[ITC][key-manager][ACR-1645][Deprecate OCSP check key-manager API in Tizen 6.5] 79/264179/2
authormanu.tiwari <manu.tiwari@samsung.com>
Tue, 14 Sep 2021 05:42:33 +0000 (11:12 +0530)
committershobhit verma <shobhit.v@samsung.com>
Tue, 14 Sep 2021 05:52:15 +0000 (05:52 +0000)
Change-Id: Ia00e003836ab3270547936217657db4b6d7ae287
Signed-off-by: manu.tiwari <manu.tiwari@samsung.com>
src/itc/key-manager/ITs-key-manager.c
src/itc/key-manager/tct-key-manager-native_mobile.h
src/itc/key-manager/tct-key-manager-native_tizeniot.h
src/itc/key-manager/tct-key-manager-native_tv.h
src/itc/key-manager/tct-key-manager-native_wearable.h

index 948d548e3dde3e8ff96f11582fdb0bd39590ecf2..9f724daf838a6f6a01a03cde1edb473c678025f9 100755 (executable)
@@ -969,59 +969,6 @@ int ITc_ckmc_get_cert_chain_with_trustedcert_p(void)
 
        return 0;
 }
-
-//& purpose: Perform OCSP which checks certificate is whether revoked or not
-//& type: auto
-/**
-* @testcase                    ITc_ckmc_ocsp_check_p
-* @since_tizen                         2.4
-* @author                              SRID(parshant.v)
-* @reviewer                            SRID(gupta.sanjay)
-* @type                                auto
-* @scenario                            Perform OCSP which checks certificate is whether revoked or not
-* @apicovered                  ckmc_ocsp_check
-* @passcase                            When ckmc_ocsp_check API return 0
-* @failcase                            If ckmc_ocsp_check API returns non zero value
-* @precondition                        User must be already logged in and his user key is already loaded into memory in plain text form
-* @postcondition               NA
-*/
-int ITc_ckmc_ocsp_check_p(void)
-{
-       START_TEST;
-
-       ckmc_cert_s c_cert;
-       ckmc_cert_s c_cert1;
-       ckmc_cert_list_s untrustedcerts;
-
-       c_cert.raw_cert = (unsigned char *) CERT_CHAIN1;
-       c_cert.cert_size = strlen(CERT_CHAIN1);
-       c_cert.data_format = CKMC_FORM_PEM;
-
-       c_cert1.raw_cert = (unsigned char *) CERT_CHAIN2;
-       c_cert1.cert_size = strlen(CERT_CHAIN2);
-       c_cert1.data_format = CKMC_FORM_PEM;
-
-       untrustedcerts.cert = &c_cert1;
-       untrustedcerts.next = NULL;
-
-       ckmc_cert_list_s* cert_chain_list;
-
-       int nRet = ckmc_get_cert_chain(&c_cert, &untrustedcerts, &cert_chain_list);
-       PRINT_RESULT(CKMC_ERROR_NONE, nRet, "ckmc_get_cert_chain", KeyMngrGetError(nRet));
-       if ( cert_chain_list == NULL )
-       {
-               FPRINTF("[Line : %d][%s] ckmc_get_cert_chain failed, returned ckmc_cert_list_s is NULL\\n", __LINE__, API_NAMESPACE);
-       }
-
-       ckmc_ocsp_status_e oscp_ststus;
-       nRet = ckmc_ocsp_check(cert_chain_list, &oscp_ststus); //Target API
-       PRINT_RESULT_CLEANUP(CKMC_ERROR_NONE, nRet, "ckmc_ocsp_check", KeyMngrGetError(nRet), ckmc_cert_list_all_free(cert_chain_list));
-
-       ckmc_cert_list_all_free(cert_chain_list);
-
-       return 0;
-}
-
 //& purpose: Gets and save pkcs12 from key manager.
 //& type: auto
 /**
index a2b103698e2f577bad1774d4ab46daabf8e2ebd1..72a821d0a9ee09e4634ea25ed2a34f097f0f56c6 100755 (executable)
@@ -44,7 +44,6 @@ extern int ITc_ckmc_pkcs12_load_p(void);
 extern int ITc_ckmc_set_permission_p(void);
 extern int ITc_ckmc_remove_alias_p(void);
 extern int ITc_ckmc_get_cert_chain_with_trustedcert_p(void);
-extern int ITc_ckmc_ocsp_check_p(void);
 extern int ITc_ckmc_get_save_pkcs12_p(void);
 extern int ITc_ckmc_key_new_p(void);
 extern int ITc_ckmc_buffer_new_p(void);
@@ -93,7 +92,6 @@ testcase tc_array[] = {
        {"ITc_ckmc_set_permission_p",ITc_ckmc_set_permission_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
        {"ITc_ckmc_remove_alias_p",ITc_ckmc_remove_alias_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
        {"ITc_ckmc_get_cert_chain_with_trustedcert_p",ITc_ckmc_get_cert_chain_with_trustedcert_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
-       {"ITc_ckmc_ocsp_check_p",ITc_ckmc_ocsp_check_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
        {"ITc_ckmc_get_save_pkcs12_p",ITc_ckmc_get_save_pkcs12_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
        {"ITc_ckmc_key_new_p",ITc_ckmc_key_new_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
        {"ITc_ckmc_buffer_new_p",ITc_ckmc_buffer_new_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
index a2b103698e2f577bad1774d4ab46daabf8e2ebd1..72a821d0a9ee09e4634ea25ed2a34f097f0f56c6 100755 (executable)
@@ -44,7 +44,6 @@ extern int ITc_ckmc_pkcs12_load_p(void);
 extern int ITc_ckmc_set_permission_p(void);
 extern int ITc_ckmc_remove_alias_p(void);
 extern int ITc_ckmc_get_cert_chain_with_trustedcert_p(void);
-extern int ITc_ckmc_ocsp_check_p(void);
 extern int ITc_ckmc_get_save_pkcs12_p(void);
 extern int ITc_ckmc_key_new_p(void);
 extern int ITc_ckmc_buffer_new_p(void);
@@ -93,7 +92,6 @@ testcase tc_array[] = {
        {"ITc_ckmc_set_permission_p",ITc_ckmc_set_permission_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
        {"ITc_ckmc_remove_alias_p",ITc_ckmc_remove_alias_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
        {"ITc_ckmc_get_cert_chain_with_trustedcert_p",ITc_ckmc_get_cert_chain_with_trustedcert_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
-       {"ITc_ckmc_ocsp_check_p",ITc_ckmc_ocsp_check_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
        {"ITc_ckmc_get_save_pkcs12_p",ITc_ckmc_get_save_pkcs12_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
        {"ITc_ckmc_key_new_p",ITc_ckmc_key_new_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
        {"ITc_ckmc_buffer_new_p",ITc_ckmc_buffer_new_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
index a2b103698e2f577bad1774d4ab46daabf8e2ebd1..72a821d0a9ee09e4634ea25ed2a34f097f0f56c6 100755 (executable)
@@ -44,7 +44,6 @@ extern int ITc_ckmc_pkcs12_load_p(void);
 extern int ITc_ckmc_set_permission_p(void);
 extern int ITc_ckmc_remove_alias_p(void);
 extern int ITc_ckmc_get_cert_chain_with_trustedcert_p(void);
-extern int ITc_ckmc_ocsp_check_p(void);
 extern int ITc_ckmc_get_save_pkcs12_p(void);
 extern int ITc_ckmc_key_new_p(void);
 extern int ITc_ckmc_buffer_new_p(void);
@@ -93,7 +92,6 @@ testcase tc_array[] = {
        {"ITc_ckmc_set_permission_p",ITc_ckmc_set_permission_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
        {"ITc_ckmc_remove_alias_p",ITc_ckmc_remove_alias_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
        {"ITc_ckmc_get_cert_chain_with_trustedcert_p",ITc_ckmc_get_cert_chain_with_trustedcert_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
-       {"ITc_ckmc_ocsp_check_p",ITc_ckmc_ocsp_check_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
        {"ITc_ckmc_get_save_pkcs12_p",ITc_ckmc_get_save_pkcs12_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
        {"ITc_ckmc_key_new_p",ITc_ckmc_key_new_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
        {"ITc_ckmc_buffer_new_p",ITc_ckmc_buffer_new_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
index a2b103698e2f577bad1774d4ab46daabf8e2ebd1..72a821d0a9ee09e4634ea25ed2a34f097f0f56c6 100755 (executable)
@@ -44,7 +44,6 @@ extern int ITc_ckmc_pkcs12_load_p(void);
 extern int ITc_ckmc_set_permission_p(void);
 extern int ITc_ckmc_remove_alias_p(void);
 extern int ITc_ckmc_get_cert_chain_with_trustedcert_p(void);
-extern int ITc_ckmc_ocsp_check_p(void);
 extern int ITc_ckmc_get_save_pkcs12_p(void);
 extern int ITc_ckmc_key_new_p(void);
 extern int ITc_ckmc_buffer_new_p(void);
@@ -93,7 +92,6 @@ testcase tc_array[] = {
        {"ITc_ckmc_set_permission_p",ITc_ckmc_set_permission_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
        {"ITc_ckmc_remove_alias_p",ITc_ckmc_remove_alias_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
        {"ITc_ckmc_get_cert_chain_with_trustedcert_p",ITc_ckmc_get_cert_chain_with_trustedcert_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
-       {"ITc_ckmc_ocsp_check_p",ITc_ckmc_ocsp_check_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
        {"ITc_ckmc_get_save_pkcs12_p",ITc_ckmc_get_save_pkcs12_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
        {"ITc_ckmc_key_new_p",ITc_ckmc_key_new_p,ITs_key_manager_startup,ITs_key_manager_cleanup},
        {"ITc_ckmc_buffer_new_p",ITc_ckmc_buffer_new_p,ITs_key_manager_startup,ITs_key_manager_cleanup},