//passing NULL as a cookie pointer
RUNNER_CHILD_TEST(tc_arguments_03_01_security_server_check_privilege_by_cookie)
{
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_cookie is temporarily disabled: always returns success");
int ret = security_server_check_privilege_by_cookie(NULL, "wiadro", "rwx");
RUNNER_ASSERT_MSG_BT(ret == SECURITY_SERVER_API_ERROR_INPUT_PARAM,
"Error in security_server_check_privilege_by_cookie() argument checking: "
//passing NULL as an object pointer
RUNNER_CHILD_TEST(tc_arguments_03_02_security_server_check_privilege_by_cookie)
{
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_cookie is temporarily disabled: always returns success");
Cookie cookie = getCookieFromSS();
int ret = security_server_check_privilege_by_cookie(cookie.data(), NULL, "rwx");
//passing NULL as an access pointer
RUNNER_CHILD_TEST(tc_arguments_03_03_security_server_check_privilege_by_cookie)
{
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_cookie is temporarily disabled: always returns success");
Cookie cookie = getCookieFromSS();
int ret = security_server_check_privilege_by_cookie(cookie.data(), "wiadro", NULL);
UniquePtrCstring ss_label(security_server_get_smacklabel_cookie(cookie.data()), free);
RUNNER_ASSERT_MSG_BT(ss_label.get() != NULL, "ss_label: " << ss_label.get());
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_cookie is temporarily disabled: always returns success");
+
ret = security_server_check_privilege_by_pid(getpid(), "_", "rx");
RUNNER_ASSERT_MSG_BT(ret == SECURITY_SERVER_API_SUCCESS, "ret: " << ret);
}
RUNNER_ASSERT_MSG_BT(ss_label.get() == NULL,
"access should be denied so label should be NULL: " << ss_label.get());
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_sockfd is temporarily disabled: always returns success");
+
ret = security_server_check_privilege_by_pid(getpid(), "_", "rx");
RUNNER_ASSERT_MSG_BT(ret == SECURITY_SERVER_API_ERROR_ACCESS_DENIED,
"security_server_check_privilege_by_pid should return access denied, "
UniquePtrCstring ss_label(security_server_get_smacklabel_cookie(cookie.data()), free);
RUNNER_ASSERT_MSG_BT(ss_label.get() != NULL, "get_smacklabel_cookie failed.");
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_sockfd is temporarily disabled: always returns success");
+
ret = security_server_check_privilege_by_pid(getpid(), "_", "rx");
RUNNER_ASSERT_MSG_BT(ret == SECURITY_SERVER_API_SUCCESS,
"check_privilege_by_pid failed. Result: " << ret);
*/
RUNNER_TEST_SMACK(m060_security_server_check_privilege_by_cookie_smack) {
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_cookie is temporarily disabled: always returns success");
testSecurityServerCheckPrivilegeByCookie(true);
}
RUNNER_TEST_NOSMACK(m060_security_server_check_privilege_by_cookie_nosmack) {
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_cookie is temporarily disabled: always returns success");
testSecurityServerCheckPrivilegeByCookie(false);
}
*/
RUNNER_MULTIPROCESS_TEST_SMACK(m070_security_server_check_privilege_by_sockfd_smack) {
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_sockfd is temporarily disabled: always returns success");
testSecurityServerCheckPrivilegeBySockfd(true);
}
RUNNER_MULTIPROCESS_TEST_NOSMACK(m070_security_server_check_privilege_by_sockfd_nosmack) {
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_sockfd is temporarily disabled: always returns success");
testSecurityServerCheckPrivilegeBySockfd(false);
}
*/
RUNNER_TEST(m170_security_server_check_privilege_by_pid) {
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_pid is temporarily disabled: always returns success");
int ret;
readwrite_stats stats;
initialize_stats(&stats);
*/
RUNNER_CHILD_TEST_SMACK(tc05_check_privilege_by_cookie)
{
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_cookie is temporarily disabled: always returns success");
char cookie[20];
const char *object_label = "tc05objectlabel";
const char *access_rights = "r";
*/
RUNNER_MULTIPROCESS_TEST_SMACK(tc06_check_privilege_by_sockfd)
{
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_sockfd is temporarily disabled: always returns success");
const char *object_label = "tc06objectlabel";
const char *access_rights = "r";
const char *access_rights_ext = "rw";
*/
RUNNER_MULTIPROCESS_TEST_SMACK(tc07_check_privilege_by_sockfd)
{
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_sockfd is temporarily disabled: always returns success");
const char *object_label = "tc07objectlabel";
const char *access_rights = "r";
const char *access_rights_ext = "rw";
*/
RUNNER_CHILD_TEST_NOSMACK(tc05_check_privilege_by_cookie_nosmack)
{
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_cookie is temporarily disabled: always returns success");
char cookie[20];
const char* object_label = "tc05objectlabel";
*/
RUNNER_MULTIPROCESS_TEST_NOSMACK(tc06_check_privilege_by_sockfd_nosmack)
{
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_sockfd is temporarily disabled: always returns success");
const char* object_label = "tc06objectlabel";
int result1 = -1;
*/
RUNNER_MULTIPROCESS_TEST_NOSMACK(tc07_check_privilege_by_sockfd_nosmack)
{
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_sockfd is temporarily disabled: always returns success");
const char* object_label = "tc07objectlabel";
int result1 = -1;
RUNNER_TEST_SMACK(tc02_check_privilege_by_pid)
{
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_pid is temporarily disabled: always returns success");
int ret;
int pid;
*/
RUNNER_TEST_NOSMACK(tc02_check_privilege_by_pid_nosmack)
{
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_pid is temporarily disabled: always returns success");
int ret;
int pid;
}
RUNNER_TEST(tc05_security_server_check_privilege_by_cookie_weird_input_case)
{
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_cookie is temporarily disabled: always returns success");
int ret = 0;
size_t cookie_size = security_server_get_cookie_size();;
const char *object = "telephony_makecall";
RUNNER_TEST_SMACK(tc06_security_server_check_privilege_by_sockfd_weird_input_case)
{
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_sockfd is temporarily disabled: always returns success");
int ret = 0;
int sockfd = -1;
const char *object = "telephony_makecall";
RUNNER_TEST_NOSMACK(tc06_security_server_check_privilege_by_sockfd_weird_input_case_nosmack)
{
+ RUNNER_IGNORED_MSG("security_server_check_privilege_by_sockfd is temporarily disabled: always returns success");
int ret = 0;
int sockfd = -1;
const char* object = "telephony_makecall";