
|
468 test(r == KErrNone || KErrPathNotFound); |
465 |
469 |
466 r=TheFs.GetLongName(pritestfile1, longfilename); |
470 r=TheFs.GetLongName(pritestfile1, longfilename); |
467 test(r==KErrNone || KErrPathNotFound); |
471 // test_Value(r, r == KErrNone || r == KErrPathNotFound); |
|
472 test(r == KErrNone || KErrPathNotFound); |
468 |
473 |
469 r=file1.Create(TheFs,oldName,EFileWrite); |
474 r=file1.Create(TheFs,oldName,EFileWrite); |
470 test(r==KErrNone || r==KErrAlreadyExists); |
475 test_Value(r, r == KErrNone || r==KErrAlreadyExists); |
471 file1.Close(); |
476 file1.Close(); |
472 |
477 |
473 r=TheFs.Replace(oldName,pritestfile); |
478 r=TheFs.Replace(oldName,pritestfile); |
474 test(r==KErrNone); |
479 test_KErrNone(r); |
475 |
480 |
476 r=TheFs.Rename(pritestfile,pritestfile1); |
481 r=TheFs.Rename(pritestfile,pritestfile1); |
477 test(r==KErrNone || r==KErrAlreadyExists); |
482 test_Value(r, r == KErrNone || r==KErrAlreadyExists); |
478 |
483 |
479 r=TheFs.Entry(pritestfile1,entry); |
484 r=TheFs.Entry(pritestfile1,entry); |
480 test(r==KErrNone); |
485 test_KErrNone(r); |
481 |
486 |
482 //Test Entry with correct SID |
487 //Test Entry with correct SID |
483 r=TheFs.Entry(theprivatepath,entry); |
488 r=TheFs.Entry(theprivatepath,entry); |
484 test(r==KErrNone); |
489 test_KErrNone(r); |
485 |
490 |
486 //Test Entry with correct SID and without "//" appended |
491 //Test Entry with correct SID and without "//" appended |
487 r=TheFs.Entry(KPrivatePathTest1,entry); |
492 r=TheFs.Entry(KPrivatePathTest1,entry); |
488 test(r==KErrNone); |
493 test_KErrNone(r); |
489 |
494 |
490 //Test Entry with invalid SID, without // appended |
495 //Test Entry with invalid SID, without // appended |
491 r=TheFs.Entry(KPrivatePathTest2,entry); |
496 r=TheFs.Entry(KPrivatePathTest2,entry); |
492 test(r==KErrPermissionDenied); |
497 test_Value(r, r == KErrPermissionDenied); |
493 |
498 |
494 //Test Entry with invalid SID |
499 //Test Entry with invalid SID |
495 r=TheFs.Entry(KPrivatePathTest3,entry); |
500 r=TheFs.Entry(KPrivatePathTest3,entry); |
496 test(r==KErrPermissionDenied); |
501 test_Value(r, r == KErrPermissionDenied); |
497 |
502 |
498 r=TheFs.SetEntry(pritestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly); |
503 r=TheFs.SetEntry(pritestfile1,testtime,KEntryAttNormal,KEntryAttReadOnly); |
499 test(r==KErrNone); |
504 test_KErrNone(r); |
500 |
505 |
501 r=TheFs.Delete(pritestfile1); |
506 r=TheFs.Delete(pritestfile1); |
502 test(r==KErrNone); |
507 test_KErrNone(r); |
503 |
508 |
504 } |
509 } |
505 |
510 |
506 |
511 |
507 LOCAL_C void systemRFiletest() |
512 LOCAL_C void systemRFiletest() |
508 // |
513 // |
509 // |
514 // |
510 // |
515 // |
511 { |
516 { |
512 r=TheFs.SetSessionPath(systestname); |
517 r=TheFs.SetSessionPath(systestname); |
513 test(r==KErrPermissionDenied); |
518 test_Value(r, r == KErrPermissionDenied); |
514 |
519 |
515 r=file1.Temp(TheFs,systestname,fromTemp,EFileWrite); |
520 r=file1.Temp(TheFs,systestname,fromTemp,EFileWrite); |
516 test(r==KErrPermissionDenied); |
521 test_Value(r, r == KErrPermissionDenied); |
517 |
522 |
518 |
523 |
519 TBuf<25> sysfilename; |
524 TBuf<25> sysfilename; |
520 sysfilename.Append(systestname); |
525 sysfilename.Append(systestname); |
521 sysfilename.Append(KFileSys); |
526 sysfilename.Append(KFileSys); |
522 |
527 |
523 r=file1.Create(TheFs,sysfilename,EFileWrite); |
528 r=file1.Create(TheFs,sysfilename,EFileWrite); |
524 test(r==KErrPermissionDenied); |
529 test_Value(r, r == KErrPermissionDenied); |
525 |
530 |
526 r=file1.Open(TheFs,sysfilename,EFileWrite); |
531 r=file1.Open(TheFs,sysfilename,EFileWrite); |
527 test(r==KErrPermissionDenied); |
532 test_Value(r, r == KErrPermissionDenied); |
528 |
533 |
529 r=file1.Open(TheFs,sysfilename,EFileRead); |
534 r=file1.Open(TheFs,sysfilename,EFileRead); |
530 test(r==KErrPermissionDenied); |
535 test_Value(r, r == KErrPermissionDenied); |
531 |
536 |
532 r=file1.Replace(TheFs,sysfilename,EFileWrite); |
537 r=file1.Replace(TheFs,sysfilename,EFileWrite); |
533 test(r==KErrPermissionDenied); |
538 test_Value(r, r == KErrPermissionDenied); |
534 |
539 |
535 TFindFile finder(TheFs); |
540 TFindFile finder(TheFs); |
536 CDir* dir = NULL; |
541 CDir* dir = NULL; |
537 r=finder.FindWildByDir(KWildFile, KWildPath, dir); |
542 r=finder.FindWildByDir(KWildFile, KWildPath, dir); |
538 if (!(r==KErrPermissionDenied)) |
543 if (!(r==KErrPermissionDenied)) |
539 test.Printf(_L("T_DCNONE: test find wildcards r = %d (expected KErrPermissionDenied)\n"), r); |
544 test.Printf(_L("T_DCNONE: test find wildcards r = %d (expected KErrPermissionDenied)\n"), r); |
540 test(r==KErrPermissionDenied); |
545 test_Value(r, r == KErrPermissionDenied); |
541 delete dir; |
546 delete dir; |
542 } |
547 } |
543 |
548 |
544 LOCAL_C void resourceRFiletest() |
549 LOCAL_C void resourceRFiletest() |
545 // |
550 // |
546 // |
551 // |
547 // |
552 // |
548 { |
553 { |
549 r=TheFs.SetSessionPath(restestname); |
554 r=TheFs.SetSessionPath(restestname); |
550 test(r==KErrNone); |
555 test_KErrNone(r); |
551 |
556 |
552 r=file1.Temp(TheFs,restestname,fromTemp,EFileWrite); |
557 r=file1.Temp(TheFs,restestname,fromTemp,EFileWrite); |
553 test(r==KErrPermissionDenied); |
558 test_Value(r, r == KErrPermissionDenied); |
554 file1.Close(); |
559 file1.Close(); |
555 |
560 |
556 r=file1.Create(TheFs,KFileRes,EFileWrite); |
561 r=file1.Create(TheFs,KFileRes,EFileWrite); |
557 test(r==KErrPermissionDenied); |
562 test_Value(r, r == KErrPermissionDenied); |
558 file1.Close(); |
563 file1.Close(); |
559 |
564 |
560 r=file1.Open(TheFs,KFileRes,EFileWrite); |
565 r=file1.Open(TheFs,KFileRes,EFileWrite); |
561 test(r==KErrPermissionDenied); |
566 test_Value(r, r == KErrPermissionDenied); |
562 file1.Close(); |
567 file1.Close(); |
563 |
568 |
564 r=file1.Open(TheFs,KFileRes,EFileRead|EFileShareReadersOnly); |
569 r=file1.Open(TheFs,KFileRes,EFileRead|EFileShareReadersOnly); |
565 test(r==KErrNone || r==KErrPathNotFound); |
570 test_Value(r, r == KErrNone || r==KErrPathNotFound); |
566 file1.Close(); |
571 file1.Close(); |
567 |
572 |
568 r=file1.Open(TheFs,KFileRes,EFileShareReadersOrWriters|EFileRead); |
573 r=file1.Open(TheFs,KFileRes,EFileShareReadersOrWriters|EFileRead); |
569 test(r==KErrNone || r==KErrPathNotFound); |
574 test_Value(r, r == KErrNone || r==KErrPathNotFound); |
570 file1.Close(); |
575 file1.Close(); |
571 |
576 |
572 r=file1.Open(TheFs,KFileRes,EFileShareReadersOrWriters|EFileWrite); |
577 r=file1.Open(TheFs,KFileRes,EFileShareReadersOrWriters|EFileWrite); |
573 test(r==KErrPermissionDenied); |
578 test_Value(r, r == KErrPermissionDenied); |
574 file1.Close(); |
579 file1.Close(); |
575 |
580 |
576 r=file1.Open(TheFs,KFileRes,EFileShareReadersOnly); |
581 r=file1.Open(TheFs,KFileRes,EFileShareReadersOnly); |
577 test(r==KErrNone || r==KErrPathNotFound); |
582 test_Value(r, r == KErrNone || r==KErrPathNotFound); |
578 |
583 |
579 r=file1.ChangeMode(EFileShareExclusive); //this is not illegal though will prevent shared access to resource which is nit my fault but may be desirable to prevent |
584 r=file1.ChangeMode(EFileShareExclusive); //this is not illegal though will prevent shared access to resource which is nit my fault but may be desirable to prevent |
580 test(r==KErrNone || r==KErrPathNotFound); |
585 test_Value(r, r == KErrNone || r==KErrPathNotFound); |
581 |
586 |
582 //this operation is prevented as you can not open a file for write access in the resource directory |
587 //this operation is prevented as you can not open a file for write access in the resource directory |
583 r=file1.Rename(KFileRes3); |
588 r=file1.Rename(KFileRes3); |
584 test(r==KErrPermissionDenied || r==KErrAccessDenied); |
589 test_Value(r, r == KErrPermissionDenied || r==KErrAccessDenied); |
585 |
590 |
586 file1.Close(); |
591 file1.Close(); |
587 |
592 |
588 r=file1.Replace(TheFs,KFileRes,EFileWrite); |
593 r=file1.Replace(TheFs,KFileRes,EFileWrite); |
589 test(r==KErrPermissionDenied); |
594 test_Value(r, r == KErrPermissionDenied); |
590 file1.Close(); |
595 file1.Close(); |
591 |
596 |
592 } |
597 } |
593 |
598 |
594 |
599 |
631 // |
636 // |
632 // |
637 // |
633 { |
638 { |
634 |
639 |
635 r=TheFs.SetSessionPath(pritestname); |
640 r=TheFs.SetSessionPath(pritestname); |
636 test(r==KErrPermissionDenied); |
641 test_Value(r, r == KErrPermissionDenied); |
637 |
642 |
638 r=file1.Temp(TheFs,pritestname,fromTemp,EFileWrite); |
643 r=file1.Temp(TheFs,pritestname,fromTemp,EFileWrite); |
639 test(r==KErrPermissionDenied); |
644 test_Value(r, r == KErrPermissionDenied); |
640 |
645 |
641 TBuf<25> prifilename; |
646 TBuf<25> prifilename; |
642 prifilename.Append(pritestname); |
647 prifilename.Append(pritestname); |
643 prifilename.Append(KFileSys); |
648 prifilename.Append(KFileSys); |
644 |
649 |
645 r=file1.Create(TheFs,prifilename,EFileWrite); |
650 r=file1.Create(TheFs,prifilename,EFileWrite); |
646 test(r==KErrPermissionDenied); |
651 test_Value(r, r == KErrPermissionDenied); |
647 |
652 |
648 |
653 |
649 r=file1.Open(TheFs,prifilename,EFileWrite); |
654 r=file1.Open(TheFs,prifilename,EFileWrite); |
650 test(r==KErrPermissionDenied); |
655 test_Value(r, r == KErrPermissionDenied); |
651 |
656 |
652 |
657 |
653 r=file1.Open(TheFs,prifilename,EFileRead); |
658 r=file1.Open(TheFs,prifilename,EFileRead); |
654 test(r==KErrPermissionDenied); |
659 test_Value(r, r == KErrPermissionDenied); |
655 |
660 |
656 |
661 |
657 r=file1.Replace(TheFs,prifilename,EFileWrite); |
662 r=file1.Replace(TheFs,prifilename,EFileWrite); |
658 test(r==KErrPermissionDenied); |
663 test_Value(r, r == KErrPermissionDenied); |
659 |
664 |
660 } |
665 } |
661 |
666 |
662 LOCAL_C void privateSIDRFiletest() |
667 LOCAL_C void privateSIDRFiletest() |
663 // |
668 // |
664 // |
669 // |
665 // |
670 // |
666 { |
671 { |
667 |
672 |
668 r=TheFs.SetSessionToPrivate(gTheDriveNum); |
673 r=TheFs.SetSessionToPrivate(gTheDriveNum); |
669 test(r==KErrNone); |
674 test_KErrNone(r); |
670 |
675 |
671 r=file1.Temp(TheFs,theprivatepath,fromTemp,EFileWrite); |
676 r=file1.Temp(TheFs,theprivatepath,fromTemp,EFileWrite); |
672 test(r==KErrNone); |
677 test_KErrNone(r); |
673 file1.Close(); |
678 file1.Close(); |
674 r=file1.Create(TheFs,KFilePri,EFileWrite); |
679 r=file1.Create(TheFs,KFilePri,EFileWrite); |
675 test(r==KErrNone || r==KErrAlreadyExists); |
680 test_Value(r, r == KErrNone || r==KErrAlreadyExists); |
676 file1.Close(); |
681 file1.Close(); |
677 r=file1.Open(TheFs,KFilePri,EFileWrite); |
682 r=file1.Open(TheFs,KFilePri,EFileWrite); |
678 test(r==KErrNone); |
683 test_KErrNone(r); |
679 file1.Close(); |
684 file1.Close(); |
680 r=file1.Open(TheFs,KFilePri,EFileRead); |
685 r=file1.Open(TheFs,KFilePri,EFileRead); |
681 test(r==KErrNone); |
686 test_KErrNone(r); |
682 file1.Close(); |
687 file1.Close(); |
683 r=file1.Replace(TheFs,KFilePri,EFileWrite); |
688 r=file1.Replace(TheFs,KFilePri,EFileWrite); |
684 test(r==KErrNone); |
689 test_KErrNone(r); |
685 r=file1.Rename(KFilePri3); |
690 r=file1.Rename(KFilePri3); |
686 test(r==KErrNone || r==KErrAlreadyExists); |
691 test_Value(r, r == KErrNone || r==KErrAlreadyExists); |
687 file1.Close(); |
692 file1.Close(); |
688 |
693 |
689 } |
694 } |
690 |
695 |
691 |
696 |
697 //system |
702 //system |
698 |
703 |
699 TBuf<30> dirNameBuf(KSystemPath); |
704 TBuf<30> dirNameBuf(KSystemPath); |
700 dirNameBuf[0]=(TText)gDriveToTest; |
705 dirNameBuf[0]=(TText)gDriveToTest; |
701 r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal); |
706 r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal); |
702 test(r==KErrPermissionDenied); |
707 test_Value(r, r == KErrPermissionDenied); |
703 dir.Close(); |
708 dir.Close(); |
704 r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries); |
709 r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries); |
705 test(r==KErrPermissionDenied); |
710 test_Value(r, r == KErrPermissionDenied); |
706 dirNameBuf.Zero(); |
711 dirNameBuf.Zero(); |
707 delete dirEntries; |
712 delete dirEntries; |
708 |
713 |
709 dirNameBuf=KPrivateFalseID; |
714 dirNameBuf=KPrivateFalseID; |
710 dirNameBuf[0]=(TText)gDriveToTest; |
715 dirNameBuf[0]=(TText)gDriveToTest; |
711 r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal); |
716 r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal); |
712 test(r==KErrPermissionDenied); |
717 test_Value(r, r == KErrPermissionDenied); |
713 dir.Close(); |
718 dir.Close(); |
714 r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries); |
719 r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries); |
715 test(r==KErrPermissionDenied); |
720 test_Value(r, r == KErrPermissionDenied); |
716 dirNameBuf.Zero(); |
721 dirNameBuf.Zero(); |
717 delete dirEntries; |
722 delete dirEntries; |
718 |
723 |
719 //Private |
724 //Private |
720 dirNameBuf=KPrivatePath; |
725 dirNameBuf=KPrivatePath; |
721 dirNameBuf[0]=(TText)gDriveToTest; |
726 dirNameBuf[0]=(TText)gDriveToTest; |
722 r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal); |
727 r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal); |
723 test(r==KErrPermissionDenied); |
728 test_Value(r, r == KErrPermissionDenied); |
724 dir.Close(); |
729 dir.Close(); |
725 r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries); |
730 r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries); |
726 test(r==KErrPermissionDenied); |
731 test_Value(r, r == KErrPermissionDenied); |
727 dirNameBuf.Zero(); |
732 dirNameBuf.Zero(); |
728 delete dirEntries; |
733 delete dirEntries; |
729 //Private/uid |
734 //Private/uid |
730 TheFs.PrivatePath(dirNameBuf); |
735 TheFs.PrivatePath(dirNameBuf); |
731 dirNameBuf.Insert(0,_L("?:")); |
736 dirNameBuf.Insert(0,_L("?:")); |
732 dirNameBuf[0]=(TText)gDriveToTest; |
737 dirNameBuf[0]=(TText)gDriveToTest; |
733 r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal); |
738 r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal); |
734 test(r==KErrNone); |
739 test_KErrNone(r); |
735 dir.Close(); |
740 dir.Close(); |
736 r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries); |
741 r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries); |
737 test(r==KErrNone); |
742 test_KErrNone(r); |
738 dirNameBuf.Zero(); |
743 dirNameBuf.Zero(); |
739 delete dirEntries; |
744 delete dirEntries; |
740 //Resource |
745 //Resource |
741 dirNameBuf=KResourcePath; |
746 dirNameBuf=KResourcePath; |
742 dirNameBuf[0]=(TText)gDriveToTest; |
747 dirNameBuf[0]=(TText)gDriveToTest; |
743 r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal); |
748 r=dir.Open(TheFs,dirNameBuf,KEntryAttNormal); |
744 test(r==KErrNone); |
749 test_KErrNone(r); |
745 r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries); |
750 r=TheFs.GetDir(dirNameBuf,KEntryAttMatchMask,ESortByName,dirEntries); |
746 test(r==KErrNone); |
751 test_KErrNone(r); |
747 dir.Close(); |
752 dir.Close(); |
748 delete dirEntries; |
753 delete dirEntries; |
749 } |
754 } |
750 |
755 |
751 |
756 |
860 // Create system and private directories for scan with and without DC |
865 // Create system and private directories for scan with and without DC |
861 // |
866 // |
862 { |
867 { |
863 TInt r; |
868 TInt r; |
864 r = TheFs.MkDir(_L("\\normal\\")); |
869 r = TheFs.MkDir(_L("\\normal\\")); |
865 test(r == KErrNone || r == KErrAlreadyExists); |
870 test_Value(r, r == KErrNone || r == KErrAlreadyExists); |
866 r = TheFs.MkDir(_L("\\normal\\one\\")); |
871 r = TheFs.MkDir(_L("\\normal\\one\\")); |
867 test(r == KErrNone || r == KErrAlreadyExists); |
872 test_Value(r, r == KErrNone || r == KErrAlreadyExists); |
868 r = TheFs.MkDir(_L("\\normal\\two\\")); |
873 r = TheFs.MkDir(_L("\\normal\\two\\")); |
869 test(r == KErrNone || r == KErrAlreadyExists); |
874 test_Value(r, r == KErrNone || r == KErrAlreadyExists); |
870 r = TheFs.MkDir(_L("\\sys\\")); |
875 r = TheFs.MkDir(_L("\\sys\\")); |
871 test(r == KErrPermissionDenied); |
876 test_Value(r, r == KErrPermissionDenied); |
872 r = TheFs.MkDir(_L("\\sys\\one\\")); |
877 r = TheFs.MkDir(_L("\\sys\\one\\")); |
873 test(r == KErrPermissionDenied); |
878 test_Value(r, r == KErrPermissionDenied); |
874 r = TheFs.MkDir(_L("\\sys\\two\\")); |
879 r = TheFs.MkDir(_L("\\sys\\two\\")); |
875 test(r == KErrPermissionDenied); |
880 test_Value(r, r == KErrPermissionDenied); |
876 r = TheFs.MkDir(_L("\\private\\")); |
881 r = TheFs.MkDir(_L("\\private\\")); |
877 test(r == KErrPermissionDenied); |
882 test_Value(r, r == KErrPermissionDenied); |
878 r = TheFs.MkDir(_L("\\private\\one\\")); |
883 r = TheFs.MkDir(_L("\\private\\one\\")); |
879 test(r == KErrPermissionDenied); |
884 test_Value(r, r == KErrPermissionDenied); |
880 r = TheFs.MkDir(_L("\\private\\two\\")); |
885 r = TheFs.MkDir(_L("\\private\\two\\")); |
881 test(r == KErrPermissionDenied); |
886 test_Value(r, r == KErrPermissionDenied); |
882 r = TheFs.MkDir(_L("\\ZZZZZZ\\")); |
887 r = TheFs.MkDir(_L("\\ZZZZZZ\\")); |
883 test(r == KErrNone || r == KErrAlreadyExists); |
888 test_Value(r, r == KErrNone || r == KErrAlreadyExists); |
884 } |
889 } |
885 |
890 |
886 TFileName dirName; |
891 TFileName dirName; |
887 |
892 |
888 LOCAL_C void ScanDir(const TDesC& aName, CDirScan::TScanDirection aDirection, TInt aError) |
893 LOCAL_C void ScanDir(const TDesC& aName, CDirScan::TScanDirection aDirection, TInt aError) |
889 { |
894 { |
890 CDirScan* scanner = NULL; |
895 CDirScan* scanner = NULL; |
891 TRAP(r, scanner = CDirScan::NewL(TheFs)); |
896 TRAP(r, scanner = CDirScan::NewL(TheFs)); |
892 test(r == KErrNone && scanner); |
897 test_Value(r, r == KErrNone && scanner); |
893 |
898 |
894 TRAP(r, scanner->SetScanDataL(aName,KEntryAttDir,ESortByName|EAscending,aDirection)); |
899 TRAP(r, scanner->SetScanDataL(aName,KEntryAttDir,ESortByName|EAscending,aDirection)); |
895 test(r == KErrNone); |
900 test_KErrNone(r); |
896 |
901 |
897 CDir *entryList=NULL; |
902 CDir *entryList=NULL; |
898 for (;;) |
903 for (;;) |
899 { |
904 { |
900 TRAP(r, scanner->NextL(entryList)); |
905 TRAP(r, scanner->NextL(entryList)); |
901 test(r == aError); |
906 test_Value(r, r == aError); |
902 if (entryList==NULL) |
907 if (entryList==NULL) |
903 break; |
908 break; |
904 TInt count=entryList->Count(); |
909 TInt count=entryList->Count(); |
905 while (count--) |
910 while (count--) |
906 { |
911 { |
935 TBuf<30> privatepath; |
940 TBuf<30> privatepath; |
936 r=TheFs.PrivatePath(privatepath); |
941 r=TheFs.PrivatePath(privatepath); |
937 test.Printf(_L("Private Path is=%S"),&privatepath); |
942 test.Printf(_L("Private Path is=%S"),&privatepath); |
938 |
943 |
939 r = TheFs.MkDir(_L("\\Caged\\")); |
944 r = TheFs.MkDir(_L("\\Caged\\")); |
940 test(r==KErrNone || r==KErrAlreadyExists); |
945 test_Value(r, r == KErrNone || r==KErrAlreadyExists); |
941 |
946 |
942 CDir* entryCount=NULL; |
947 CDir* entryCount=NULL; |
943 r=TheFs.GetDir(_L("\\*.*"),KEntryAttNormal,ESortNone,entryCount); |
948 r=TheFs.GetDir(_L("\\*.*"),KEntryAttNormal,ESortNone,entryCount); |
944 test(r==KErrNone); |
949 test_KErrNone(r); |
945 TInt rootCount= entryCount->Count(); |
950 TInt rootCount= entryCount->Count(); |
946 |
951 |
947 delete entryCount; |
952 delete entryCount; |
948 entryCount=NULL; |
953 entryCount=NULL; |
949 |
954 |
950 |
955 |
951 //Testing Copy |
956 //Testing Copy |
952 CDir* entryCount2=NULL; |
957 CDir* entryCount2=NULL; |
953 r=fMan->Copy(_L("\\sys\\"),_L("\\Caged\\")); |
958 r=fMan->Copy(_L("\\sys\\"),_L("\\Caged\\")); |
954 test(r == KErrPermissionDenied); |
959 test_Value(r, r == KErrPermissionDenied); |
955 r=fMan->Copy(_L("\\*"),_L("\\Caged\\")); |
960 r=fMan->Copy(_L("\\*"),_L("\\Caged\\")); |
956 test(r == KErrNone); |
961 test_KErrNone(r); |
957 |
962 |
958 r=TheFs.GetDir(_L("\\Caged\\*.*"),KEntryAttNormal,ESortNone,entryCount2); |
963 r=TheFs.GetDir(_L("\\Caged\\*.*"),KEntryAttNormal,ESortNone,entryCount2); |
959 test(r==KErrNone); |
964 test_KErrNone(r); |
960 TInt cagedCount= entryCount2->Count(); |
965 TInt cagedCount= entryCount2->Count(); |
961 |
966 |
962 test(cagedCount==rootCount); |
967 test(cagedCount==rootCount); |
963 |
968 |
964 delete entryCount2; |
969 delete entryCount2; |
965 entryCount2=NULL; |
970 entryCount2=NULL; |
966 |
971 |
967 // Check if both copied sys and private are empty (no information is exposed) |
972 // Check if both copied sys and private are empty (no information is exposed) |
968 CDir* entryCount3=NULL; |
973 CDir* entryCount3=NULL; |
969 r=TheFs.GetDir(_L("\\Caged\\private\\*.*"),KEntryAttNormal|KEntryAttDir,ESortNone,entryCount3); |
974 r=TheFs.GetDir(_L("\\Caged\\private\\*.*"),KEntryAttNormal|KEntryAttDir,ESortNone,entryCount3); |
970 test(r==KErrPathNotFound); |
975 test_Value(r, r == KErrPathNotFound); |
971 delete entryCount3; |
976 delete entryCount3; |
972 entryCount3=NULL; |
977 entryCount3=NULL; |
973 |
978 |
974 CDir* entryCount4=NULL; |
979 CDir* entryCount4=NULL; |
975 r=TheFs.GetDir(_L("\\Caged\\sys\\*.*"),KEntryAttNormal|KEntryAttDir,ESortNone,entryCount4); |
980 r=TheFs.GetDir(_L("\\Caged\\sys\\*.*"),KEntryAttNormal|KEntryAttDir,ESortNone,entryCount4); |
976 test(r==KErrPathNotFound); |
981 test_Value(r, r == KErrPathNotFound); |
977 delete entryCount4; |
982 delete entryCount4; |
978 entryCount4=NULL; |
983 entryCount4=NULL; |
979 |
984 |
980 |
985 |
981 r=fMan->Copy(_L("\\private\\two\\moo"),_L("\\private\\two\\mew")); |
986 r=fMan->Copy(_L("\\private\\two\\moo"),_L("\\private\\two\\mew")); |
982 test(r == KErrPermissionDenied); |
987 test_Value(r, r == KErrPermissionDenied); |
983 |
988 |
984 // Create a test file |
989 // Create a test file |
985 RFile testFile; |
990 RFile testFile; |
986 r = testFile.Replace(TheFs, _L("\\capTest"),EFileWrite); |
991 r = testFile.Replace(TheFs, _L("\\capTest"),EFileWrite); |
987 test(r==KErrNone || r==KErrAlreadyExists); |
992 test_Value(r, r == KErrNone || r==KErrAlreadyExists); |
988 testFile.Close(); |
993 testFile.Close(); |
989 |
994 |
990 TFileName name; |
995 TFileName name; |
991 name = privatepath; |
996 name = privatepath; |
992 name.Append(_L("privateFile.tst")); |
997 name.Append(_L("privateFile.tst")); |
993 RFile privateFile; |
998 RFile privateFile; |
994 r = privateFile.Replace(TheFs, name,EFileWrite); |
999 r = privateFile.Replace(TheFs, name,EFileWrite); |
995 test(r==KErrNone || r==KErrAlreadyExists); |
1000 test_Value(r, r == KErrNone || r==KErrAlreadyExists); |
996 privateFile.Close(); |
1001 privateFile.Close(); |
997 |
1002 |
998 |
1003 |
999 r=fMan->Copy(_L("\\capTest"),_L("\\private\\two\\moo")); |
1004 r=fMan->Copy(_L("\\capTest"),_L("\\private\\two\\moo")); |
1000 test(r == KErrPermissionDenied); |
1005 test_Value(r, r == KErrPermissionDenied); |
1001 r=fMan->Copy(_L("\\capTest"),_L("\\sys\\bin\\moo")); |
1006 r=fMan->Copy(_L("\\capTest"),_L("\\sys\\bin\\moo")); |
1002 test(r == KErrPermissionDenied); |
1007 test_Value(r, r == KErrPermissionDenied); |
1003 r=fMan->Copy(_L("\\sys\\bin\\capTest"),_L("\\sys\\bin\\moo")); |
1008 r=fMan->Copy(_L("\\sys\\bin\\capTest"),_L("\\sys\\bin\\moo")); |
1004 test(r == KErrPermissionDenied); |
1009 test_Value(r, r == KErrPermissionDenied); |
1005 r=fMan->Copy(_L("\\sys\\*"),_L("\\")); |
1010 r=fMan->Copy(_L("\\sys\\*"),_L("\\")); |
1006 test (r==KErrPermissionDenied); |
1011 test_Value(r, r == KErrPermissionDenied); |
1007 r=fMan->Copy(name,_L("\\sys\\")); |
1012 r=fMan->Copy(name,_L("\\sys\\")); |
1008 test(r==KErrPermissionDenied); |
1013 test_Value(r, r == KErrPermissionDenied); |
1009 |
1014 |
1010 // Testing Move |
1015 // Testing Move |
1011 r=fMan->Move(_L("\\private\\two\\moo"),_L("\\private\\one\\moo")); |
1016 r=fMan->Move(_L("\\private\\two\\moo"),_L("\\private\\one\\moo")); |
1012 test(r == KErrPermissionDenied); |
1017 test_Value(r, r == KErrPermissionDenied); |
1013 r=fMan->Move(_L("\\private\\two\\moo.."),_L("\\private\\one\\moo")); |
1018 r=fMan->Move(_L("\\private\\two\\moo.."),_L("\\private\\one\\moo")); |
1014 test(r == KErrPermissionDenied); |
1019 test_Value(r, r == KErrPermissionDenied); |
1015 r=fMan->Move(_L("\\private\\two\\moo"),_L("\\private\\one\\moo..")); |
1020 r=fMan->Move(_L("\\private\\two\\moo"),_L("\\private\\one\\moo..")); |
1016 test(r == KErrPermissionDenied); |
1021 test_Value(r, r == KErrPermissionDenied); |
1017 r=fMan->Move(name,_L("\\privateFile.tst")); |
1022 r=fMan->Move(name,_L("\\privateFile.tst")); |
1018 test(r == KErrNone); |
1023 test_KErrNone(r); |
1019 r=fMan->Move(_L("\\privateFile.tst"),name); |
1024 r=fMan->Move(_L("\\privateFile.tst"),name); |
1020 test(r == KErrNone); |
1025 test_KErrNone(r); |
1021 r=fMan->Move(_L("\\capTest"),_L("\\private\\two\\moo")); |
1026 r=fMan->Move(_L("\\capTest"),_L("\\private\\two\\moo")); |
1022 test(r == KErrPermissionDenied); |
1027 test_Value(r, r == KErrPermissionDenied); |
1023 r=fMan->Move(_L("\\capTest"),_L("\\sys\\bin\\moo")); |
1028 r=fMan->Move(_L("\\capTest"),_L("\\sys\\bin\\moo")); |
1024 test(r == KErrPermissionDenied); |
1029 test_Value(r, r == KErrPermissionDenied); |
1025 r=fMan->Move(_L("\\sys\\bin\\capTest"),_L("\\sys\\bin\\moo")); |
1030 r=fMan->Move(_L("\\sys\\bin\\capTest"),_L("\\sys\\bin\\moo")); |
1026 test(r == KErrPermissionDenied); |
1031 test_Value(r, r == KErrPermissionDenied); |
1027 r=fMan->Move(_L("\\sys\\*"),_L("\\")); |
1032 r=fMan->Move(_L("\\sys\\*"),_L("\\")); |
1028 test (r==KErrPermissionDenied); |
1033 test_Value(r, r == KErrPermissionDenied); |
1029 r=fMan->Move(name,_L("\\sys\\")); |
1034 r=fMan->Move(name,_L("\\sys\\")); |
1030 test(r==KErrPermissionDenied); |
1035 test_Value(r, r == KErrPermissionDenied); |
1031 |
1036 |
1032 |
1037 |
1033 // Testing Attribs |
1038 // Testing Attribs |
1034 r=fMan->Attribs(_L("\\private\\two\\moo"),KEntryAttReadOnly,0,TTime(0)); |
1039 r=fMan->Attribs(_L("\\private\\two\\moo"),KEntryAttReadOnly,0,TTime(0)); |
1035 test(r == KErrPermissionDenied); |
1040 test_Value(r, r == KErrPermissionDenied); |
1036 r=fMan->Attribs(_L("\\private\\moo"),KEntryAttReadOnly,0,TTime(0)); |
1041 r=fMan->Attribs(_L("\\private\\moo"),KEntryAttReadOnly,0,TTime(0)); |
1037 test(r == KErrPermissionDenied); |
1042 test_Value(r, r == KErrPermissionDenied); |
1038 r=fMan->Attribs(name,KEntryAttReadOnly,0,TTime(0)); |
1043 r=fMan->Attribs(name,KEntryAttReadOnly,0,TTime(0)); |
1039 test(r == KErrNone); |
1044 test_KErrNone(r); |
1040 r=fMan->Attribs(name,0,KEntryAttReadOnly,TTime(0)); |
1045 r=fMan->Attribs(name,0,KEntryAttReadOnly,TTime(0)); |
1041 test(r == KErrNone); |
1046 test_KErrNone(r); |
1042 |
1047 |
1043 |
1048 |
1044 // Testing RmDir |
1049 // Testing RmDir |
1045 r=fMan->RmDir(_L("\\private\\")); |
1050 r=fMan->RmDir(_L("\\private\\")); |
1046 test(r == KErrPermissionDenied); |
1051 test_Value(r, r == KErrPermissionDenied); |
1047 r=fMan->RmDir(_L("\\private\\two\\")); |
1052 r=fMan->RmDir(_L("\\private\\two\\")); |
1048 test(r == KErrPermissionDenied); |
1053 test_Value(r, r == KErrPermissionDenied); |
1049 r=fMan->RmDir(_L("\\private\\tw?\\")); |
1054 r=fMan->RmDir(_L("\\private\\tw?\\")); |
1050 test(r == KErrPermissionDenied); |
1055 test_Value(r, r == KErrPermissionDenied); |
1051 r=fMan->RmDir(_L("\\sys\\")); |
1056 r=fMan->RmDir(_L("\\sys\\")); |
1052 test(r == KErrPermissionDenied); |
1057 test_Value(r, r == KErrPermissionDenied); |
1053 |
1058 |
1054 |
1059 |
1055 // Testing Rename |
1060 // Testing Rename |
1056 r=fMan->Rename(_L("\\private\\two\\moo"),_L("\\private\\two\\mew")); |
1061 r=fMan->Rename(_L("\\private\\two\\moo"),_L("\\private\\two\\mew")); |
1057 test(r == KErrPermissionDenied); |
1062 test_Value(r, r == KErrPermissionDenied); |
1058 |
1063 |
1059 // Testing Delete |
1064 // Testing Delete |
1060 r=fMan->Delete(_L("\\private\\two\\test")); |
1065 r=fMan->Delete(_L("\\private\\two\\test")); |
1061 test(r == KErrPermissionDenied); |
1066 test_Value(r, r == KErrPermissionDenied); |
1062 r=fMan->Delete(_L("\\private\\moo")); |
1067 r=fMan->Delete(_L("\\private\\moo")); |
1063 test(r == KErrPermissionDenied); |
1068 test_Value(r, r == KErrPermissionDenied); |
1064 r=fMan->Delete(_L("\\sys\\moo")); |
1069 r=fMan->Delete(_L("\\sys\\moo")); |
1065 test(r == KErrPermissionDenied); |
1070 test_Value(r, r == KErrPermissionDenied); |
1066 |
1071 |
1067 |
1072 |
1068 //Something that actually exists in Private |
1073 //Something that actually exists in Private |
1069 r=fMan->Rename(name,_L("\\private\\00000001\\moo")); |
1074 r=fMan->Rename(name,_L("\\private\\00000001\\moo")); |
1070 test(r == KErrNone); |
1075 test_KErrNone(r); |
1071 r=fMan->Rename(_L("\\private\\00000001\\moo"),name); |
1076 r=fMan->Rename(_L("\\private\\00000001\\moo"),name); |
1072 test(r == KErrNone); |
1077 test_KErrNone(r); |
1073 r=fMan->Copy(name,_L("\\private\\00000001\\moo")); |
1078 r=fMan->Copy(name,_L("\\private\\00000001\\moo")); |
1074 test(r == KErrNone); |
1079 test_KErrNone(r); |
1075 r=fMan->Delete(_L("\\private\\00000001\\moo")); |
1080 r=fMan->Delete(_L("\\private\\00000001\\moo")); |
1076 test(r == KErrNone); |
1081 test_KErrNone(r); |
1077 |
1082 |
1078 // Clean up the test data |
1083 // Clean up the test data |
1079 r=fMan->RmDir(_L("\\Caged\\")); |
1084 r=fMan->RmDir(_L("\\Caged\\")); |
1080 test(r == KErrNone); |
1085 test_KErrNone(r); |
1081 r=fMan->Delete(_L("\\capTest")); |
1086 r=fMan->Delete(_L("\\capTest")); |
1082 test(r == KErrNone); |
1087 test_KErrNone(r); |
1083 r=fMan->Delete(name); |
1088 r=fMan->Delete(name); |
1084 test(r == KErrNone); |
1089 test_KErrNone(r); |
1085 delete(fMan); |
1090 delete(fMan); |
1086 } |
1091 } |
1087 |
1092 |
1088 // CDirScan tests |
1093 // CDirScan tests |
1089 ScanDir(_L("\\"), CDirScan::EScanUpTree, KErrNone); |
1094 ScanDir(_L("\\"), CDirScan::EScanUpTree, KErrNone); |