From: Krzysztof Jackiewicz Date: Fri, 9 Jun 2023 13:46:40 +0000 (+0200) Subject: [ITC][UTC][key-manager][ACR-1757] Extend tests to 6.0 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=refs%2Fchanges%2F55%2F294055%2F2;p=test%2Ftct%2Fnative%2Fapi.git [ITC][UTC][key-manager][ACR-1757] Extend tests to 6.0 Functionality will be supported starting from tizen 6.0. Change-Id: I438765f49c95c38523103067736a59c4806c26e6 --- diff --git a/src/itc/key-manager/ITs-key-manager.c b/src/itc/key-manager/ITs-key-manager.c index 375f47421..4d4ea0e3c 100755 --- a/src/itc/key-manager/ITs-key-manager.c +++ b/src/itc/key-manager/ITs-key-manager.c @@ -1657,7 +1657,7 @@ int ITc_ckmc_encrypt_decrypt_data_p(void) //& type: auto /** * @testcase ITc_ckmc_import_export_wrapped_key_p -* @since 6.5 +* @since 6.0 * @author SRPOL(d.kita) * @reviewer SRPOL(k.jackiewicz) * @type auto @@ -1764,7 +1764,7 @@ cleanup: //& type: auto /** * @testcase ITc_ckmc_key_derive_p -* @since 6.5 +* @since 6.0 * @author SRPOL(d.kita) * @reviewer SRPOL(k.jackiewicz) * @type auto diff --git a/src/utc/key-manager/utc-key-manager-crypto.c b/src/utc/key-manager/utc-key-manager-crypto.c index c26025c12..e4f05c634 100755 --- a/src/utc/key-manager/utc-key-manager-crypto.c +++ b/src/utc/key-manager/utc-key-manager-crypto.c @@ -1332,7 +1332,7 @@ int utc_ckmc_decrypt_data_n(void) /** * @testcase utc_ckmc_import_wrapped_key_p - * @since_tizen 6.5 + * @since_tizen 6.0 * @description Import wrapped key with AES CTR algorithm * @scenario Create AES key, wrap it and import. Get imported key. */ @@ -1395,7 +1395,7 @@ int utc_ckmc_import_wrapped_key_p(void) /** * @testcase utc_ckmc_import_wrapped_key_n - * @since_tizen 6.5 + * @since_tizen 6.0 * @description Import key with invalid paramters. * @scenario Import key with invalid paramters. */ @@ -1460,7 +1460,7 @@ int utc_ckmc_import_wrapped_key_n(void) /** * @testcase utc_ckmc_export_wrapped_key_p - * @since_tizen 6.5 + * @since_tizen 6.0 * @description Export key with AES GCM algorithm. * @scenario Create AES key, wrap it with AES GCM, import and export. */ @@ -1528,7 +1528,7 @@ int utc_ckmc_export_wrapped_key_p(void) /** * @testcase utc_ckmc_import_wrapped_key_n - * @since_tizen 6.5 + * @since_tizen 6.0 * @description Export key with invalid paramters. * @scenario Export key with invalid paramters. */ @@ -1584,7 +1584,7 @@ int utc_ckmc_export_wrapped_key_n(void) /** * @testcase utc_ckmc_key_derive_p - * @since_tizen 6.5 + * @since_tizen 6.0 * @description Derives two secrets from 2 EC key pairs. * @scenario Creates 2 pairs of EC keys, derives secrets from each other and compares whether they are equal */ @@ -1659,7 +1659,7 @@ int utc_ckmc_key_derive_p(void) /** * @testcase utc_ckmc_key_derive_n - * @since_tizen 6.5 + * @since_tizen 6.0 * @description Derive key with invalid paramters. * @scenario Derive key with invalid paramters. */