kerneltest/e32test/property/t_security_slave.cpp
author andy simpson <andrews@symbian.org>
Fri, 17 Sep 2010 16:50:19 +0100
branchRCL_3
changeset 264 cbb906b0db9b
parent 0 a41df078684a
permissions -rw-r--r--
Merge re-apply fixes for Bug 2149, 2283, GCCE support and rom_sbs.pl

// Copyright (c) 2002-2009 Nokia Corporation and/or its subsidiary(-ies).
// All rights reserved.
// This component and the accompanying materials are made available
// under the terms of the License "Eclipse Public License v1.0"
// which accompanies this distribution, and is available
// at the URL "http://www.eclipse.org/legal/epl-v10.html".
//
// Initial Contributors:
// Nokia Corporation - initial contribution.
//
// Contributors:
//
// Description:
//

#include <e32test.h>
#include "t_property.h"

TSecureId TestSecureId;
TVendorId TestVendorId;
TCapability TestCaps[ECapability_Limit];
TCapability TestMissingCaps[ECapability_Limit];

TSecurityPolicy CorrectCapPolicy;
TSecurityPolicy IncorrectCapPolicy;

TUint TestPolicyCount=0;

#include <e32svr.h>

TBool MakeTestSecurityPolicy()
	{
	TCapability* c =TestCaps;
	TCapability* m =TestMissingCaps;
	TUint t=++TestPolicyCount;
	RDebug::Print(_L("Test policy %d\n"),t);
	if(t==1)
		{
		_LIT_SECURITY_POLICY_PASS(KSecurityPolicyPass);
		CorrectCapPolicy = KSecurityPolicyPass;
		_LIT_SECURITY_POLICY_FAIL(KSecurityPolicyFail);
		IncorrectCapPolicy = KSecurityPolicyFail;
		return ETrue;
		}
	t -= 1;
	if(t<7)
		{
		switch(t)
			{
		case 0:
			CorrectCapPolicy = TSecurityPolicy(c[0]);
			IncorrectCapPolicy = TSecurityPolicy(m[0]);
			break;
		case 1:
			CorrectCapPolicy = TSecurityPolicy(c[0],c[1]);
			IncorrectCapPolicy = TSecurityPolicy(m[0],c[1]);
			break;
		case 2:
			CorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2]);
			IncorrectCapPolicy = TSecurityPolicy(c[0],m[1],c[2]);
			break;
		case 3:
			CorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],c[3]);
			IncorrectCapPolicy = TSecurityPolicy(c[0],c[1],m[2],c[3]);
			break;
		case 4:
			CorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],c[3],c[4]);
			IncorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],m[3],c[4]);
			break;
		case 5:
			CorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],c[3],c[4],c[5]);
			IncorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],c[3],m[4],c[5]);
			break;
		case 6:
			CorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],c[3],c[4],c[5],c[6]);
			IncorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],c[3],c[4],m[5],c[6]);
			break;
			}
		return ETrue;
		}
	t -= 7;
	if(t<4)
		{
		TSecureId id = TestSecureId;
		TSecureId id2 = TSecureId((TUint32)TestVendorId);
		switch(t)
			{
		case 0:
			CorrectCapPolicy = TSecurityPolicy(id);
			IncorrectCapPolicy = TSecurityPolicy(id2);
			break;
		case 1:
			CorrectCapPolicy = TSecurityPolicy(id,c[0]);
			IncorrectCapPolicy = TSecurityPolicy(id2,c[0]);
			break;
		case 2:
			CorrectCapPolicy = TSecurityPolicy(id,c[0],c[1]);
			IncorrectCapPolicy = TSecurityPolicy(id2,c[0],c[1]);
			break;
		case 3:
			CorrectCapPolicy = TSecurityPolicy(id,c[0],c[1],c[2]);
			IncorrectCapPolicy = TSecurityPolicy(id2,c[0],c[1],c[2]);
			break;
			}
		return ETrue;
		}
	t -= 4;
	if(t<4)
		{
		TVendorId id = TestVendorId;
		TVendorId id2 = TVendorId((TUint32)TestSecureId);
		switch(t)
			{
		case 0:
			CorrectCapPolicy = TSecurityPolicy(id);
			IncorrectCapPolicy = TSecurityPolicy(id2);
			break;
		case 1:
			CorrectCapPolicy = TSecurityPolicy(id,c[0]);
			IncorrectCapPolicy = TSecurityPolicy(id2,c[0]);
			break;
		case 2:
			CorrectCapPolicy = TSecurityPolicy(id,c[0],c[1]);
			IncorrectCapPolicy = TSecurityPolicy(id2,c[0],c[1]);
			break;
		case 3:
			CorrectCapPolicy = TSecurityPolicy(id,c[0],c[1],c[2]);
			IncorrectCapPolicy = TSecurityPolicy(id2,c[0],c[1],c[2]);
			break;
			}
		return ETrue;
		}
	t -= 4;
	TestPolicyCount = 0;
	return EFalse;
	}

_LIT(KSecurityReadCapabilityName, "RProperty Security: Read Capability Basics");

class CPropSecurityReadCapability : public CTestProgram
	{
public:
	CPropSecurityReadCapability(TUid aCategory, TUint aKey1, TUint aKey2, RProperty::TType aType) :
		CTestProgram(KSecurityReadCapabilityName), iCategory(aCategory), iKey1(aKey1), iKey2(aKey2), iType(aType)
		{
		}

	void Run(TUint aCount);

private:
	TUid				iCategory;
	TUint				iKey1;
	TUint				iKey2;
	RProperty::TType	iType;
	};

void CPropSecurityReadCapability::Run(TUint aCount)
	{
	while(MakeTestSecurityPolicy())
	for (TUint i = 0; i < aCount; ++i)
		{
		RProperty	prop1;
		RProperty	prop2;

		TInt r = prop1.Attach(iCategory, iKey1);
		TF_ERROR(r, r == KErrNone);
		r = prop2.Attach(iCategory, iKey2);
		TF_ERROR(r, r == KErrNone);

		// If the property has not been defined, the request will not complete until the property
		// is defined and published.
		// When defined if the caller does not have read capabilities the request completes
		// with KErrPermissionDenied.
		TRequestStatus status1;
		prop1.Subscribe(status1);
		TF_ERROR(status1.Int(), status1.Int() == KRequestPending);
		r = prop1.Define(iCategory, iKey1, iType, IncorrectCapPolicy, CorrectCapPolicy);
		TF_ERROR(r, r == KErrNone);
		User::WaitForRequest(status1);
		TF_ERROR(status1.Int(), status1.Int() == KErrPermissionDenied);

		TRequestStatus status2;
		prop2.Subscribe(status2);
		TF_ERROR(status2.Int(), status2.Int() == KRequestPending);
		r = prop2.Define(iCategory, iKey2, iType, CorrectCapPolicy, IncorrectCapPolicy);
		TF_ERROR(r, r == KErrNone);
		TF_ERROR(status2.Int(), status2.Int() == KRequestPending);
		prop2.Cancel();
		User::WaitForRequest(status2);
		TF_ERROR(status2.Int(), status2.Int() == KErrCancel);

		// If the Subscribe() caller does not have the read capabilities the request completes immediately
		// with KErrPermissionDenied.
		prop1.Subscribe(status1);
		User::WaitForRequest(status1);
		TF_ERROR(status1.Int(), status1.Int() == KErrPermissionDenied);

		prop2.Subscribe(status2);
		TF_ERROR(status2.Int(), status2.Int() == KRequestPending);
		prop2.Cancel();
		User::WaitForRequest(status2);
		TF_ERROR(status2.Int(), status2.Int() == KErrCancel);

		// If the caller does not have the read capabilities Get() fails with KErrPermissionDenied.
		if (iType == RProperty::EInt)
			{
			TInt value;
			r = prop1.Get(iCategory, iKey1, value);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Get(iCategory, iKey2, value);
			TF_ERROR(r, r == KErrNone);
			r = prop1.Get(value);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Get(value);
			TF_ERROR(r, r == KErrNone);
			}
		else 
			{
			TBuf<16> buf;
			TBuf8<16> buf8;
			r = prop1.Get(iCategory, iKey1, buf);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Get(iCategory, iKey2, buf);
			TF_ERROR(r, r == KErrNone);
			r = prop1.Get(iCategory, iKey1, buf8);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Get(iCategory, iKey2, buf8);
			TF_ERROR(r, r == KErrNone);
			r = prop1.Get(buf);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Get(buf);
			TF_ERROR(r, r == KErrNone);
			r = prop1.Get(buf8);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Get(buf8);
			TF_ERROR(r, r == KErrNone);
			}

		r = prop1.Delete(iCategory, iKey1);
		TF_ERROR(r, r == KErrNone);
		r = prop2.Delete(iCategory, iKey2);
		TF_ERROR(r, r == KErrNone);
		prop1.Close();
		prop2.Close();
		}
	}

_LIT(KSecurityWriteCapabilityName, "RProperty Security: Write Cpability Basics");

class CPropSecurityWriteCapability : public CTestProgram
	{
public:
	CPropSecurityWriteCapability(TUid aCategory, TUint aKey1, TUint aKey2, RProperty::TType aType) :
		CTestProgram(KSecurityWriteCapabilityName), iCategory(aCategory), iKey1(aKey1), iKey2(aKey2), iType(aType)
		{
		}

	void Run(TUint aCount);

private:
	TUid				iCategory;
	TUint				iKey1;
	TUint				iKey2;
	RProperty::TType	iType;
	};

void CPropSecurityWriteCapability::Run(TUint aCount)
	{
	while(MakeTestSecurityPolicy())
	for (TUint i = 0; i < aCount; ++i)
		{
		RProperty	prop1;
		RProperty	prop2;

		TInt r = prop1.Attach(iCategory, iKey1);
		TF_ERROR(r, r == KErrNone);
		r = prop2.Attach(iCategory, iKey2);
		TF_ERROR(r, r == KErrNone);

		r = prop1.Define(iCategory, iKey1, iType, CorrectCapPolicy, IncorrectCapPolicy);
		TF_ERROR(r, r == KErrNone);
		r = prop2.Define(iCategory, iKey2, iType, IncorrectCapPolicy, CorrectCapPolicy);
		TF_ERROR(r, r == KErrNone);

		// If the caller does not have the write capabilities Set() fails with KErrPermissionDenied.
		if (iType == RProperty::EInt)
			{
			TInt value = 1;
			r = prop1.Set(iCategory, iKey1, value);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Set(iCategory, iKey2, value);
			TF_ERROR(r, r == KErrNone);
			r = prop1.Set(value);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Set(value);
			TF_ERROR(r, r == KErrNone);
			}
		else 
			{
			TBuf<16> buf(_L("Foo"));
			TBuf8<16> buf8((TUint8*) "Foo");
			r = prop1.Set(iCategory, iKey1, buf);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Set(iCategory, iKey2, buf);
			TF_ERROR(r, r == KErrNone);
			r = prop1.Set(iCategory, iKey1, buf8);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Set(iCategory, iKey2, buf8);
			TF_ERROR(r, r == KErrNone);
			r = prop1.Set(buf);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Set(buf);
			TF_ERROR(r, r == KErrNone);
			r = prop1.Set(buf8);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Set(buf8);
			TF_ERROR(r, r == KErrNone);
			}
		
		r = prop1.Delete(iCategory, iKey1);
		TF_ERROR(r, r == KErrNone);
		r = prop2.Delete(iCategory, iKey2);
		TF_ERROR(r, r == KErrNone);
		prop1.Close();
		prop2.Close();
		}
	}

GLDEF_C TInt E32Main()
	{

	TSecurityInfo info;
	info.Set(RProcess());
	TestSecureId = info.iSecureId;
	TestVendorId = info.iVendorId;
	{
	TInt c=0;
	TInt m=0;
	for(TInt i=0; i<ECapability_Limit; i++)
		{
		if(info.iCaps.HasCapability((TCapability)i))
			TestCaps[c++] = (TCapability)i;
		else
			TestMissingCaps[m++] = (TCapability)i;
		}
	__ASSERT_ALWAYS(c>=7,User::Panic(_L("not enough caps"), 1));
	__ASSERT_ALWAYS(m>=6,User::Panic(_L("missing caps <6"), 1));
	}
		
	TInt len = User::CommandLineLength();
	__ASSERT_ALWAYS(len, User::Panic(_L("t_prop_sec: bad args"), 0));

	// Get arguments for the command line
	TInt size = len * sizeof(TUint16);
	HBufC8* hb = HBufC8::NewMax(size);
	__ASSERT_ALWAYS(hb, User::Panic(_L("t_prop_sec: no memory"), 0));
	TPtr cmd((TUint16*) hb->Ptr(), len);
	User::CommandLine(cmd);
	CPropSecurity::TArgs* args = (CPropSecurity::TArgs*) hb->Ptr();	

	CTestProgram::Start();

	CTestProgram* progs[] = 
		{ 
		new CPropSecurityReadCapability(args->iCategory, args->iSlaveKeySlot + 0, args->iSlaveKeySlot + 1, 
										RProperty::EInt),
		new CPropSecurityReadCapability(args->iCategory, args->iSlaveKeySlot + 2, args->iSlaveKeySlot + 3, 
										RProperty::EByteArray),
		new CPropSecurityWriteCapability(args->iCategory, args->iSlaveKeySlot + 4, args->iSlaveKeySlot + 5, 
										RProperty::EInt),
		new CPropSecurityWriteCapability(args->iCategory, args->iSlaveKeySlot + 6, args->iSlaveKeySlot + 7, 
										RProperty::EByteArray),
		NULL 
		};

	TInt i;
	TInt n = (sizeof(progs)/sizeof(*progs)) - 1;
	for (i = 0; i < n; ++i)
		{
		__ASSERT_ALWAYS(progs[i], User::Panic(_L("t_property: no memory"), 0));
		}
	
	CTestProgram::LaunchGroup(progs, 2);

	for (i = 0; i < n; ++i)
		{
		delete progs[i];
		}

	CTestProgram::End();

	return KErrNone;
	}