sbsv2/raptor/test/smoke_suite/capability_arm.py
branchwip
changeset 150 62d9f099315d
parent 147 bbe5275eca96
equal deleted inserted replaced
149:d082b140eb98 150:62d9f099315d
       
     1 #
       
     2 # Copyright (c) 2010 Nokia Corporation and/or its subsidiary(-ies).
       
     3 # All rights reserved.
       
     4 # This component and the accompanying materials are made available
       
     5 # under the terms of the License "Eclipse Public License v1.0"
       
     6 # which accompanies this distribution, and is available
       
     7 # at the URL "http://www.eclipse.org/legal/epl-v10.html".
       
     8 #
       
     9 # Initial Contributors:
       
    10 # Nokia Corporation - initial contribution.
       
    11 #
       
    12 # Contributors:
       
    13 #
       
    14 # Description: 
       
    15 #
       
    16 
       
    17 from raptor_tests import SmokeTest
       
    18 import sys
       
    19 
       
    20 def run():
       
    21 	t = SmokeTest()
       
    22 	t.usebash = True
       
    23 
       
    24 
       
    25 	if sys.platform.startswith("win"):
       
    26 		elf2e32 = "$(EPOCROOT)/epoc32/tools/elf2e32.exe"
       
    27 	else:
       
    28 		elf2e32 = "$(EPOCROOT)/epoc32/tools/elf2e32"
       
    29 
       
    30 	description = """This test attempts to check that an exe gets the capabilities that we requested.  It's ARM specific since it uses elf2e32. Tries to demonstrate capabilties being turned off then on in the mmp."""
       
    31 	command = "sbs -b smoke_suite/test_resources/simple/capability.inf -c %s -m ${SBSMAKEFILE} -f ${SBSLOGFILE} && " + \
       
    32 			  elf2e32 + " --dump=s  --e32input=$(EPOCROOT)/epoc32/release/armv5/urel/test_capability.exe"
       
    33 	targets = [
       
    34 		"$(EPOCROOT)/epoc32/release/armv5/urel/test_capability.exe",
       
    35 		"$(EPOCROOT)/epoc32/release/armv5/urel/test_capability.exe.map"
       
    36 		]	
       
    37 	buildtargets = [
       
    38 		]
       
    39 	mustmatch = [
       
    40 		"\s*Secure ID: 10003a5c$",
       
    41 		"\s*Vendor ID: 00000000$",
       
    42 		"\s*Capabilities: 00000000 000fffbf$",
       
    43 		"\s*CommDD$",
       
    44 		"\s*PowerMgmt$",
       
    45 		"\s*MultimediaDD$",
       
    46 		"\s*ReadDeviceData$",
       
    47 		"\s*WriteDeviceData$",
       
    48 		"\s*TrustedUI$",
       
    49 		"\s*DiskAdmin$",
       
    50 		"\s*NetworkControl$",
       
    51 		"\s*AllFiles$",
       
    52 		"\s*SwEvent$",
       
    53 		"\s*NetworkServices$",
       
    54 		"\s*LocalServices$",
       
    55 		"\s*ReadUserData$",
       
    56 		"\s*WriteUserData$",
       
    57 		"\s*Location$",
       
    58 		"\s*SurroundingsDD$",
       
    59 		"\s*UserEnvironment$",
       
    60 		"\s*TCB$"
       
    61 	]
       
    62 	mustnotmatch = [
       
    63 		"DRM"
       
    64 	]
       
    65 	warnings = 0
       
    66 	
       
    67 	t.id = "0107"
       
    68 	t.name = "capability_arm"
       
    69 	t.description = description
       
    70 	t.command = command % "arm.v5.urel.gcce4_4_1"
       
    71 	t.targets = targets
       
    72 	t.mustmatch = mustmatch
       
    73 	t.mustnotmatch = mustnotmatch
       
    74 	t.warnings = warnings
       
    75 	t.run()
       
    76 	return t