kerneltest/e32test/property/t_security_slave.cpp
author Tom Cosgrove <tom.cosgrove@nokia.com>
Fri, 28 May 2010 16:26:05 +0100
branchRCL_3
changeset 29 743008598095
parent 0 a41df078684a
permissions -rw-r--r--
Fix for bug 2283 (RVCT 4.0 support is missing from PDK 3.0.h) Have multiple extension sections in the bld.inf, one for each version of the compiler. The RVCT version building the tools will build the runtime libraries for its version, but make sure we extract all the other versions from zip archives. Also add the archive for RVCT4.

// Copyright (c) 2002-2009 Nokia Corporation and/or its subsidiary(-ies).
// All rights reserved.
// This component and the accompanying materials are made available
// under the terms of the License "Eclipse Public License v1.0"
// which accompanies this distribution, and is available
// at the URL "http://www.eclipse.org/legal/epl-v10.html".
//
// Initial Contributors:
// Nokia Corporation - initial contribution.
//
// Contributors:
//
// Description:
//

#include <e32test.h>
#include "t_property.h"

TSecureId TestSecureId;
TVendorId TestVendorId;
TCapability TestCaps[ECapability_Limit];
TCapability TestMissingCaps[ECapability_Limit];

TSecurityPolicy CorrectCapPolicy;
TSecurityPolicy IncorrectCapPolicy;

TUint TestPolicyCount=0;

#include <e32svr.h>

TBool MakeTestSecurityPolicy()
	{
	TCapability* c =TestCaps;
	TCapability* m =TestMissingCaps;
	TUint t=++TestPolicyCount;
	RDebug::Print(_L("Test policy %d\n"),t);
	if(t==1)
		{
		_LIT_SECURITY_POLICY_PASS(KSecurityPolicyPass);
		CorrectCapPolicy = KSecurityPolicyPass;
		_LIT_SECURITY_POLICY_FAIL(KSecurityPolicyFail);
		IncorrectCapPolicy = KSecurityPolicyFail;
		return ETrue;
		}
	t -= 1;
	if(t<7)
		{
		switch(t)
			{
		case 0:
			CorrectCapPolicy = TSecurityPolicy(c[0]);
			IncorrectCapPolicy = TSecurityPolicy(m[0]);
			break;
		case 1:
			CorrectCapPolicy = TSecurityPolicy(c[0],c[1]);
			IncorrectCapPolicy = TSecurityPolicy(m[0],c[1]);
			break;
		case 2:
			CorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2]);
			IncorrectCapPolicy = TSecurityPolicy(c[0],m[1],c[2]);
			break;
		case 3:
			CorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],c[3]);
			IncorrectCapPolicy = TSecurityPolicy(c[0],c[1],m[2],c[3]);
			break;
		case 4:
			CorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],c[3],c[4]);
			IncorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],m[3],c[4]);
			break;
		case 5:
			CorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],c[3],c[4],c[5]);
			IncorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],c[3],m[4],c[5]);
			break;
		case 6:
			CorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],c[3],c[4],c[5],c[6]);
			IncorrectCapPolicy = TSecurityPolicy(c[0],c[1],c[2],c[3],c[4],m[5],c[6]);
			break;
			}
		return ETrue;
		}
	t -= 7;
	if(t<4)
		{
		TSecureId id = TestSecureId;
		TSecureId id2 = TSecureId((TUint32)TestVendorId);
		switch(t)
			{
		case 0:
			CorrectCapPolicy = TSecurityPolicy(id);
			IncorrectCapPolicy = TSecurityPolicy(id2);
			break;
		case 1:
			CorrectCapPolicy = TSecurityPolicy(id,c[0]);
			IncorrectCapPolicy = TSecurityPolicy(id2,c[0]);
			break;
		case 2:
			CorrectCapPolicy = TSecurityPolicy(id,c[0],c[1]);
			IncorrectCapPolicy = TSecurityPolicy(id2,c[0],c[1]);
			break;
		case 3:
			CorrectCapPolicy = TSecurityPolicy(id,c[0],c[1],c[2]);
			IncorrectCapPolicy = TSecurityPolicy(id2,c[0],c[1],c[2]);
			break;
			}
		return ETrue;
		}
	t -= 4;
	if(t<4)
		{
		TVendorId id = TestVendorId;
		TVendorId id2 = TVendorId((TUint32)TestSecureId);
		switch(t)
			{
		case 0:
			CorrectCapPolicy = TSecurityPolicy(id);
			IncorrectCapPolicy = TSecurityPolicy(id2);
			break;
		case 1:
			CorrectCapPolicy = TSecurityPolicy(id,c[0]);
			IncorrectCapPolicy = TSecurityPolicy(id2,c[0]);
			break;
		case 2:
			CorrectCapPolicy = TSecurityPolicy(id,c[0],c[1]);
			IncorrectCapPolicy = TSecurityPolicy(id2,c[0],c[1]);
			break;
		case 3:
			CorrectCapPolicy = TSecurityPolicy(id,c[0],c[1],c[2]);
			IncorrectCapPolicy = TSecurityPolicy(id2,c[0],c[1],c[2]);
			break;
			}
		return ETrue;
		}
	t -= 4;
	TestPolicyCount = 0;
	return EFalse;
	}

_LIT(KSecurityReadCapabilityName, "RProperty Security: Read Capability Basics");

class CPropSecurityReadCapability : public CTestProgram
	{
public:
	CPropSecurityReadCapability(TUid aCategory, TUint aKey1, TUint aKey2, RProperty::TType aType) :
		CTestProgram(KSecurityReadCapabilityName), iCategory(aCategory), iKey1(aKey1), iKey2(aKey2), iType(aType)
		{
		}

	void Run(TUint aCount);

private:
	TUid				iCategory;
	TUint				iKey1;
	TUint				iKey2;
	RProperty::TType	iType;
	};

void CPropSecurityReadCapability::Run(TUint aCount)
	{
	while(MakeTestSecurityPolicy())
	for (TUint i = 0; i < aCount; ++i)
		{
		RProperty	prop1;
		RProperty	prop2;

		TInt r = prop1.Attach(iCategory, iKey1);
		TF_ERROR(r, r == KErrNone);
		r = prop2.Attach(iCategory, iKey2);
		TF_ERROR(r, r == KErrNone);

		// If the property has not been defined, the request will not complete until the property
		// is defined and published.
		// When defined if the caller does not have read capabilities the request completes
		// with KErrPermissionDenied.
		TRequestStatus status1;
		prop1.Subscribe(status1);
		TF_ERROR(status1.Int(), status1.Int() == KRequestPending);
		r = prop1.Define(iCategory, iKey1, iType, IncorrectCapPolicy, CorrectCapPolicy);
		TF_ERROR(r, r == KErrNone);
		User::WaitForRequest(status1);
		TF_ERROR(status1.Int(), status1.Int() == KErrPermissionDenied);

		TRequestStatus status2;
		prop2.Subscribe(status2);
		TF_ERROR(status2.Int(), status2.Int() == KRequestPending);
		r = prop2.Define(iCategory, iKey2, iType, CorrectCapPolicy, IncorrectCapPolicy);
		TF_ERROR(r, r == KErrNone);
		TF_ERROR(status2.Int(), status2.Int() == KRequestPending);
		prop2.Cancel();
		User::WaitForRequest(status2);
		TF_ERROR(status2.Int(), status2.Int() == KErrCancel);

		// If the Subscribe() caller does not have the read capabilities the request completes immediately
		// with KErrPermissionDenied.
		prop1.Subscribe(status1);
		User::WaitForRequest(status1);
		TF_ERROR(status1.Int(), status1.Int() == KErrPermissionDenied);

		prop2.Subscribe(status2);
		TF_ERROR(status2.Int(), status2.Int() == KRequestPending);
		prop2.Cancel();
		User::WaitForRequest(status2);
		TF_ERROR(status2.Int(), status2.Int() == KErrCancel);

		// If the caller does not have the read capabilities Get() fails with KErrPermissionDenied.
		if (iType == RProperty::EInt)
			{
			TInt value;
			r = prop1.Get(iCategory, iKey1, value);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Get(iCategory, iKey2, value);
			TF_ERROR(r, r == KErrNone);
			r = prop1.Get(value);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Get(value);
			TF_ERROR(r, r == KErrNone);
			}
		else 
			{
			TBuf<16> buf;
			TBuf8<16> buf8;
			r = prop1.Get(iCategory, iKey1, buf);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Get(iCategory, iKey2, buf);
			TF_ERROR(r, r == KErrNone);
			r = prop1.Get(iCategory, iKey1, buf8);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Get(iCategory, iKey2, buf8);
			TF_ERROR(r, r == KErrNone);
			r = prop1.Get(buf);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Get(buf);
			TF_ERROR(r, r == KErrNone);
			r = prop1.Get(buf8);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Get(buf8);
			TF_ERROR(r, r == KErrNone);
			}

		r = prop1.Delete(iCategory, iKey1);
		TF_ERROR(r, r == KErrNone);
		r = prop2.Delete(iCategory, iKey2);
		TF_ERROR(r, r == KErrNone);
		prop1.Close();
		prop2.Close();
		}
	}

_LIT(KSecurityWriteCapabilityName, "RProperty Security: Write Cpability Basics");

class CPropSecurityWriteCapability : public CTestProgram
	{
public:
	CPropSecurityWriteCapability(TUid aCategory, TUint aKey1, TUint aKey2, RProperty::TType aType) :
		CTestProgram(KSecurityWriteCapabilityName), iCategory(aCategory), iKey1(aKey1), iKey2(aKey2), iType(aType)
		{
		}

	void Run(TUint aCount);

private:
	TUid				iCategory;
	TUint				iKey1;
	TUint				iKey2;
	RProperty::TType	iType;
	};

void CPropSecurityWriteCapability::Run(TUint aCount)
	{
	while(MakeTestSecurityPolicy())
	for (TUint i = 0; i < aCount; ++i)
		{
		RProperty	prop1;
		RProperty	prop2;

		TInt r = prop1.Attach(iCategory, iKey1);
		TF_ERROR(r, r == KErrNone);
		r = prop2.Attach(iCategory, iKey2);
		TF_ERROR(r, r == KErrNone);

		r = prop1.Define(iCategory, iKey1, iType, CorrectCapPolicy, IncorrectCapPolicy);
		TF_ERROR(r, r == KErrNone);
		r = prop2.Define(iCategory, iKey2, iType, IncorrectCapPolicy, CorrectCapPolicy);
		TF_ERROR(r, r == KErrNone);

		// If the caller does not have the write capabilities Set() fails with KErrPermissionDenied.
		if (iType == RProperty::EInt)
			{
			TInt value = 1;
			r = prop1.Set(iCategory, iKey1, value);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Set(iCategory, iKey2, value);
			TF_ERROR(r, r == KErrNone);
			r = prop1.Set(value);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Set(value);
			TF_ERROR(r, r == KErrNone);
			}
		else 
			{
			TBuf<16> buf(_L("Foo"));
			TBuf8<16> buf8((TUint8*) "Foo");
			r = prop1.Set(iCategory, iKey1, buf);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Set(iCategory, iKey2, buf);
			TF_ERROR(r, r == KErrNone);
			r = prop1.Set(iCategory, iKey1, buf8);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Set(iCategory, iKey2, buf8);
			TF_ERROR(r, r == KErrNone);
			r = prop1.Set(buf);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Set(buf);
			TF_ERROR(r, r == KErrNone);
			r = prop1.Set(buf8);
			TF_ERROR(r, r == KErrPermissionDenied);
			r = prop2.Set(buf8);
			TF_ERROR(r, r == KErrNone);
			}
		
		r = prop1.Delete(iCategory, iKey1);
		TF_ERROR(r, r == KErrNone);
		r = prop2.Delete(iCategory, iKey2);
		TF_ERROR(r, r == KErrNone);
		prop1.Close();
		prop2.Close();
		}
	}

GLDEF_C TInt E32Main()
	{

	TSecurityInfo info;
	info.Set(RProcess());
	TestSecureId = info.iSecureId;
	TestVendorId = info.iVendorId;
	{
	TInt c=0;
	TInt m=0;
	for(TInt i=0; i<ECapability_Limit; i++)
		{
		if(info.iCaps.HasCapability((TCapability)i))
			TestCaps[c++] = (TCapability)i;
		else
			TestMissingCaps[m++] = (TCapability)i;
		}
	__ASSERT_ALWAYS(c>=7,User::Panic(_L("not enough caps"), 1));
	__ASSERT_ALWAYS(m>=6,User::Panic(_L("missing caps <6"), 1));
	}
		
	TInt len = User::CommandLineLength();
	__ASSERT_ALWAYS(len, User::Panic(_L("t_prop_sec: bad args"), 0));

	// Get arguments for the command line
	TInt size = len * sizeof(TUint16);
	HBufC8* hb = HBufC8::NewMax(size);
	__ASSERT_ALWAYS(hb, User::Panic(_L("t_prop_sec: no memory"), 0));
	TPtr cmd((TUint16*) hb->Ptr(), len);
	User::CommandLine(cmd);
	CPropSecurity::TArgs* args = (CPropSecurity::TArgs*) hb->Ptr();	

	CTestProgram::Start();

	CTestProgram* progs[] = 
		{ 
		new CPropSecurityReadCapability(args->iCategory, args->iSlaveKeySlot + 0, args->iSlaveKeySlot + 1, 
										RProperty::EInt),
		new CPropSecurityReadCapability(args->iCategory, args->iSlaveKeySlot + 2, args->iSlaveKeySlot + 3, 
										RProperty::EByteArray),
		new CPropSecurityWriteCapability(args->iCategory, args->iSlaveKeySlot + 4, args->iSlaveKeySlot + 5, 
										RProperty::EInt),
		new CPropSecurityWriteCapability(args->iCategory, args->iSlaveKeySlot + 6, args->iSlaveKeySlot + 7, 
										RProperty::EByteArray),
		NULL 
		};

	TInt i;
	TInt n = (sizeof(progs)/sizeof(*progs)) - 1;
	for (i = 0; i < n; ++i)
		{
		__ASSERT_ALWAYS(progs[i], User::Panic(_L("t_property: no memory"), 0));
		}
	
	CTestProgram::LaunchGroup(progs, 2);

	for (i = 0; i < n; ++i)
		{
		delete progs[i];
		}

	CTestProgram::End();

	return KErrNone;
	}