Remove test of security_server_get_object_name.
[platform/core/test/security-tests.git] / tests / security-server-tests / security_server_tests_server.cpp
index e731221..1acc8a4 100644 (file)
@@ -415,25 +415,6 @@ RUNNER_TEST(tc_security_server_get_gid_wrong_object_name_teltel)
     RUNNER_ASSERT(security_server_get_gid("teltel") == SECURITY_SERVER_API_ERROR_NO_SUCH_OBJECT);
 }
 
-RUNNER_TEST(tc_security_server_get_object_name_normal_case_trying_6001)
-{
-    ret = security_server_get_object_name(DB_ALARM_GID, obj_name, sizeof(obj_name));
-    SLOGD("Result: %s\n", obj_name);
-    RUNNER_ASSERT(ret == SECURITY_SERVER_API_SUCCESS);
-}
-
-RUNNER_TEST(tc_security_server_get_object_name_too_small_buffer_size)
-{
-    ret = security_server_get_object_name(DB_ALARM_GID, obj_name, 5);
-    RUNNER_ASSERT(ret == SECURITY_SERVER_API_ERROR_BUFFER_TOO_SMALL);
-}
-
-RUNNER_TEST(tc_security_server_get_object_name_invalid_gid)
-{
-    ret = security_server_get_object_name(9876, obj_name, sizeof(obj_name));
-    RUNNER_ASSERT(ret == SECURITY_SERVER_API_ERROR_NO_SUCH_OBJECT);
-}
-
 RUNNER_TEST(tc_ask_for_privilege_with_default_cookie_normal_case_to_check_audio_privilege)
 {
     printhex(cookie, COOKIE_SIZE);
@@ -696,7 +677,6 @@ RUNNER_CHILD_TEST_SMACK(tc05_check_API_middleware_allow)
     size_t cookie_size = security_server_get_cookie_size();
     char cookie[20];
     char *ss_label = NULL;
-    char object[SECURITY_SERVER_MAX_OBJ_NAME];
     struct smack_accesses *handle = NULL;
 
     /* allow subject 'subjet_allow' to security-server::api-middleware */
@@ -723,9 +703,6 @@ RUNNER_CHILD_TEST_SMACK(tc05_check_API_middleware_allow)
     ret = security_server_check_privilege(cookie, ret);
     RUNNER_ASSERT_MSG(ret == SECURITY_SERVER_API_SUCCESS, "ret: " << ret);
 
-    ret = security_server_get_object_name(APP_GID, object, sizeof(object));
-    RUNNER_ASSERT_MSG(ret == SECURITY_SERVER_API_SUCCESS, "ret: " << ret);
-
     ret = security_server_get_gid("root");
     RUNNER_ASSERT_MSG(ret > -1, "ret: " << ret);
 
@@ -748,7 +725,6 @@ RUNNER_CHILD_TEST(tc06_check_API_middleware_denied)
     size_t cookie_size = security_server_get_cookie_size();
     char cookie[20];
     char *ss_label = NULL;
-    char object[SECURITY_SERVER_MAX_OBJ_NAME];
 
     ret = smack_set_label_for_self(subject_denied);
     RUNNER_ASSERT_MSG(ret == 0, "ret: " << ret);
@@ -762,9 +738,6 @@ RUNNER_CHILD_TEST(tc06_check_API_middleware_denied)
     ret = security_server_check_privilege(cookie, DB_ALARM_GID);
     RUNNER_ASSERT_MSG(ret == SECURITY_SERVER_API_ERROR_ACCESS_DENIED, "ret: " << ret);
 
-    ret = security_server_get_object_name(DB_ALARM_GID, object, sizeof(object));
-    RUNNER_ASSERT_MSG(ret == SECURITY_SERVER_API_ERROR_ACCESS_DENIED, "ret: " << ret);
-
     ret = security_server_get_gid("root");
     RUNNER_ASSERT_MSG(ret == SECURITY_SERVER_API_ERROR_ACCESS_DENIED, "ret: " << ret);
 
@@ -1171,7 +1144,6 @@ RUNNER_CHILD_TEST_NOSMACK(tc05_check_API_middleware_allow_nosmack)
     size_t cookie_size = security_server_get_cookie_size();
     char cookie[20];
     char* ss_label = NULL;
-    char object[SECURITY_SERVER_MAX_OBJ_NAME];
 
     // drop root privileges
     ret = drop_root_privileges();
@@ -1189,10 +1161,6 @@ RUNNER_CHILD_TEST_NOSMACK(tc05_check_API_middleware_allow_nosmack)
     RUNNER_ASSERT_MSG(ret == SECURITY_SERVER_API_SUCCESS,
             "check_privilege failed. Result: " << ret);
 
-    ret = security_server_get_object_name(APP_GID, object, sizeof(object));
-    RUNNER_ASSERT_MSG(ret == SECURITY_SERVER_API_SUCCESS,
-            "get_object_name failed. Result: " << ret);
-
     ret = security_server_get_gid("root");
     RUNNER_ASSERT_MSG(ret > -1,
             "Failed to get \"root\" gid. Result: " << ret);