}
// Step 2. Get certificate list from signature.
- auto authorSigData = sigDataMap[ValidationCore::SignatureType::AUTHOR];
+ const auto& authorSigData = sigDataMap[ValidationCore::SignatureType::AUTHOR];
for (const auto &certPtr : authorSigData.getCertList())
std::cout << "Author certificate > " << certPtr->getBase64() << std::endl;
- auto dist1SigData = sigDataMap[ValidationCore::SignatureType::DISTRIBUTOR1];
+ const auto& dist1SigData = sigDataMap[ValidationCore::SignatureType::DISTRIBUTOR1];
for (const auto &certPtr : dist1SigData.getCertList())
std::cout << "Distributor1 certificate > " << certPtr->getBase64() << std::endl;
- auto dist2SigData = sigDataMap[ValidationCore::SignatureType::DISTRIBUTOR2];
+ const auto& dist2SigData = sigDataMap[ValidationCore::SignatureType::DISTRIBUTOR2];
for (const auto &certPtr : dist2SigData.getCertList())
std::cout << "Distributor2 certificate > " << certPtr->getBase64() << std::endl;
CERTSVC_VISIBILITY_PARTNER,
TestData::certCAPartner));
- for (auto ca : caMap) {
+ for (const auto& ca : caMap) {
CertSvcInstance instance;
CertSvcCertificate certificate;
int retval;
"SignatureFinder failed");
std::vector<RetPair> ret;
- for (auto &sig : signatureSet) {
+ for (const auto &sig : signatureSet) {
SignatureValidator validator(sig);
SignatureData outData;
ret.push_back(std::make_pair(validator.check(contentPath,
RUNNER_ASSERT_MSG(ret.first == E_SIG_NONE,
"sig validation should be success: " << ret.first);
- auto sigData = ret.second;
+ const auto& sigData = ret.second;
if (sigData.getSignatureNumber() == 1)
RUNNER_ASSERT_MSG(sigData.getVisibilityLevel() == CertStoreId::VIS_PUBLIC,
"visibility check failed.");
RUNNER_ASSERT_MSG(ret.first == E_SIG_NONE,
"sig validation should be success: " << ret.first);
- auto sigData = ret.second;
+ const auto& sigData = ret.second;
if (sigData.getSignatureNumber() == 1)
RUNNER_ASSERT_MSG(sigData.getVisibilityLevel() == CertStoreId::VIS_PARTNER,
"visibility check failed.");
RUNNER_ASSERT_MSG(ret.first == E_SIG_NONE,
"sig validation should be success: " << ret.first);
- auto sigData = ret.second;
+ const auto& sigData = ret.second;
if (sigData.getSignatureNumber() == 1)
RUNNER_ASSERT_MSG(sigData.getVisibilityLevel() == CertStoreId::VIS_PUBLIC,
"visibility check failed.");
RUNNER_ASSERT_MSG(ret.first == E_SIG_NONE,
"sig validation should be success: " << ret.first);
- auto sigData = ret.second;
+ const auto& sigData = ret.second;
if (sigData.getSignatureNumber() == 1)
RUNNER_ASSERT_MSG(sigData.getVisibilityLevel() == CertStoreId::VIS_PARTNER,
"visibility check failed.");
true);
for (const auto &ret : retVector) {
- auto sigData = ret.second;
+ const auto& sigData = ret.second;
if (sigData.isAuthorSignature())
RUNNER_ASSERT_MSG(ret.first == E_SIG_INVALID_CHAIN,
"author sig validation should be fail : "
RUNNER_ASSERT_MSG(ret.first == E_SIG_NONE,
"sig validation should be success: " << ret.first);
- auto sigData = ret.second;
+ const auto& sigData = ret.second;
if (sigData.getSignatureNumber() == 1)
RUNNER_ASSERT_MSG(sigData.getVisibilityLevel() == CertStoreId::VIS_PLATFORM,
"visibility check failed.");
RUNNER_ASSERT_MSG(ret.first == E_SIG_NONE,
"sig validation should be success: " << ret.first);
- auto sigData = ret.second;
+ const auto& sigData = ret.second;
if (sigData.getSignatureNumber() == 1)
RUNNER_ASSERT_MSG(sigData.getVisibilityLevel() == CertStoreId::VIS_PLATFORM,
"visibility check failed.");
true);
for (const auto &ret : retVector) {
- auto sigData = ret.second;
+ const auto& sigData = ret.second;
// this condition is for OCSP Success in signature1.xml
if (sigData.getSignatureNumber() == 1)
RUNNER_ASSERT_MSG(ret.first == E_SIG_NONE,
true);
for (const auto &ret : retVector) {
- auto sigData = ret.second;
+ const auto& sigData = ret.second;
if (sigData.getSignatureNumber() == 1)
RUNNER_ASSERT_MSG(ret.first == E_SIG_INVALID_REF,
"If DT_LNK type point outside of package, "
true);
for (const auto &ret : retVector) {
- auto sigData = ret.second;
+ const auto& sigData = ret.second;
if (sigData.getSignatureNumber() == 1)
RUNNER_ASSERT_MSG(ret.first == E_SIG_INVALID_SIG,
"dist sig shouldn't be success: "
false);
for (const auto &ret : retVector) {
- auto sigData = ret.second;
+ const auto& sigData = ret.second;
if (sigData.getSignatureNumber() == 1)
RUNNER_ASSERT_MSG(ret.first == E_SIG_INVALID_SIG,
"dist sig shouldn't be success: "
true);
for (const auto &ret : retVector) {
- auto sigData = ret.second;
+ const auto& sigData = ret.second;
if (sigData.getSignatureNumber() == 1)
RUNNER_ASSERT_MSG(ret.first == E_SIG_INVALID_SIG,
"dist sig shouldn't be success: "
false);
for (const auto &ret : retVector) {
- auto sigData = ret.second;
+ const auto& sigData = ret.second;
if (sigData.getSignatureNumber() == 1)
RUNNER_ASSERT_MSG(ret.first == E_SIG_INVALID_SIG,
"dist sig shouldn't be success: "
true);
for (const auto &ret : retVector) {
- auto sigData = ret.second;
+ const auto& sigData = ret.second;
if (sigData.getSignatureNumber() == 1)
RUNNER_ASSERT_MSG(ret.first == E_SIG_INVALID_REF,
"dist sig shouldn't be success: "
CertType certType)
{
int result;
- for(auto storeType: storeTypeMap)
+ for(const auto& storeType: storeTypeMap)
{
result = installCertificateToStore(
storeType.second,
void uninstallCertFromStore()
{
int result;
- for(auto storeType: storeTypeMap)
+ for(const auto& storeType: storeTypeMap)
{
result = deleteCertificateFromStore(storeType.second, gNamePrefix.c_str());
BOOST_CHECK_EQUAL(result, CERTSVC_SUCCESS);
void setCertStatusToStore(CertStatus certStatus)
{
int result;
- for (auto storeType : storeTypeMap)
+ for (const auto& storeType : storeTypeMap)
{
installCertToStore(std::string(), std::string(), PemCertInfo::CertPEM.c_str(), PEM_CRT);
void getCertStatusFromStore(int expectedResult, CertStatus expectedStatus, bool isInstallCert)
{
int result;
- for (auto storeType : storeTypeMap)
+ for (const auto& storeType : storeTypeMap)
{
CertStatus status = DISABLED;
if (isInstallCert)
installCertToStore(std::string(), std::string(), PemCertInfo::CertPEM.c_str(), PEM_CRT);
int unique = 0, result;
- for (auto storeType : storeTypeMap)
+ for (const auto& storeType : storeTypeMap)
{
result = checkAliasExistsInStore(storeType.second, alias.empty() ? NULL : alias.c_str(), &unique);
char alias[VCORE_MAX_RECV_DATA_SIZE];
int result;
- for (auto storeType : storeTypeMap)
+ for (const auto& storeType : storeTypeMap)
{
result = getCertificateAliasFromStore(storeType.second, gNamePrefix.c_str(), alias, aliasSize);
NEGATIVE_TEST_CASE(T_get_certificate_status_from_store_with_gname_param_null_and_db_no_init)
{
int result;
- for (auto storeType : storeTypeMap)
+ for (const auto& storeType : storeTypeMap)
{
result = getCertificateStatusFromStore(storeType.second, NULL, NULL);
BOOST_CHECK_EQUAL(result, CERTSVC_WRONG_ARGUMENT);
int result = initialize_db();
BOOST_CHECK_EQUAL(result, CERTSVC_SUCCESS);
- for (auto storeType : storeTypeMap)
+ for (const auto& storeType : storeTypeMap)
{
result = setCertificateStatusToStore(storeType.second, DISABLED, systemGname.c_str(), ENABLED);
BOOST_CHECK_EQUAL(result, CERTSVC_FAIL);
int result = setCertificateStatusToStore(SYSTEM_STORE, DISABLED, systemGname.c_str(), ENABLED);
BOOST_CHECK_EQUAL(result, CERTSVC_FAIL);
- for (auto storeType : storeTypeMap)
+ for (const auto& storeType : storeTypeMap)
{
result = setCertificateStatusToStore(storeType.second, ENABLED, NULL, ENABLED);
BOOST_CHECK_EQUAL(result, CERTSVC_WRONG_ARGUMENT);
{
CertStatus outOfCertStatus = static_cast<CertStatus>(1 << 2);
int result;
- for (auto storeType : storeTypeMap)
+ for (const auto& storeType : storeTypeMap)
{
result = setCertificateStatusToStore(storeType.second, ENABLED, systemGname.c_str(), outOfCertStatus);
BOOST_CHECK_EQUAL(result, CERTSVC_INVALID_STATUS);
result = initialize_db();
BOOST_CHECK_EQUAL(result, CERTSVC_SUCCESS);
- for(auto storeType: storeTypeMap)
+ for(const auto& storeType: storeTypeMap)
{
gName = gNamePrefix + storeType.first + std::to_string(PEM_CRT);
commonName = commonNamePrefix + storeType.first + std::to_string(PEM_CRT);
result = initialize_db();
BOOST_CHECK_EQUAL(result, CERTSVC_SUCCESS);
- for(auto storeType: storeTypeMap)
+ for(const auto& storeType: storeTypeMap)
{
gName = gNamePrefix + storeType.first + std::to_string(PEM_CRT);
commonName = commonNamePrefix + storeType.first + std::to_string(PEM_CRT);
result = initialize_db();
BOOST_CHECK_EQUAL(result, CERTSVC_SUCCESS);
- for (auto storeType: storeTypeMap)
+ for (const auto& storeType: storeTypeMap)
{
const std::string gnameEndUser =
gNamePrefix + storeType.first + std::to_string(P12_END_USER);
std::string gnamePem, gnameEndUser, gnameIntermediate;
- for(auto storeType: storeTypeMap)
+ for(const auto& storeType: storeTypeMap)
{
gnamePem = gNamePrefix + storeType.first + std::to_string(PEM_CRT);
gnameEndUser = gNamePrefix + storeType.first + std::to_string(P12_END_USER);
CERTSVC_VISIBILITY_PARTNER,
CertCA::Partner));
- for (auto ca : caMap) {
+ for (const auto& ca : caMap) {
CertSvcCertificate certificate;
int result;
CertSvcVisibility visibility;
BOOST_REQUIRE_EQUAL(certsvc_instance_new(&instance), CERTSVC_SUCCESS);
- for (auto storeType: storeTypeMap)
+ for (const auto& storeType: storeTypeMap)
{
path = ServerCert::PemWithoutPassPath;
alias = PemPrefix + storeType.first + std::to_string(PEM_CRT);
BOOST_REQUIRE_EQUAL(certsvc_instance_new(&instance), CERTSVC_SUCCESS);
- for (auto storeType: storeTypeMap)
+ for (const auto& storeType: storeTypeMap)
{
path = ServerCert::P12WithoutPassPath;
alias = P12Prefix + RetList + storeType.first + std::to_string(P12_END_USER);
getCertListFromStoreAndFree(ALL_STORE, DISABLED, CERTSVC_SUCCESS);
getCertListFromStoreAndFree(ALL_STORE, ENABLED, CERTSVC_SUCCESS);
- for (auto storeType: storeTypeMap)
+ for (const auto& storeType: storeTypeMap)
{
getCertListFromStoreAndFree(storeType.second, DISABLED, CERTSVC_SUCCESS);
getCertListFromStoreAndFree(storeType.second, ENABLED, CERTSVC_SUCCESS);
BOOST_REQUIRE_EQUAL(certsvc_instance_new(&instance), CERTSVC_SUCCESS);
- for (auto storeType: storeTypeMap)
+ for (const auto& storeType: storeTypeMap)
{
CertSvcStoreCertList *certList = NULL;
size_t length = 0;