%global ckm_test_dir %{?TZ_SYS_SHARE:%TZ_SYS_SHARE/ckm-test/}%{!?TZ_SYS_SHARE:/usr/share/ckm-test/}
%global ckm_rw_data_dir %{?TZ_SYS_DATA:%TZ_SYS_DATA/ckm/}%{!?TZ_SYS_DATA:/opt/data/ckm/}
+%global tz_backend_enabled %{?tz_backend:%tz_backend}%{!?tz_backend:OFF}
%description
Security tests repository - for tests that can't be kept together with code.
export LDFLAGS+="-Wl,--rpath=%{_prefix}/lib"
cmake . -DCMAKE_INSTALL_PREFIX=%{_prefix} \
+%if %{tz_backend_enabled} == ON
+ -DTZ_BACKEND="ON" \
+%endif
-DDPL_LOG="ON" \
-DDPL_WITH_DLOG="ON" \
-DVERSION=%{version} \
RUNNER_TEST_GROUP_INIT(T60_INITIAL_VALUES);
-RUNNER_TEST(T6001_init)
+RUNNER_TEST_TZ_BACKEND(T6001_init)
{
// [prepare]
// remove database 0
test_exists(format_dest_path(XML_3_wrong), false);
}
-RUNNER_TEST(T6010_PARSE_XML_FILE_AT_STARTUP)
+RUNNER_TEST_TZ_BACKEND(T6010_PARSE_XML_FILE_AT_STARTUP)
{
// [test1]
// check items existence as system service
}
}
-RUNNER_TEST(T6020_PARSE_TWO_XML_FILES_AT_STARTUP)
+RUNNER_TEST_TZ_BACKEND(T6020_PARSE_TWO_XML_FILES_AT_STARTUP)
{
// [test]
// check items existence as system service
check_read_allowed(XML_2_EXPECTED_DATA_1.c_str(), XML_2_EXPECTED_DATA_1_DATA);
}
-RUNNER_TEST(T6030_PARSE_FAIL_XML_AT_STARTUP)
+RUNNER_TEST_TZ_BACKEND(T6030_PARSE_FAIL_XML_AT_STARTUP)
{
// [test]
// check items existence as system service - nothing should be available
check_read_not_visible(XML_3_EXPECTED_DATA_1.c_str());
}
-RUNNER_TEST(T6040_CHECK_KEYS_VALID)
+RUNNER_TEST_TZ_BACKEND(T6040_CHECK_KEYS_VALID)
{
// [test]
// check if key can create & verify signature
ckmc_buffer_free(signature);
}
-RUNNER_TEST(T6050_ENCRYPTED_KEY)
+RUNNER_TEST_TZ_BACKEND(T6050_ENCRYPTED_KEY)
{
// [prepare]
// to encrypt using RSA OAEP: openssl rsautl -encrypt -oaep -pubin -inkey pub.key -in input.txt -out cipher.out
ckmc_buffer_free(signature);
}
-RUNNER_TEST(T6060_ENCRYPTED_ASCII_DATA)
+RUNNER_TEST_TZ_BACKEND(T6060_ENCRYPTED_ASCII_DATA)
{
// [prepare]
// to encrypt using RSA OAEP: openssl rsautl -encrypt -oaep -pubin -inkey pub.key -in input.txt -out cipher.out
ckmc_buffer_free(testData1);
}
-RUNNER_TEST(T6070_ENCRYPTED_BIG_DATA)
+RUNNER_TEST_TZ_BACKEND(T6070_ENCRYPTED_BIG_DATA)
{
// [prepare]
// to encrypt using RSA OAEP: openssl rsautl -encrypt -oaep -pubin -inkey pub.key -in input.txt -out cipher.out
ckmc_buffer_free(testData1);
}
-RUNNER_TEST(T6999_deinit)
+RUNNER_TEST_TZ_BACKEND(T6999_deinit)
{
remove_user_data(0);
}
-RUNNER_TEST(T7000_Encrypted_initial_values)
+RUNNER_TEST_TZ_BACKEND(T7000_Encrypted_initial_values)
{
int temp;
std::string message = "16c9efbc342777c0e36d59019582d59be8385bdea5497cf092f99ce5430498e9";