namespace {
+const char *CHAINS_PASSWD = "chains-pass";
+
typedef std::unique_ptr<ckmc_cert_s, void (*)(ckmc_cert_s*)> CertPtr;
typedef std::unique_ptr<ckmc_cert_list_s, void (*)(ckmc_cert_list_s*)> CertListPtr;
typedef std::unique_ptr<ckmc_alias_list_s, void (*)(ckmc_alias_list_s*)> AliasListPtr;
RUNNER_ASSERT_MSG(chain == NULL, "Chain is not empty");
ckmc_cert_free(cert);
}
-
} // namespace anonymous
RUNNER_TEST_GROUP_INIT(T307_CKMC_CAPI_CERTIFICATE_CHAINS);
RUNNER_TEST(TCCH_0000_init)
{
- assert_positive(ckmc_unlock_user_key, 0, "test-pass");
+ reset_user_data(0, CHAINS_PASSWD);
}
// old API
RUNNER_TEST(TCCH_0010_get_chain_old_api)
{
- assert_positive(ckmc_remove_user_data,0);
+ reset_user_data(0, CHAINS_PASSWD);
ChainVerifier<ChainApiOld> cv;
cv.verifyNegative(TestData::GOOGLE_COM);
// old API
RUNNER_TEST(TCCH_0020_get_chain_old_api_system_only)
{
- assert_positive(ckmc_remove_user_data,0);
+ reset_user_data(0, CHAINS_PASSWD);
ChainVerifier<ChainApiOld> cv;
cv.verifyPositive(TestData::GIAG2, 2); // including system cert
// check invalid arguments
RUNNER_TEST(TCCH_0100_get_certificate_chain_invalid_param)
{
- assert_positive(ckmc_remove_user_data,0);
+ reset_user_data(0, CHAINS_PASSWD);
ckmc_cert_s* ca2 = create_cert(TestData::GIAG2);
ckmc_cert_s* ca1 = create_cert(TestData::GEOTRUST);
// check invalid arguments
RUNNER_TEST(TCCH_0110_get_certificate_chain_alias_unknown)
{
- assert_positive(ckmc_remove_user_data,0);
+ reset_user_data(0, CHAINS_PASSWD);
ckmc_cert_s* ca2 = create_cert(TestData::GIAG2);
ckmc_cert_list_s* chain = NULL;
*/
RUNNER_TEST(TCCH_0120_get_certificate_chain_root_ca_negative)
{
- assert_positive(ckmc_remove_user_data,0);
+ reset_user_data(0, CHAINS_PASSWD);
ChainVerifier<> cv;
cv.enableSystem(false);
*/
RUNNER_TEST(TCCH_0140_get_certificate_chain_trusted_only)
{
- assert_positive(ckmc_remove_user_data,0);
+ reset_user_data(0, CHAINS_PASSWD);
ChainVerifier<> cv;
cv.enableSystem(false);
*/
RUNNER_TEST(TCCH_0150_get_certificate_chain_system_only)
{
- assert_positive(ckmc_remove_user_data,0);
+ reset_user_data(0, CHAINS_PASSWD);
ChainVerifier<> cv;
cv.verifyPositive(TestData::GIAG2, 2); // including system cert
*/
RUNNER_TEST(TCCH_0160_get_certificate_chain_no_untrusted)
{
- assert_positive(ckmc_remove_user_data,0);
+ reset_user_data(0, CHAINS_PASSWD);
ChainVerifier<> cv;
cv.addTrusted(TestData::TEST_ROOT_CA);
RUNNER_TEST(TCCH_0170_get_certificate_chain_no_trusted)
{
- assert_positive(ckmc_remove_user_data,0);
+ reset_user_data(0, CHAINS_PASSWD);
ChainVerifier<> cv;
cv.addUntrusted(TestData::GIAG2);
*/
RUNNER_TEST(TCCH_0180_get_certificate_chain_no_system)
{
- assert_positive(ckmc_remove_user_data,0);
+ reset_user_data(0, CHAINS_PASSWD);
ChainVerifier<> cv;
cv.enableSystem(false);
*/
RUNNER_TEST(TCCH_0190_get_certificate_chain_im_ca_in_trusted)
{
- assert_positive(ckmc_remove_user_data,0);
+ reset_user_data(0, CHAINS_PASSWD);
ChainVerifier<> cv;
cv.enableSystem(false);
RUNNER_TEST(TCCH_0200_get_certificate_chain_all)
{
- assert_positive(ckmc_remove_user_data,0);
+ reset_user_data(0, CHAINS_PASSWD);
ChainVerifier<> cv;
cv.enableSystem(true);
RUNNER_TEST(TCCH_9999_deinit)
{
- assert_positive(ckmc_lock_user_key, 0);
- assert_positive(ckmc_remove_user_data, 0);
+ remove_user_data(0);
}