cryptomgmtlibs/securitytestfw/test/captestframework/captestframeworkstep.cpp
changeset 8 35751d3474b7
child 15 da2ae96f639b
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/test/captestframework/captestframeworkstep.cpp	Thu Sep 10 14:01:51 2009 +0300
@@ -0,0 +1,342 @@
+/*
+* Copyright (c) 2004-2009 Nokia Corporation and/or its subsidiary(-ies).
+* All rights reserved.
+* This component and the accompanying materials are made available
+* under the terms of the License "Eclipse Public License v1.0"
+* which accompanies this distribution, and is available
+* at the URL "http://www.eclipse.org/legal/epl-v10.html".
+*
+* Initial Contributors:
+* Nokia Corporation - initial contribution.
+*
+* Contributors:
+*
+* Description: 
+*
+*/
+
+
+
+
+/**
+ @file 
+*/
+#define __INCLUDE_CAPABILITY_NAMES__
+#include <e32capability.h>
+
+#include "captestframeworkstep.h"
+#include <captestframework/captestframework.h>
+
+#include <test/testexecutelog.h>
+#include <s32file.h>
+#include <f32file.h>
+
+
+CCapTestFrameworkStep::CCapTestFrameworkStep(TThoroughness aThoroughness)
+	: iThoroughness(aThoroughness)
+	{
+	}
+
+CCapTestFrameworkStep::~CCapTestFrameworkStep()
+	{
+	iLibrary.Close();
+	iFs.Close();	
+	}
+	
+TVerdict CCapTestFrameworkStep::doTestStepPreambleL()
+	{
+	User::LeaveIfError(iFs.Connect());
+	User::LeaveIfError(iFs.ShareProtected());
+	
+	if (EFalse==GetStringFromConfig(ConfigSection(), _L("DllName"), iDllName))
+		{
+		return EFail;
+		}
+
+	GetBoolFromConfig(ConfigSection(), _L("OmitTCBCapInComplementSet"), iOmitTCBCapInComplementSet);
+
+	SetupFactoryL();
+	return EPass;
+	}
+
+TVerdict CCapTestFrameworkStep::doTestStepL()
+	{
+	for (iCurrentTest=0; iCurrentTest < iFactory->NumberOfTests(); ++iCurrentTest)
+		{
+		INFO_PRINTF1(_L(""));
+		INFO_PRINTF2(_L("Running %S"), &iFactory->Test(iCurrentTest)->Name());
+		INFO_PRINTF1(_L("Assumed to require:"));
+		INFO_PRINTF2(_L("\tSid: %x"), iFactory->Test(iCurrentTest)->SidRequired());
+		INFO_PRINTF2(_L("\tVid: %x"), iFactory->Test(iCurrentTest)->VidRequired());
+		PrintCapabilitySet(iFactory->Test(iCurrentTest)->CapabilitiesRequired(), _L("\tCapabilities: "));
+		RunTestStepL(iFactory->Test(iCurrentTest));
+		}
+	
+	return EPass;
+	}
+
+void CCapTestFrameworkStep::RunTestStepL(MCapabilityTest* aTest)
+	{
+	// figure out capabilities required
+	TCapabilitySet capsRequired=aTest->CapabilitiesRequired();
+	TUid sidRequired=aTest->SidRequired();
+	TUid vidRequired=aTest->VidRequired();
+	
+	RArray<TTestEnvironment> capTestEnvs;
+	CleanupClosePushL(capTestEnvs);
+	
+	GenerateEnvironmentsL(capsRequired, sidRequired, vidRequired, capTestEnvs);
+
+	// for all cap sets needed
+	for (TInt i=0; i < capTestEnvs.Count(); ++i)
+		{
+		INFO_PRINTF1(_L("With:"));
+		INFO_PRINTF2(_L("\tSid: %x"), capTestEnvs[i].iSid);
+		INFO_PRINTF2(_L("\tVid: %x"), capTestEnvs[i].iVid);
+		PrintCapabilitySet(capTestEnvs[i].iCaps, _L("\tCapabilities: "));
+
+		// Set the capabilities of the helper
+		SetupHelperL(capTestEnvs[i]);
+
+		// run the helper and check results
+		RunHelperL(iCurrentTest, capTestEnvs[i].iExpectPass);
+		}
+	
+	CleanupStack::PopAndDestroy(&capTestEnvs);
+	}
+
+void CCapTestFrameworkStep::RunHelperL(TInt aTestNumber, TBool aShouldPass)
+	{
+	RProcess p;
+	
+	//Launching process
+	User::LeaveIfError(p.Create(_L("tempcaptestframeworkhelper.exe"), KNullDesC));
+
+	p.SetParameter(KDllNameTransferSlot, iDllName);
+	p.SetParameter(KShouldPassTransferSlot, aShouldPass);
+	p.SetParameter(KTestNumberTransferSlot, aTestNumber);
+	
+	_LIT(KLogFileName , "\\captestframework.txt");
+	TDriveUnit sysDrive(RFs::GetSystemDrive());
+	
+	TBuf<128> logFileNameOnSysDrive = sysDrive.Name();
+	logFileNameOnSysDrive.Append(KLogFileName);
+	p.SetParameter(KLogFileNameTransferSlot, logFileNameOnSysDrive);
+	
+	// Wait for the test to finish
+	TRequestStatus s;
+	TRequestStatus& a=s;
+	p.Logon(a);
+	p.Resume();
+	User::WaitForRequest(a);
+	p.Close();
+
+	// Extract the info from the logfile
+	RFileReadStream logFile;
+	logFile.Open(iFs, logFileNameOnSysDrive, 0);
+	CleanupClosePushL(logFile);
+
+	while (ETrue)
+		{
+		TInt32 pass=logFile.ReadInt32L();
+		if (pass==ETestsEnded)
+			{
+			break;	// end of file
+			}
+		else if (pass==EFileEnd)
+			{
+			// reached end of file marker, with no success
+			SetTestStepResult(EFail);
+			break;	
+			}
+		else if (pass==ETestFailed)
+			{
+			HBufC* text=HBufC::NewL(logFile, KMaxTInt);
+			ERR_PRINTF2(_L("%S"), text);
+			delete text;
+			}
+		else if (pass==ETestPassed)
+			{
+			HBufC* text=HBufC::NewL(logFile, KMaxTInt);
+			INFO_PRINTF2(_L("%S"), text);
+			delete text;
+			}
+		}	
+
+	CleanupStack::PopAndDestroy(&logFile);
+	}
+
+void CCapTestFrameworkStep::SetupHelperL(const TTestEnvironment& aEnvironment)
+	{
+	RProcess p;
+// SETCAP source_exe capability [-SID secureId] [-VID vendorId] [destination_path]
+	_LIT(KArgsFormat, "captestframeworkhelper.exe  %X -SID %X -VID %X tempcaptestframeworkhelper.exe");
+
+// The 'capability' command line argument is the hexadecimal value of the
+// capabilities when they are represented as a bit-field. E.g. the 3 capabilities
+// LocalServices, ReadUserData and WriteUserData would together have a value of:
+//
+// (1<<ECapabilityLocalServices) | (<<ECapabilityReadUserData) | (1<<ECapabilityWriteUserData)
+//
+// Which in hexadecimal is '1c000'
+ 
+ 	const TCapabilitySet& aCapSet=aEnvironment.iCaps;
+	TInt caps=0;
+	for (TInt c = 0; c < ECapability_Limit; ++c)
+		{
+		if (aCapSet.HasCapability(TCapability(c)))
+			{
+			caps+=(1<<c);
+			}
+		}
+
+	TBuf<512> cmdLine;
+	cmdLine.Format(KArgsFormat, caps, aEnvironment.iSid, aEnvironment.iVid);
+
+	User::LeaveIfError(p.Create(_L("setcap.exe"), cmdLine));
+	
+	// Wait for setcap to finish
+	TRequestStatus s;
+	TRequestStatus& rs=s;
+	p.Logon(rs);
+
+	p.Resume();
+	User::WaitForRequest(rs);
+	p.Close();
+	}
+
+void CCapTestFrameworkStep::PrintCapabilitySet(const TCapabilitySet& aCapSet, const TDesC& aExtra)
+	{
+	TBuf<512> string;
+	string.AppendFormat(_L("%S"), &aExtra);
+	for (TInt c = 0; c < ECapability_Limit; ++c)
+		{
+		if (aCapSet.HasCapability(TCapability(c)))
+			{
+			string.Append(' ');
+			const char *p=CapabilityNames[c];
+			
+			while(*p)
+				{
+				string.Append(*p++);
+				}
+			}
+		}
+	if (string.Length()==aExtra.Length())
+		{
+		string.AppendFormat(_L("None"));
+		}
+	INFO_PRINTF1(string);
+	}
+
+
+void CCapTestFrameworkStep::GenerateEnvironmentsL(const TCapabilitySet& aCapsNeeded, const TUid& aSidNeeded, const TUid& aVidNeeded, RArray<TTestEnvironment>& aEnvironments)
+	{
+	for (TUid sid={0}; sid.iUid <= aSidNeeded.iUid; sid.iUid+= aSidNeeded.iUid ? aSidNeeded.iUid : 1) // if no sid is needed then only do check once
+		{
+		TBool shouldPass=ETrue;
+
+		if (sid!=aSidNeeded)
+			{
+			shouldPass=EFalse;
+			}
+		
+		for (TUid vid={0}; vid.iUid <= aVidNeeded.iUid; vid.iUid+= aVidNeeded.iUid ? aVidNeeded.iUid : 1)
+			{
+			if (vid!=aVidNeeded)
+				{
+				shouldPass=EFalse;
+				}
+			
+			//For each IPC, your test should implement the following:
+			//
+			// If an IPC is controlled by one capability only, the test code should run 
+			//first with the required capability only and second with the complement set
+			//of the required capability. If the first test is successful and the second 
+			//a failure, the IPC value is proven to be controlled by the required capability
+			//only. 
+			//
+			// If an IPC is controlled by n capabilities, the test code should run first with
+			//exact n required capabilities and after with any combination of all subsets of 
+			//n-1 capabilities with the complement set. 
+			//
+			// For example, ABC controls an IPC. The full list of capabilities is 
+			//A, B, C, D, E and F. Test code with ABC must be successful, while test code
+			//with ABDEF, ACDEF, BCDEF must all fail.
+			//
+			// So, the number of tests to run to validate a IPC is the combination of n 
+			//capabilities, n-1 at a time (i.e. n!/(n-1)! )  plus 1 exact positive test,
+			//therefore a total of n+1 tests.
+			
+			// possibly positive case (depends on Sid and Vid settings)
+			aEnvironments.Append(TTestEnvironment(aCapsNeeded, sid, vid, shouldPass));
+
+			if (iThoroughness == EBasicChecks) // will fail when cap set is empty, but there is no TCapabilitySet::NotEmpty exported, write a replacement copy
+				{
+				// Just add one with no caps and expect to fail
+				TCapabilitySet noCaps;
+				aEnvironments.Append(TTestEnvironment(noCaps, sid, vid, EFalse));
+				}
+			else
+				{
+				// Thorough, cap sets as per comment above 
+				for (TInt c = 0; c < ECapability_Limit; ++c)
+					{
+					if (aCapsNeeded.HasCapability(TCapability(c)))
+						{
+						// Need to add a new one with (aCapsNeeded / c) | ~aCapsNeeded
+						TCapabilitySet caps(aCapsNeeded);
+						caps.RemoveCapability(TCapability(c)); // take cap c away
+						caps.Union(InvertCapSet(aCapsNeeded)); // add in complement
+
+						aEnvironments.Append(TTestEnvironment(caps, sid, vid, EFalse)); // add to sets, should fail
+						}
+					}
+				} // end thorough cap tests
+			
+			} // end vid loop
+		
+		} // end sid loop
+	}
+
+
+TVerdict CCapTestFrameworkStep::doTestStepPostambleL()
+	{
+	return EPass;
+	}
+
+// helper functions
+TCapabilitySet CCapTestFrameworkStep::InvertCapSet(const TCapabilitySet& aCapSet)
+	{
+	TCapabilitySet ret;
+	ret.SetEmpty();
+
+	for (TInt c = 0; c < ECapability_Limit; ++c)
+		{
+		if (c == ECapabilityTCB && iOmitTCBCapInComplementSet)
+			{
+			continue;
+			}
+		if (!aCapSet.HasCapability(TCapability(c)))
+			{
+			ret.AddCapability(TCapability(c));
+			}
+		}
+	return ret;
+	}
+
+MCapabilityTestFactory* CCapTestFrameworkStep::SetupFactoryL()
+	{
+	User::LeaveIfError(iLibrary.Load(iDllName));
+	
+	TLibraryFunction testFactory=iLibrary.Lookup(1);
+	iFactory=reinterpret_cast<MCapabilityTestFactory*>(testFactory());
+	
+	return iFactory;
+	}
+
+// TCapSetTestInfo
+TTestEnvironment::TTestEnvironment(const TCapabilitySet& aCaps, TUid aSid, TUid aVid, TBool aExpectPass)
+	: iCaps(aCaps), iSid(aSid), iVid(aVid), iExpectPass(aExpectPass)
+	{
+	}