From: manu.tiwari Date: Tue, 14 Sep 2021 05:42:33 +0000 (+0530) Subject: [ITC][key-manager][ACR-1645][Deprecate OCSP check key-manager API in Tizen 6.5] X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=6ff6f0676ba26515bfbbd4ffe9a2e7ed83a29049;p=test%2Ftct%2Fnative%2Fapi.git [ITC][key-manager][ACR-1645][Deprecate OCSP check key-manager API in Tizen 6.5] Change-Id: Ia00e003836ab3270547936217657db4b6d7ae287 Signed-off-by: manu.tiwari --- diff --git a/src/itc/key-manager/ITs-key-manager.c b/src/itc/key-manager/ITs-key-manager.c index 948d548e3..9f724daf8 100755 --- a/src/itc/key-manager/ITs-key-manager.c +++ b/src/itc/key-manager/ITs-key-manager.c @@ -969,59 +969,6 @@ int ITc_ckmc_get_cert_chain_with_trustedcert_p(void) return 0; } - -//& purpose: Perform OCSP which checks certificate is whether revoked or not -//& type: auto -/** -* @testcase ITc_ckmc_ocsp_check_p -* @since_tizen 2.4 -* @author SRID(parshant.v) -* @reviewer SRID(gupta.sanjay) -* @type auto -* @scenario Perform OCSP which checks certificate is whether revoked or not -* @apicovered ckmc_ocsp_check -* @passcase When ckmc_ocsp_check API return 0 -* @failcase If ckmc_ocsp_check API returns non zero value -* @precondition User must be already logged in and his user key is already loaded into memory in plain text form -* @postcondition NA -*/ -int ITc_ckmc_ocsp_check_p(void) -{ - START_TEST; - - ckmc_cert_s c_cert; - ckmc_cert_s c_cert1; - ckmc_cert_list_s untrustedcerts; - - c_cert.raw_cert = (unsigned char *) CERT_CHAIN1; - c_cert.cert_size = strlen(CERT_CHAIN1); - c_cert.data_format = CKMC_FORM_PEM; - - c_cert1.raw_cert = (unsigned char *) CERT_CHAIN2; - c_cert1.cert_size = strlen(CERT_CHAIN2); - c_cert1.data_format = CKMC_FORM_PEM; - - untrustedcerts.cert = &c_cert1; - untrustedcerts.next = NULL; - - ckmc_cert_list_s* cert_chain_list; - - int nRet = ckmc_get_cert_chain(&c_cert, &untrustedcerts, &cert_chain_list); - PRINT_RESULT(CKMC_ERROR_NONE, nRet, "ckmc_get_cert_chain", KeyMngrGetError(nRet)); - if ( cert_chain_list == NULL ) - { - FPRINTF("[Line : %d][%s] ckmc_get_cert_chain failed, returned ckmc_cert_list_s is NULL\\n", __LINE__, API_NAMESPACE); - } - - ckmc_ocsp_status_e oscp_ststus; - nRet = ckmc_ocsp_check(cert_chain_list, &oscp_ststus); //Target API - PRINT_RESULT_CLEANUP(CKMC_ERROR_NONE, nRet, "ckmc_ocsp_check", KeyMngrGetError(nRet), ckmc_cert_list_all_free(cert_chain_list)); - - ckmc_cert_list_all_free(cert_chain_list); - - return 0; -} - //& purpose: Gets and save pkcs12 from key manager. //& type: auto /** diff --git a/src/itc/key-manager/tct-key-manager-native_mobile.h b/src/itc/key-manager/tct-key-manager-native_mobile.h index a2b103698..72a821d0a 100755 --- a/src/itc/key-manager/tct-key-manager-native_mobile.h +++ b/src/itc/key-manager/tct-key-manager-native_mobile.h @@ -44,7 +44,6 @@ extern int ITc_ckmc_pkcs12_load_p(void); extern int ITc_ckmc_set_permission_p(void); extern int ITc_ckmc_remove_alias_p(void); extern int ITc_ckmc_get_cert_chain_with_trustedcert_p(void); -extern int ITc_ckmc_ocsp_check_p(void); extern int ITc_ckmc_get_save_pkcs12_p(void); extern int ITc_ckmc_key_new_p(void); extern int ITc_ckmc_buffer_new_p(void); @@ -93,7 +92,6 @@ testcase tc_array[] = { {"ITc_ckmc_set_permission_p",ITc_ckmc_set_permission_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, {"ITc_ckmc_remove_alias_p",ITc_ckmc_remove_alias_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, {"ITc_ckmc_get_cert_chain_with_trustedcert_p",ITc_ckmc_get_cert_chain_with_trustedcert_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, - {"ITc_ckmc_ocsp_check_p",ITc_ckmc_ocsp_check_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, {"ITc_ckmc_get_save_pkcs12_p",ITc_ckmc_get_save_pkcs12_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, {"ITc_ckmc_key_new_p",ITc_ckmc_key_new_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, {"ITc_ckmc_buffer_new_p",ITc_ckmc_buffer_new_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, diff --git a/src/itc/key-manager/tct-key-manager-native_tizeniot.h b/src/itc/key-manager/tct-key-manager-native_tizeniot.h index a2b103698..72a821d0a 100755 --- a/src/itc/key-manager/tct-key-manager-native_tizeniot.h +++ b/src/itc/key-manager/tct-key-manager-native_tizeniot.h @@ -44,7 +44,6 @@ extern int ITc_ckmc_pkcs12_load_p(void); extern int ITc_ckmc_set_permission_p(void); extern int ITc_ckmc_remove_alias_p(void); extern int ITc_ckmc_get_cert_chain_with_trustedcert_p(void); -extern int ITc_ckmc_ocsp_check_p(void); extern int ITc_ckmc_get_save_pkcs12_p(void); extern int ITc_ckmc_key_new_p(void); extern int ITc_ckmc_buffer_new_p(void); @@ -93,7 +92,6 @@ testcase tc_array[] = { {"ITc_ckmc_set_permission_p",ITc_ckmc_set_permission_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, {"ITc_ckmc_remove_alias_p",ITc_ckmc_remove_alias_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, {"ITc_ckmc_get_cert_chain_with_trustedcert_p",ITc_ckmc_get_cert_chain_with_trustedcert_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, - {"ITc_ckmc_ocsp_check_p",ITc_ckmc_ocsp_check_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, {"ITc_ckmc_get_save_pkcs12_p",ITc_ckmc_get_save_pkcs12_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, {"ITc_ckmc_key_new_p",ITc_ckmc_key_new_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, {"ITc_ckmc_buffer_new_p",ITc_ckmc_buffer_new_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, diff --git a/src/itc/key-manager/tct-key-manager-native_tv.h b/src/itc/key-manager/tct-key-manager-native_tv.h index a2b103698..72a821d0a 100755 --- a/src/itc/key-manager/tct-key-manager-native_tv.h +++ b/src/itc/key-manager/tct-key-manager-native_tv.h @@ -44,7 +44,6 @@ extern int ITc_ckmc_pkcs12_load_p(void); extern int ITc_ckmc_set_permission_p(void); extern int ITc_ckmc_remove_alias_p(void); extern int ITc_ckmc_get_cert_chain_with_trustedcert_p(void); -extern int ITc_ckmc_ocsp_check_p(void); extern int ITc_ckmc_get_save_pkcs12_p(void); extern int ITc_ckmc_key_new_p(void); extern int ITc_ckmc_buffer_new_p(void); @@ -93,7 +92,6 @@ testcase tc_array[] = { {"ITc_ckmc_set_permission_p",ITc_ckmc_set_permission_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, {"ITc_ckmc_remove_alias_p",ITc_ckmc_remove_alias_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, {"ITc_ckmc_get_cert_chain_with_trustedcert_p",ITc_ckmc_get_cert_chain_with_trustedcert_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, - {"ITc_ckmc_ocsp_check_p",ITc_ckmc_ocsp_check_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, {"ITc_ckmc_get_save_pkcs12_p",ITc_ckmc_get_save_pkcs12_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, {"ITc_ckmc_key_new_p",ITc_ckmc_key_new_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, {"ITc_ckmc_buffer_new_p",ITc_ckmc_buffer_new_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, diff --git a/src/itc/key-manager/tct-key-manager-native_wearable.h b/src/itc/key-manager/tct-key-manager-native_wearable.h index a2b103698..72a821d0a 100755 --- a/src/itc/key-manager/tct-key-manager-native_wearable.h +++ b/src/itc/key-manager/tct-key-manager-native_wearable.h @@ -44,7 +44,6 @@ extern int ITc_ckmc_pkcs12_load_p(void); extern int ITc_ckmc_set_permission_p(void); extern int ITc_ckmc_remove_alias_p(void); extern int ITc_ckmc_get_cert_chain_with_trustedcert_p(void); -extern int ITc_ckmc_ocsp_check_p(void); extern int ITc_ckmc_get_save_pkcs12_p(void); extern int ITc_ckmc_key_new_p(void); extern int ITc_ckmc_buffer_new_p(void); @@ -93,7 +92,6 @@ testcase tc_array[] = { {"ITc_ckmc_set_permission_p",ITc_ckmc_set_permission_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, {"ITc_ckmc_remove_alias_p",ITc_ckmc_remove_alias_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, {"ITc_ckmc_get_cert_chain_with_trustedcert_p",ITc_ckmc_get_cert_chain_with_trustedcert_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, - {"ITc_ckmc_ocsp_check_p",ITc_ckmc_ocsp_check_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, {"ITc_ckmc_get_save_pkcs12_p",ITc_ckmc_get_save_pkcs12_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, {"ITc_ckmc_key_new_p",ITc_ckmc_key_new_p,ITs_key_manager_startup,ITs_key_manager_cleanup}, {"ITc_ckmc_buffer_new_p",ITc_ckmc_buffer_new_p,ITs_key_manager_startup,ITs_key_manager_cleanup},