//privileges drop and no smack rule
RUNNER_CHILD_TEST_SMACK(tc_unit_03_02_app_user_security_server_check_privilege)
{
- RUNNER_IGNORED_MSG("Security-server sockets are not labeled.");
Cookie cookie = getCookieFromSS();
SecurityServer::AccessProvider provider("selflabel_03_02");
//privileges drop and no smack rule
RUNNER_CHILD_TEST_SMACK(tc_unit_05_02_app_user_security_server_get_cookie_pid)
{
- RUNNER_IGNORED_MSG("Security-server sockets are not labeled.");
Cookie cookie = getCookieFromSS();
SecurityServer::AccessProvider provider("selflabel_05_02");
//privileges drop and no smack rule
RUNNER_CHILD_TEST_SMACK(tc_unit_06_02_app_user_security_server_get_smacklabel_cookie)
{
- RUNNER_IGNORED_MSG("Security-server sockets are not labeled.");
Cookie cookie = getCookieFromSS();
SecurityServer::AccessProvider provider("selflabel_06_02");
// disable access and drop privileges
RUNNER_CHILD_TEST_SMACK(tc_unit_09_02_app_user_cookie_API_access_deny)
{
- RUNNER_IGNORED_MSG("Security-server sockets are not labeled.");
SecurityServer::AccessProvider provider("subject_1d414140");
provider.applyAndSwithToUser(APP_UID, APP_GID);
RUNNER_CHILD_TEST_SMACK(tc01c_security_server_app_give_access_no_access)
{
- RUNNER_IGNORED_MSG("Security-server sockets are not labeled.");
const char *subject = "xxx45v34sfa";
const char *object = "yyy78x2lkjz";
RUNNER_CHILD_TEST_SMACK(tc04_check_API_passwd_denied)
{
- RUNNER_IGNORED_MSG("Security-server sockets are not labeled.");
check_API_passwd(true);
}
RUNNER_CHILD_TEST_SMACK(tc08_check_API_data_share_denied)
{
- RUNNER_IGNORED_MSG("Security-server sockets are not labeled.");
SecurityServer::AccessProvider provider(TEST08_SUBJECT);
provider.applyAndSwithToUser(APP_UID, APP_GID);