From: Bartlomiej Grzelewski Date: Fri, 27 Nov 2015 11:41:49 +0000 (+0100) Subject: CKM: Turn off all broken tests. X-Git-Tag: security-manager_5.5_testing~112 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=refs%2Fchanges%2F41%2F52941%2F1;p=platform%2Fcore%2Ftest%2Fsecurity-tests.git CKM: Turn off all broken tests. Change-Id: I21d32cae8a6681955efdd336c93a8345b1b7c754 --- diff --git a/src/ckm/async-api.cpp b/src/ckm/async-api.cpp index 7e222b3..7579eac 100644 --- a/src/ckm/async-api.cpp +++ b/src/ckm/async-api.cpp @@ -664,6 +664,7 @@ RUNNER_TEST(TA0910_get_key_alias_vector_invalid_param, UserEnv) RUNNER_TEST(TA0950_get_key_alias_vector_positive, UserEnv) { + RUNNER_IGNORED_MSG("Temporary turn off. This test require password support."); test_positive(&ManagerAsync::saveKey, "alias_RSA", keys[RSA][0].prv, Policy()); test_check_aliases(&ManagerAsync::getKeyAliasVector, { aliasWithLabel(TEST_LABEL, "alias_RSA") }); @@ -691,6 +692,7 @@ RUNNER_TEST(TA1010_get_cert_alias_vector_invalid_param, UserEnv) RUNNER_TEST(TA1050_get_cert_alias_vector_positive, UserEnv) { + RUNNER_IGNORED_MSG("Temporary turn off. This test require password support."); test_positive(&ManagerAsync::saveCertificate, "alias1", getTestCertificate(MBANK), Policy()); test_check_aliases(&ManagerAsync::getCertificateAliasVector, { aliasWithLabel(TEST_LABEL, "alias1") }); @@ -711,6 +713,7 @@ RUNNER_TEST(TA1110_get_data_alias_vector_invalid_param, UserEnv) RUNNER_TEST(TA1150_get_data_alias_vector_positive, UserEnv) { + RUNNER_IGNORED_MSG("Temporary turn off. This test require password support."); test_positive(&ManagerAsync::saveData, "alias1", test_buffer, Policy()); test_check_aliases(&ManagerAsync::getDataAliasVector, { aliasWithLabel(TEST_LABEL, "alias1") }); @@ -748,6 +751,7 @@ RUNNER_TEST(TA1220_create_key_pair_RSA_already_exists, UserEnv) RUNNER_TEST(TA1250_create_key_pair_RSA_positive, UserEnv) { + RUNNER_IGNORED_MSG("Temporary turn off. This test require password support."); test_positive(&ManagerAsync::createKeyPairRSA, 1024, "alias_prv", @@ -784,6 +788,7 @@ RUNNER_TEST(TA1280_create_key_pair_DSA_already_exists, UserEnv) RUNNER_TEST(TA1290_create_key_pair_DSA_positive, UserEnv) { + RUNNER_IGNORED_MSG("Temporary turn off. This test require password support."); test_positive(&ManagerAsync::createKeyPairDSA, 1024, "alias_prv", @@ -820,6 +825,7 @@ RUNNER_TEST(TA1320_create_key_pair_ECDSA_already_exists, UserEnv) RUNNER_TEST(TA1350_create_key_pair_ECDSA_positive, UserEnv) { + RUNNER_IGNORED_MSG("Temporary turn off. This test require password support."); test_positive(&ManagerAsync::createKeyPairECDSA, ElipticCurve::prime192v1, "alias_prv", @@ -852,6 +858,7 @@ RUNNER_TEST(TA1370_create_key_AES_already_exists, UserEnv) RUNNER_TEST(TA1380_create_key_AES_positive, UserEnv) { + RUNNER_IGNORED_MSG("Temporary turn off. This test require password support."); test_positive(&ManagerAsync::createKeyAES, 256, "alias_AES", @@ -1146,6 +1153,7 @@ RUNNER_TEST(TA1710_ocsp_check_invalid_param, UserEnv) RUNNER_TEST(TA1720_ocsp_check_negative, UserEnv) { + RUNNER_IGNORED_MSG("Temporary turn off. This test requires additional network features to work."); CertificateShPtrVector certv = { getTestCertificate(MBANK), getTestCertificate(MBANK) }; auto obs = test_positive(&ManagerAsync::ocspCheck, certv); @@ -1155,6 +1163,7 @@ RUNNER_TEST(TA1720_ocsp_check_negative, UserEnv) RUNNER_TEST(TA1750_ocsp_check_positive, UserEnv) { + RUNNER_IGNORED_MSG("Temporary turn off. This test requires additional network features to work."); CertificateShPtr cert = getTestCertificate(MBANK); CertificateShPtrVector certv = { getTestCertificate(SYMANTEC) }; auto obs = test_positive(&ManagerAsync::getCertificateChain, diff --git a/src/ckm/capi-certificate-chains.cpp b/src/ckm/capi-certificate-chains.cpp index d9d10c7..e619b5e 100644 --- a/src/ckm/capi-certificate-chains.cpp +++ b/src/ckm/capi-certificate-chains.cpp @@ -314,6 +314,7 @@ RUNNER_TEST(TCCH_0000_init) // old API RUNNER_TEST(TCCH_0010_get_chain_old_api) { + RUNNER_IGNORED_MSG("Temporary turned off. Require network feature."); remove_user_data(0); ChainVerifierOld cv; @@ -422,6 +423,7 @@ RUNNER_TEST(TCCH_0160_get_certificate_chain_no_untrusted) RUNNER_TEST(TCCH_0170_get_certificate_chain_no_trusted) { + RUNNER_IGNORED_MSG("Temporary turned off. Require network feature."); remove_user_data(0); ChainVerifier cv; @@ -462,6 +464,7 @@ RUNNER_TEST(TCCH_0190_get_certificate_chain_im_ca_in_trusted) RUNNER_TEST(TCCH_0200_get_certificate_chain_all) { + RUNNER_IGNORED_MSG("Temporary turned off. Require network feature."); remove_user_data(0); ChainVerifier cv; diff --git a/src/ckm/capi-testcases.cpp b/src/ckm/capi-testcases.cpp index cdd929f..fa5aa70 100644 --- a/src/ckm/capi-testcases.cpp +++ b/src/ckm/capi-testcases.cpp @@ -1190,7 +1190,8 @@ RUNNER_TEST(T3071_CAPI_init) RUNNER_TEST(T3074_CAPI_ckmc_ocsp_check) { - std::string ee = TestData::getTestCertificateBase64(TestData::MBANK); + RUNNER_IGNORED_MSG("Temporary turned off. Require network feature."); + std::string ee = TestData::getTestCertificateBase64(TestData::MBANK); std::string im = TestData::getTestCertificateBase64(TestData::SYMANTEC); ckmc_cert_s c_cert; @@ -2377,7 +2378,8 @@ RUNNER_CHILD_TEST(T3202_CAPI_get_data_from_empty_database) RUNNER_CHILD_TEST(T3203_CAPI_lock_database) { - ScopedDBUnlock unlock(USER_APP, USER_PASS); + RUNNER_IGNORED_MSG("Temporary turned off. The default password for database must be turn off for this test."); + ScopedDBUnlock unlock(USER_APP, USER_PASS); ScopedAccessProvider ap(TEST_LABEL); ap.allowAPI("key-manager::api-storage", "rw"); ap.applyAndSwithToUser(USER_APP, GROUP_APP); @@ -2389,6 +2391,7 @@ RUNNER_CHILD_TEST(T3203_CAPI_lock_database) RUNNER_CHILD_TEST(T3204_CAPI_get_data_from_locked_database) { + RUNNER_IGNORED_MSG("Temporary turned off. The default password for database must be turn off for this test."); ScopedAccessProvider ap(TEST_LABEL); ap.allowAPI("key-manager::api-storage", "rw"); ap.applyAndSwithToUser(USER_APP, GROUP_APP); diff --git a/src/ckm/initial-values.cpp b/src/ckm/initial-values.cpp index 9d6f179..8016267 100644 --- a/src/ckm/initial-values.cpp +++ b/src/ckm/initial-values.cpp @@ -117,6 +117,7 @@ RUNNER_TEST_GROUP_INIT(T60_INITIAL_VALUES); RUNNER_TEST(T6010_PARSE_XML_FILE_AT_STARTUP) { + RUNNER_IGNORED_MSG("Temporary turned off. This test requires password protected db."); // [prepare] // remove database 0 // copy to the initial-values folder diff --git a/src/ckm/main.cpp b/src/ckm/main.cpp index 5549a93..9a7622f 100644 --- a/src/ckm/main.cpp +++ b/src/ckm/main.cpp @@ -156,6 +156,7 @@ RUNNER_TEST(T0015_Control) RUNNER_TEST(T0016_Control_negative_wrong_password) { + RUNNER_IGNORED_MSG("Temporary turn off. This test requires password support."); int temp; auto control = CKM::Control::create(); RUNNER_ASSERT_MSG( @@ -1462,6 +1463,7 @@ RUNNER_TEST(T13141_ocsp_check_valid_chain) RUNNER_TEST(T13142_ocsp_check_empty) { + RUNNER_IGNORED_MSG("Temporary turned off."); CKM::CertificateShPtrVector certVector; auto manager = CKM::Manager::create(); @@ -1491,6 +1493,7 @@ RUNNER_TEST(T13143_ocsp_check_empty_ptrs) RUNNER_TEST(T13144_ocsp_check_root) { + RUNNER_IGNORED_MSG("Temporary turned off."); auto root = TestData::getTestCertificate(TestData::EQUIFAX); CKM::CertificateShPtrVector certVector = {root}; @@ -1507,6 +1510,7 @@ RUNNER_TEST(T13144_ocsp_check_root) RUNNER_TEST(T13145_ocsp_check_no_ocsp) { + RUNNER_IGNORED_MSG("Temporary turned off."); auto root = TestData::getTestCertificate(TestData::EQUIFAX); auto ca2 = TestData::getTestCertificate(TestData::GEOTRUST); auto ca1 = TestData::getTestCertificate(TestData::GIAG2); @@ -3357,6 +3361,7 @@ RUNNER_TEST(T1903_lock_database) RUNNER_TEST(T1904_get_data_from_locked_database) { + RUNNER_IGNORED_MSG("Temporary turned off. Require password support."); ScopedAccessProvider ap(TEST_LABEL); ap.allowAPI("key-manager::api-storage", "rw"); ap.applyAndSwithToUser(USER_APP, GROUP_APP);