Revert "CKM: Turn off all broken tests." 78/55078/1
authorBartlomiej Grzelewski <b.grzelewski@samsung.com>
Mon, 30 Nov 2015 16:24:31 +0000 (17:24 +0100)
committerBartlomiej Grzelewski <b.grzelewski@samsung.com>
Mon, 21 Dec 2015 15:14:03 +0000 (16:14 +0100)
This reverts commit 86ba2aa7c6e01dd9193e08d01ba1c2f8bfc2d459.

Change-Id: Icd0af8e29d8eece9c1884d92cf34f61d5d37e569

src/ckm/async-api.cpp
src/ckm/capi-certificate-chains.cpp
src/ckm/capi-testcases.cpp
src/ckm/initial-values.cpp
src/ckm/main.cpp

index 7579eaca17e8d1c4fb36500e137f33dbc9c9eaab..7e222b38cd48727431d99f4a4009abf260e48302 100644 (file)
@@ -664,7 +664,6 @@ RUNNER_TEST(TA0910_get_key_alias_vector_invalid_param, UserEnv)
 
 RUNNER_TEST(TA0950_get_key_alias_vector_positive, UserEnv)
 {
-    RUNNER_IGNORED_MSG("Temporary turn off. This test require password support.");
     test_positive(&ManagerAsync::saveKey, "alias_RSA", keys[RSA][0].prv, Policy());
     test_check_aliases(&ManagerAsync::getKeyAliasVector, { aliasWithLabel(TEST_LABEL, "alias_RSA") });
 
@@ -692,7 +691,6 @@ RUNNER_TEST(TA1010_get_cert_alias_vector_invalid_param, UserEnv)
 
 RUNNER_TEST(TA1050_get_cert_alias_vector_positive, UserEnv)
 {
-    RUNNER_IGNORED_MSG("Temporary turn off. This test require password support.");
     test_positive(&ManagerAsync::saveCertificate, "alias1", getTestCertificate(MBANK), Policy());
     test_check_aliases(&ManagerAsync::getCertificateAliasVector, { aliasWithLabel(TEST_LABEL, "alias1") });
 
@@ -713,7 +711,6 @@ RUNNER_TEST(TA1110_get_data_alias_vector_invalid_param, UserEnv)
 
 RUNNER_TEST(TA1150_get_data_alias_vector_positive, UserEnv)
 {
-    RUNNER_IGNORED_MSG("Temporary turn off. This test require password support.");
     test_positive(&ManagerAsync::saveData, "alias1", test_buffer, Policy());
     test_check_aliases(&ManagerAsync::getDataAliasVector, { aliasWithLabel(TEST_LABEL, "alias1") });
 
@@ -751,7 +748,6 @@ RUNNER_TEST(TA1220_create_key_pair_RSA_already_exists, UserEnv)
 
 RUNNER_TEST(TA1250_create_key_pair_RSA_positive, UserEnv)
 {
-    RUNNER_IGNORED_MSG("Temporary turn off. This test require password support.");
     test_positive(&ManagerAsync::createKeyPairRSA,
                   1024,
                   "alias_prv",
@@ -788,7 +784,6 @@ RUNNER_TEST(TA1280_create_key_pair_DSA_already_exists, UserEnv)
 
 RUNNER_TEST(TA1290_create_key_pair_DSA_positive, UserEnv)
 {
-    RUNNER_IGNORED_MSG("Temporary turn off. This test require password support.");
     test_positive(&ManagerAsync::createKeyPairDSA,
                   1024,
                   "alias_prv",
@@ -825,7 +820,6 @@ RUNNER_TEST(TA1320_create_key_pair_ECDSA_already_exists, UserEnv)
 
 RUNNER_TEST(TA1350_create_key_pair_ECDSA_positive, UserEnv)
 {
-    RUNNER_IGNORED_MSG("Temporary turn off. This test require password support.");
     test_positive(&ManagerAsync::createKeyPairECDSA,
                   ElipticCurve::prime192v1,
                   "alias_prv",
@@ -858,7 +852,6 @@ RUNNER_TEST(TA1370_create_key_AES_already_exists, UserEnv)
 
 RUNNER_TEST(TA1380_create_key_AES_positive, UserEnv)
 {
-    RUNNER_IGNORED_MSG("Temporary turn off. This test require password support.");
     test_positive(&ManagerAsync::createKeyAES,
                   256,
                   "alias_AES",
@@ -1153,7 +1146,6 @@ RUNNER_TEST(TA1710_ocsp_check_invalid_param, UserEnv)
 
 RUNNER_TEST(TA1720_ocsp_check_negative, UserEnv)
 {
-    RUNNER_IGNORED_MSG("Temporary turn off. This test requires additional network features to work.");
     CertificateShPtrVector certv = { getTestCertificate(MBANK), getTestCertificate(MBANK) };
 
     auto obs = test_positive(&ManagerAsync::ocspCheck, certv);
@@ -1163,7 +1155,6 @@ RUNNER_TEST(TA1720_ocsp_check_negative, UserEnv)
 
 RUNNER_TEST(TA1750_ocsp_check_positive, UserEnv)
 {
-    RUNNER_IGNORED_MSG("Temporary turn off. This test requires additional network features to work.");
     CertificateShPtr cert = getTestCertificate(MBANK);
     CertificateShPtrVector certv = { getTestCertificate(SYMANTEC) };
     auto obs = test_positive<certChainFn1>(&ManagerAsync::getCertificateChain,
index e619b5ec22bd98e94eeadf37a83e41067c5781c8..d9d10c73f97ee4973f59e4b2b183ef69889bc55f 100644 (file)
@@ -314,7 +314,6 @@ RUNNER_TEST(TCCH_0000_init)
 // old API
 RUNNER_TEST(TCCH_0010_get_chain_old_api)
 {
-    RUNNER_IGNORED_MSG("Temporary turned off. Require network feature.");
     remove_user_data(0);
 
     ChainVerifierOld cv;
@@ -423,7 +422,6 @@ RUNNER_TEST(TCCH_0160_get_certificate_chain_no_untrusted)
 
 RUNNER_TEST(TCCH_0170_get_certificate_chain_no_trusted)
 {
-    RUNNER_IGNORED_MSG("Temporary turned off. Require network feature.");
     remove_user_data(0);
 
     ChainVerifier cv;
@@ -464,7 +462,6 @@ RUNNER_TEST(TCCH_0190_get_certificate_chain_im_ca_in_trusted)
 
 RUNNER_TEST(TCCH_0200_get_certificate_chain_all)
 {
-    RUNNER_IGNORED_MSG("Temporary turned off. Require network feature.");
     remove_user_data(0);
 
     ChainVerifier cv;
index 363507723b683702fe76e0f2ddbc6ffcb26a9f39..53ee42ede04f5594d5947585721f1fec442956d8 100644 (file)
@@ -1188,7 +1188,6 @@ RUNNER_TEST(T3071_CAPI_init)
 
 RUNNER_TEST(T3074_CAPI_ckmc_ocsp_check)
 {
-       RUNNER_IGNORED_MSG("Temporary turned off. Require network feature.");
        std::string ee = TestData::getTestCertificateBase64(TestData::MBANK);
        std::string im = TestData::getTestCertificateBase64(TestData::SYMANTEC);
 
@@ -2376,8 +2375,7 @@ RUNNER_CHILD_TEST(T3202_CAPI_get_data_from_empty_database)
 
 RUNNER_CHILD_TEST(T3203_CAPI_lock_database)
 {
-    RUNNER_IGNORED_MSG("Temporary turned off. The default password for database must be turn off for this test.");
-    ScopedDBUnlock unlock(USER_APP, USER_PASS);
+       ScopedDBUnlock unlock(USER_APP, USER_PASS);
        ScopedAccessProvider ap(TEST_LABEL);
        ap.allowAPI("key-manager::api-storage", "rw");
        ap.applyAndSwithToUser(USER_APP, GROUP_APP);
@@ -2389,7 +2387,6 @@ RUNNER_CHILD_TEST(T3203_CAPI_lock_database)
 
 RUNNER_CHILD_TEST(T3204_CAPI_get_data_from_locked_database)
 {
-    RUNNER_IGNORED_MSG("Temporary turned off. The default password for database must be turn off for this test.");
        ScopedAccessProvider ap(TEST_LABEL);
        ap.allowAPI("key-manager::api-storage", "rw");
        ap.applyAndSwithToUser(USER_APP, GROUP_APP);
index 9f0b60057d01cf5ceb018dfbbcd8b07fb156acc4..73c6357d9359b6836cac9c8161131515f9b4d8a1 100644 (file)
@@ -114,7 +114,6 @@ RUNNER_TEST_GROUP_INIT(T60_INITIAL_VALUES);
 
 RUNNER_TEST(T6010_PARSE_XML_FILE_AT_STARTUP, RemoveDataEnv<0>)
 {
-    RUNNER_IGNORED_MSG("Temporary turned off. This test requires password protected db.");
     // [prepare]
     // remove database 0
     // copy to the initial-values folder
index e09df31b2b25a9d2b550dfb6aa5f8f81139510ba..060eaa04cba16d4d4c1f28482d061d8822cdcd2f 100644 (file)
@@ -156,7 +156,6 @@ RUNNER_TEST(T0015_Control)
 
 RUNNER_TEST(T0016_Control_negative_wrong_password)
 {
-    RUNNER_IGNORED_MSG("Temporary turn off. This test requires password support.");
     int temp;
     auto control = CKM::Control::create();
     RUNNER_ASSERT_MSG(
@@ -1465,7 +1464,6 @@ RUNNER_TEST(T13141_ocsp_check_valid_chain)
 
 RUNNER_TEST(T13142_ocsp_check_empty)
 {
-    RUNNER_IGNORED_MSG("Temporary turned off.");
     CKM::CertificateShPtrVector certVector;
 
     auto manager = CKM::Manager::create();
@@ -1495,7 +1493,6 @@ RUNNER_TEST(T13143_ocsp_check_empty_ptrs)
 
 RUNNER_TEST(T13144_ocsp_check_root)
 {
-    RUNNER_IGNORED_MSG("Temporary turned off.");
     auto root = TestData::getTestCertificate(TestData::EQUIFAX);
     CKM::CertificateShPtrVector certVector = {root};
 
@@ -1512,7 +1509,6 @@ RUNNER_TEST(T13144_ocsp_check_root)
 
 RUNNER_TEST(T13145_ocsp_check_no_ocsp)
 {
-    RUNNER_IGNORED_MSG("Temporary turned off.");
     auto root = TestData::getTestCertificate(TestData::EQUIFAX);
     auto ca2 = TestData::getTestCertificate(TestData::GEOTRUST);
     auto ca1 = TestData::getTestCertificate(TestData::GIAG2);
@@ -3363,7 +3359,6 @@ RUNNER_TEST(T1903_lock_database)
 
 RUNNER_TEST(T1904_get_data_from_locked_database)
 {
-    RUNNER_IGNORED_MSG("Temporary turned off. Require password support.");
     ScopedAccessProvider ap(TEST_LABEL);
     ap.allowAPI("key-manager::api-storage", "rw");
     ap.applyAndSwithToUser(USER_APP, GROUP_APP);