RUNNER_ASSERT(security_server_get_gid("teltel") == SECURITY_SERVER_API_ERROR_NO_SUCH_OBJECT);
}
-RUNNER_TEST(tc_security_server_get_object_name_normal_case_trying_6001)
-{
- ret = security_server_get_object_name(DB_ALARM_GID, obj_name, sizeof(obj_name));
- SLOGD("Result: %s\n", obj_name);
- RUNNER_ASSERT(ret == SECURITY_SERVER_API_SUCCESS);
-}
-
-RUNNER_TEST(tc_security_server_get_object_name_too_small_buffer_size)
-{
- ret = security_server_get_object_name(DB_ALARM_GID, obj_name, 5);
- RUNNER_ASSERT(ret == SECURITY_SERVER_API_ERROR_BUFFER_TOO_SMALL);
-}
-
-RUNNER_TEST(tc_security_server_get_object_name_invalid_gid)
-{
- ret = security_server_get_object_name(9876, obj_name, sizeof(obj_name));
- RUNNER_ASSERT(ret == SECURITY_SERVER_API_ERROR_NO_SUCH_OBJECT);
-}
-
RUNNER_TEST(tc_ask_for_privilege_with_default_cookie_normal_case_to_check_audio_privilege)
{
printhex(cookie, COOKIE_SIZE);
size_t cookie_size = security_server_get_cookie_size();
char cookie[20];
char *ss_label = NULL;
- char object[SECURITY_SERVER_MAX_OBJ_NAME];
struct smack_accesses *handle = NULL;
/* allow subject 'subjet_allow' to security-server::api-middleware */
ret = security_server_check_privilege(cookie, ret);
RUNNER_ASSERT_MSG(ret == SECURITY_SERVER_API_SUCCESS, "ret: " << ret);
- ret = security_server_get_object_name(APP_GID, object, sizeof(object));
- RUNNER_ASSERT_MSG(ret == SECURITY_SERVER_API_SUCCESS, "ret: " << ret);
-
ret = security_server_get_gid("root");
RUNNER_ASSERT_MSG(ret > -1, "ret: " << ret);
size_t cookie_size = security_server_get_cookie_size();
char cookie[20];
char *ss_label = NULL;
- char object[SECURITY_SERVER_MAX_OBJ_NAME];
ret = smack_set_label_for_self(subject_denied);
RUNNER_ASSERT_MSG(ret == 0, "ret: " << ret);
ret = security_server_check_privilege(cookie, DB_ALARM_GID);
RUNNER_ASSERT_MSG(ret == SECURITY_SERVER_API_ERROR_ACCESS_DENIED, "ret: " << ret);
- ret = security_server_get_object_name(DB_ALARM_GID, object, sizeof(object));
- RUNNER_ASSERT_MSG(ret == SECURITY_SERVER_API_ERROR_ACCESS_DENIED, "ret: " << ret);
-
ret = security_server_get_gid("root");
RUNNER_ASSERT_MSG(ret == SECURITY_SERVER_API_ERROR_ACCESS_DENIED, "ret: " << ret);
size_t cookie_size = security_server_get_cookie_size();
char cookie[20];
char* ss_label = NULL;
- char object[SECURITY_SERVER_MAX_OBJ_NAME];
// drop root privileges
ret = drop_root_privileges();
RUNNER_ASSERT_MSG(ret == SECURITY_SERVER_API_SUCCESS,
"check_privilege failed. Result: " << ret);
- ret = security_server_get_object_name(APP_GID, object, sizeof(object));
- RUNNER_ASSERT_MSG(ret == SECURITY_SERVER_API_SUCCESS,
- "get_object_name failed. Result: " << ret);
-
ret = security_server_get_gid("root");
RUNNER_ASSERT_MSG(ret > -1,
"Failed to get \"root\" gid. Result: " << ret);