sbsv2/raptor/test/smoke_suite/capability.py
branchwip
changeset 147 bbe5275eca96
parent 145 d3f40ec27032
--- a/sbsv2/raptor/test/smoke_suite/capability.py	Tue Jan 19 19:12:34 2010 +0000
+++ b/sbsv2/raptor/test/smoke_suite/capability.py	Tue Jan 19 20:51:35 2010 +0000
@@ -15,15 +15,22 @@
 #
 
 from raptor_tests import SmokeTest
+import sys
 
 def run():
 	t = SmokeTest()
 	t.usebash = True
 	result = SmokeTest.PASS
 
+
+	if sys.platform.startswith("win"):
+		elf2e32 = "$(EPOCROOT)/epoc32/tools/elf2e32.exe"
+	else:
+		elf2e32 = "$(EPOCROOT)/epoc32/tools/elf2e32"
+
 	description = """This test attempts to check that an exe gets the capabilities that we requested.  It's ARM specific since it uses elf2e32. Tries to demonstrate capabilties being turned off then on in the mmp."""
 	command = "sbs -b smoke_suite/test_resources/simple/capability.inf -c %s -m ${SBSMAKEFILE} -f ${SBSLOGFILE} && " + \
-			"$(EPOCROOT)/epoc32/tools/elf2e32   --dump=s  --e32input=$(EPOCROOT)/epoc32/release/armv5/urel/test_capability.exe"
+			  elf2e32 + " --dump=s  --e32input=$(EPOCROOT)/epoc32/release/armv5/urel/test_capability.exe"
 	targets = [
 		"$(EPOCROOT)/epoc32/release/armv5/urel/test_capability.exe",
 		"$(EPOCROOT)/epoc32/release/armv5/urel/test_capability.exe.map"
@@ -33,7 +40,7 @@
 	mustmatch = [
 		"\s*Secure ID: 10003a5c$",
 		"\s*Vendor ID: 00000000$",
-		"\s*Capabilities: 00000000 000ffebe$",
+		"\s*Capabilities: 00000000 000fffbf$",
 		"\s*CommDD$",
 		"\s*PowerMgmt$",
 		"\s*MultimediaDD$",