Revert DCM E2EE API tests
[platform/core/test/security-tests.git] / src / e2ee-adaptation-layer / tests.cpp
index e60d543..e770527 100644 (file)
@@ -35,7 +35,7 @@ const KeyAliasPair OURS = { "our_ec_private", "our_ec_public" };
 const KeyAliasPair PEERS = { "peer_ec_private", "peer_ec_public" };
 const KeyAliasPair PEERS2 = { "peer2_ec_private", "peer2_ec_public" };
 const KeyAliasPair WRONG = { "wrong_ec_private", "wrong_ec_public" };
-const KeyAliasPair RSA = { "rsa_private", "rsa_public" };
+const KeyAliasPair RSA_KEYS = { "rsa_private", "rsa_public" };
 
 const char* const DERIVED = "derived";
 
@@ -74,12 +74,12 @@ public:
         GenerateEC(CKMC_EC_PRIME256V1, PEERS2, EXPORTABLE, EXPORTABLE);
         GenerateEC(CKMC_EC_PRIME192V1, WRONG, UNEXPORTABLE, EXPORTABLE);
 
-        ckmc_remove_alias(RSA.prv.c_str());
-        ckmc_remove_alias(RSA.pub.c_str());
+        ckmc_remove_alias(RSA_KEYS.prv.c_str());
+        ckmc_remove_alias(RSA_KEYS.pub.c_str());
         assert_positive(ckmc_create_key_pair_rsa,
                         1024,
-                        RSA.prv.c_str(),
-                        RSA.pub.c_str(),
+                        RSA_KEYS.prv.c_str(),
+                        RSA_KEYS.pub.c_str(),
                         UNEXPORTABLE,
                         EXPORTABLE);
     }
@@ -149,7 +149,6 @@ RUNNER_TEST(TEAL_0010_key_agreement_positive)
     assert_buffers_equal(plain.get(), decrypted, false);
 }
 
-
 RUNNER_TEST(TEAL_0020_key_agreement_wrong_arguments)
 {
     auto pub_key = getKey(PEERS.pub);
@@ -304,5 +303,7 @@ RUNNER_TEST(TEAL_1020_pbkdf_wrong_alias)
 
 int main(int argc, char *argv[])
 {
+    require_default_user(argv);
+
     return DPL::Test::TestRunnerSingleton::Instance().ExecTestRunner(argc, argv);
 }