cryptomgmtlibs/securitytestfw/test/testhandler2/t_policy.h
changeset 8 35751d3474b7
parent 0 2c201484c85f
child 15 da2ae96f639b
--- a/cryptomgmtlibs/securitytestfw/test/testhandler2/t_policy.h	Tue Jul 21 01:04:32 2009 +0100
+++ b/cryptomgmtlibs/securitytestfw/test/testhandler2/t_policy.h	Thu Sep 10 14:01:51 2009 +0300
@@ -1,129 +1,129 @@
-/*
-* Copyright (c) 2004-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* tpolicy.h
-*
-*/
-
-
-#ifndef __TPOLICY_H__
-#define __TPOLICY_H__
-
-#include <testhandler2/t_testaction.h>
-
-/**
- * This action is used to test whether security policies are correctly enforced.
- * This is done by specifying another test action to run, and the security
- * policy that is under test.  The action is then run in a seprate process.
- * This happens multiple times, to test that it passes when the process has the
- * required security settings and failes when it does not.
- *
- * The action body can contain the the following elements:
- *
- * testexe: The path of the executable to use to run the test
- * excludedcapabilities: Capabilites not to assign to the test executable when performing failure tests
- * policy: The security policy to be tested for
- * preactions: Optional, contains test actions to run to perform setup before the test
- * passaction: The action under test, when expected to pass
- * failaction: The action under test, when expected to fail
- * postactions: Optonal, contains test actions to run to perform cleanup after the test
- *
- * A new script is created containing the preactions if present, the test action
- * and the postactions (if present).  For failure tests, the testaction's expect
- * results is changed to KErrPermissionDenied.
- */
-class CPolicyTest : public CTestAction
-	{
-public:
-	static CPolicyTest* NewL(CConsoleBase& aConsole, Output& aOut,
-		const TTestActionSpec& aTestActionSpec);
-	static CPolicyTest* NewLC(CConsoleBase& aConsole, Output& aOut,
-		const TTestActionSpec& aTestActionSpec);
-	~CPolicyTest();
-
-private:
-	CPolicyTest(CConsoleBase& aConsole, Output& aOut);
-	void ConstructL(const TTestActionSpec& aTestActionSpec);
-
-public:
-	virtual void PerformAction(TRequestStatus& aStatus);
-
-private:
-	// Methods overriden from CTestAction 
-	virtual void DoReportAction();
-	virtual void DoCheckResult(TInt aError);
-	virtual void PerformCancel();
-	virtual void Reset();
-
-	// Methods for parsing the test spec
-	void BadUsageL(const TDesC& aMessage);
-	void SetTestExeL(const TDesC8& aPath);
-	void SetPolicyL(const TDesC8& aSpec);
-	void SetTestActionL(const TDesC8& aPassAction, const TDesC8& aFailAction);
-
-	// Methods for running the test
-	void GetNextTest();	
-	void StartProcessL(const TDesC& aExe, const TDesC& aCommandLine, TRequestStatus& aStatus);
-	void CheckProcessTermintationL();
-	void SetupTestL(TRequestStatus& aStatus);
-	void SetTestSecurityInfoL(TInt aSecureId, TInt aVendorId, TUint aCapSet, TRequestStatus& aStatus);
-	void CheckSetCapsResultL();
-	void RunTestL(TRequestStatus& aStatus);
-	void ProcessResultsL(TRequestStatus& aStatus);
-	void WriteScriptFileL(const TDesC& aPath, const TDesC8& aAction);
-	
-private:
-	enum TState
-		{
-		EInit,
-		ESetupTest,
-		ERunTest,
-		EProcessResults,
-		EFinished
-		};
-
-	enum TTestState
-		{
-		ETestNone,
-		ETestFailSID,
-		ETestFailVID,
-		ETestFailCap,
-		ETestPass,
-		ETestFinished
-		};
-
-private:
-	RFs iFs;							///< File server handle
-	TInt iProcessSecureId;				///< The secure id of this process
-	TInt iProcessVendorId;				///< The vendor id of this process
-	
-	HBufC* iTestExe;					///< The path of the test harness to run
-	TCapabilitySet iExcludedCaps;		///< Capabilties to exclude from failure tests
-	TUint iSecureId;					///< The secure id of the policy under test, or zero
-	TUint iVendorId;					///< The secure id of the policy under test, or zero
-	RArray<TCapability> iCapabilities;	///< The capabilities of the policy under test
-	HBufC8* iPreActions;				///< Script fragment for setup test actions
-	HBufC8* iPassAction;				///< The action under test
-	HBufC8* iFailAction;				///< The action under test
-	HBufC8* iPostActions;				///< Script fragment for cleanup test actions
-	
-	TState iState;						///< The state we're in
-	TTestState iTestState;				///< The test we're running when iState is ESetCaps or ERunTest
-	TInt iCapIndex;						///< The capability we're testing when iTestState is ECapFailTests
-	RProcess iProcess;					///< Used for running setcap and test harness
-	TInt iFailCount;					///< Running count of tests failed
-	TBuf16<50> iTestExeTmpNewPath;      ///< stores the executable as executable_policytest.exe
-	};
-
-#endif
+/*
+* Copyright (c) 2004-2009 Nokia Corporation and/or its subsidiary(-ies).
+* All rights reserved.
+* This component and the accompanying materials are made available
+* under the terms of the License "Eclipse Public License v1.0"
+* which accompanies this distribution, and is available
+* at the URL "http://www.eclipse.org/legal/epl-v10.html".
+*
+* Initial Contributors:
+* Nokia Corporation - initial contribution.
+*
+* Contributors:
+*
+* Description: 
+* tpolicy.h
+*
+*/
+
+
+#ifndef __TPOLICY_H__
+#define __TPOLICY_H__
+
+#include <testhandler2/t_testaction.h>
+
+/**
+ * This action is used to test whether security policies are correctly enforced.
+ * This is done by specifying another test action to run, and the security
+ * policy that is under test.  The action is then run in a seprate process.
+ * This happens multiple times, to test that it passes when the process has the
+ * required security settings and failes when it does not.
+ *
+ * The action body can contain the the following elements:
+ *
+ * testexe: The path of the executable to use to run the test
+ * excludedcapabilities: Capabilites not to assign to the test executable when performing failure tests
+ * policy: The security policy to be tested for
+ * preactions: Optional, contains test actions to run to perform setup before the test
+ * passaction: The action under test, when expected to pass
+ * failaction: The action under test, when expected to fail
+ * postactions: Optonal, contains test actions to run to perform cleanup after the test
+ *
+ * A new script is created containing the preactions if present, the test action
+ * and the postactions (if present).  For failure tests, the testaction's expect
+ * results is changed to KErrPermissionDenied.
+ */
+class CPolicyTest : public CTestAction
+	{
+public:
+	static CPolicyTest* NewL(CConsoleBase& aConsole, Output& aOut,
+		const TTestActionSpec& aTestActionSpec);
+	static CPolicyTest* NewLC(CConsoleBase& aConsole, Output& aOut,
+		const TTestActionSpec& aTestActionSpec);
+	~CPolicyTest();
+
+private:
+	CPolicyTest(CConsoleBase& aConsole, Output& aOut);
+	void ConstructL(const TTestActionSpec& aTestActionSpec);
+
+public:
+	virtual void PerformAction(TRequestStatus& aStatus);
+
+private:
+	// Methods overriden from CTestAction 
+	virtual void DoReportAction();
+	virtual void DoCheckResult(TInt aError);
+	virtual void PerformCancel();
+	virtual void Reset();
+
+	// Methods for parsing the test spec
+	void BadUsageL(const TDesC& aMessage);
+	void SetTestExeL(const TDesC8& aPath);
+	void SetPolicyL(const TDesC8& aSpec);
+	void SetTestActionL(const TDesC8& aPassAction, const TDesC8& aFailAction);
+
+	// Methods for running the test
+	void GetNextTest();	
+	void StartProcessL(const TDesC& aExe, const TDesC& aCommandLine, TRequestStatus& aStatus);
+	void CheckProcessTermintationL();
+	void SetupTestL(TRequestStatus& aStatus);
+	void SetTestSecurityInfoL(TInt aSecureId, TInt aVendorId, TUint aCapSet, TRequestStatus& aStatus);
+	void CheckSetCapsResultL();
+	void RunTestL(TRequestStatus& aStatus);
+	void ProcessResultsL(TRequestStatus& aStatus);
+	void WriteScriptFileL(const TDesC& aPath, const TDesC8& aAction);
+	
+private:
+	enum TState
+		{
+		EInit,
+		ESetupTest,
+		ERunTest,
+		EProcessResults,
+		EFinished
+		};
+
+	enum TTestState
+		{
+		ETestNone,
+		ETestFailSID,
+		ETestFailVID,
+		ETestFailCap,
+		ETestPass,
+		ETestFinished
+		};
+
+private:
+	RFs iFs;							///< File server handle
+	TInt iProcessSecureId;				///< The secure id of this process
+	TInt iProcessVendorId;				///< The vendor id of this process
+	
+	HBufC* iTestExe;					///< The path of the test harness to run
+	TCapabilitySet iExcludedCaps;		///< Capabilties to exclude from failure tests
+	TUint iSecureId;					///< The secure id of the policy under test, or zero
+	TUint iVendorId;					///< The secure id of the policy under test, or zero
+	RArray<TCapability> iCapabilities;	///< The capabilities of the policy under test
+	HBufC8* iPreActions;				///< Script fragment for setup test actions
+	HBufC8* iPassAction;				///< The action under test
+	HBufC8* iFailAction;				///< The action under test
+	HBufC8* iPostActions;				///< Script fragment for cleanup test actions
+	
+	TState iState;						///< The state we're in
+	TTestState iTestState;				///< The test we're running when iState is ESetCaps or ERunTest
+	TInt iCapIndex;						///< The capability we're testing when iTestState is ECapFailTests
+	RProcess iProcess;					///< Used for running setcap and test harness
+	TInt iFailCount;					///< Running count of tests failed
+	TBuf16<50> iTestExeTmpNewPath;      ///< stores the executable as executable_policytest.exe
+	};
+
+#endif