RUNNER_TEST(TA0950_get_key_alias_vector_positive, UserEnv)
{
+ RUNNER_IGNORED_MSG("Temporary turn off. This test require password support.");
test_positive(&ManagerAsync::saveKey, "alias_RSA", keys[RSA][0].prv, Policy());
test_check_aliases(&ManagerAsync::getKeyAliasVector, { aliasWithLabel(TEST_LABEL, "alias_RSA") });
RUNNER_TEST(TA1050_get_cert_alias_vector_positive, UserEnv)
{
+ RUNNER_IGNORED_MSG("Temporary turn off. This test require password support.");
test_positive(&ManagerAsync::saveCertificate, "alias1", getTestCertificate(MBANK), Policy());
test_check_aliases(&ManagerAsync::getCertificateAliasVector, { aliasWithLabel(TEST_LABEL, "alias1") });
RUNNER_TEST(TA1150_get_data_alias_vector_positive, UserEnv)
{
+ RUNNER_IGNORED_MSG("Temporary turn off. This test require password support.");
test_positive(&ManagerAsync::saveData, "alias1", test_buffer, Policy());
test_check_aliases(&ManagerAsync::getDataAliasVector, { aliasWithLabel(TEST_LABEL, "alias1") });
RUNNER_TEST(TA1250_create_key_pair_RSA_positive, UserEnv)
{
+ RUNNER_IGNORED_MSG("Temporary turn off. This test require password support.");
test_positive(&ManagerAsync::createKeyPairRSA,
1024,
"alias_prv",
RUNNER_TEST(TA1290_create_key_pair_DSA_positive, UserEnv)
{
+ RUNNER_IGNORED_MSG("Temporary turn off. This test require password support.");
test_positive(&ManagerAsync::createKeyPairDSA,
1024,
"alias_prv",
RUNNER_TEST(TA1350_create_key_pair_ECDSA_positive, UserEnv)
{
+ RUNNER_IGNORED_MSG("Temporary turn off. This test require password support.");
test_positive(&ManagerAsync::createKeyPairECDSA,
ElipticCurve::prime192v1,
"alias_prv",
RUNNER_TEST(TA1380_create_key_AES_positive, UserEnv)
{
+ RUNNER_IGNORED_MSG("Temporary turn off. This test require password support.");
test_positive(&ManagerAsync::createKeyAES,
256,
"alias_AES",
RUNNER_TEST(TA1720_ocsp_check_negative, UserEnv)
{
+ RUNNER_IGNORED_MSG("Temporary turn off. This test requires additional network features to work.");
CertificateShPtrVector certv = { getTestCertificate(MBANK), getTestCertificate(MBANK) };
auto obs = test_positive(&ManagerAsync::ocspCheck, certv);
RUNNER_TEST(TA1750_ocsp_check_positive, UserEnv)
{
+ RUNNER_IGNORED_MSG("Temporary turn off. This test requires additional network features to work.");
CertificateShPtr cert = getTestCertificate(MBANK);
CertificateShPtrVector certv = { getTestCertificate(SYMANTEC) };
auto obs = test_positive<certChainFn1>(&ManagerAsync::getCertificateChain,
RUNNER_TEST(T3074_CAPI_ckmc_ocsp_check)
{
- std::string ee = TestData::getTestCertificateBase64(TestData::MBANK);
+ RUNNER_IGNORED_MSG("Temporary turned off. Require network feature.");
+ std::string ee = TestData::getTestCertificateBase64(TestData::MBANK);
std::string im = TestData::getTestCertificateBase64(TestData::SYMANTEC);
ckmc_cert_s c_cert;
RUNNER_CHILD_TEST(T3203_CAPI_lock_database)
{
- ScopedDBUnlock unlock(USER_APP, USER_PASS);
+ RUNNER_IGNORED_MSG("Temporary turned off. The default password for database must be turn off for this test.");
+ ScopedDBUnlock unlock(USER_APP, USER_PASS);
ScopedAccessProvider ap(TEST_LABEL);
ap.allowAPI("key-manager::api-storage", "rw");
ap.applyAndSwithToUser(USER_APP, GROUP_APP);
RUNNER_CHILD_TEST(T3204_CAPI_get_data_from_locked_database)
{
+ RUNNER_IGNORED_MSG("Temporary turned off. The default password for database must be turn off for this test.");
ScopedAccessProvider ap(TEST_LABEL);
ap.allowAPI("key-manager::api-storage", "rw");
ap.applyAndSwithToUser(USER_APP, GROUP_APP);
RUNNER_TEST(T0016_Control_negative_wrong_password)
{
+ RUNNER_IGNORED_MSG("Temporary turn off. This test requires password support.");
int temp;
auto control = CKM::Control::create();
RUNNER_ASSERT_MSG(
RUNNER_TEST(T13142_ocsp_check_empty)
{
+ RUNNER_IGNORED_MSG("Temporary turned off.");
CKM::CertificateShPtrVector certVector;
auto manager = CKM::Manager::create();
RUNNER_TEST(T13144_ocsp_check_root)
{
+ RUNNER_IGNORED_MSG("Temporary turned off.");
auto root = TestData::getTestCertificate(TestData::EQUIFAX);
CKM::CertificateShPtrVector certVector = {root};
RUNNER_TEST(T13145_ocsp_check_no_ocsp)
{
+ RUNNER_IGNORED_MSG("Temporary turned off.");
auto root = TestData::getTestCertificate(TestData::EQUIFAX);
auto ca2 = TestData::getTestCertificate(TestData::GEOTRUST);
auto ca1 = TestData::getTestCertificate(TestData::GIAG2);
RUNNER_TEST(T1904_get_data_from_locked_database)
{
+ RUNNER_IGNORED_MSG("Temporary turned off. Require password support.");
ScopedAccessProvider ap(TEST_LABEL);
ap.allowAPI("key-manager::api-storage", "rw");
ap.applyAndSwithToUser(USER_APP, GROUP_APP);