CKM: Get rid of early expiring certificates
[platform/core/test/security-tests.git] / src / ckm / unprivileged / async-api.cpp
index c0c40bf..82ad290 100644 (file)
@@ -535,17 +535,17 @@ RUNNER_TEST(TA0110_save_cert_invalid_param, UserEnv)
 
 RUNNER_TEST(TA0120_save_cert_already_exists, UserEnv)
 {
-    test_positive(&ManagerAsync::saveCertificate, "alias", getTestCertificate(OCSP_AVAILABLE_LEAF), Policy());
+    test_positive(&ManagerAsync::saveCertificate, "alias", getTestCertificate(TEST_LEAF), Policy());
     test_negative(&ManagerAsync::saveCertificate,
                   CKM_API_ERROR_DB_ALIAS_EXISTS,
                   "alias",
-                  getTestCertificate(OCSP_AVAILABLE_LEAF),
+                  getTestCertificate(TEST_LEAF),
                   Policy());
 }
 
 RUNNER_TEST(TA0150_save_cert_positive, UserEnv)
 {
-    test_positive(&ManagerAsync::saveCertificate, "alias", getTestCertificate(OCSP_AVAILABLE_LEAF), Policy());
+    test_positive(&ManagerAsync::saveCertificate, "alias", getTestCertificate(TEST_LEAF), Policy());
 }
 
 
@@ -599,7 +599,7 @@ RUNNER_TEST(TA0350_remove_key_positive, UserEnv)
 
 RUNNER_TEST(TA0450_remove_cert_positive, UserEnv)
 {
-    test_positive(&ManagerAsync::saveCertificate, "alias", getTestCertificate(OCSP_AVAILABLE_LEAF), Policy());
+    test_positive(&ManagerAsync::saveCertificate, "alias", getTestCertificate(TEST_LEAF), Policy());
     test_positive(&ManagerAsync::removeAlias, "alias");
 }
 
@@ -685,7 +685,7 @@ RUNNER_TEST(TA0740_get_cert_wrong_password, UserEnv)
 {
     test_positive(&ManagerAsync::saveCertificate,
                   "alias",
-                  getTestCertificate(OCSP_AVAILABLE_LEAF),
+                  getTestCertificate(TEST_LEAF),
                   Policy("password"));
     test_negative(&ManagerAsync::getCertificate,
                   CKM_API_ERROR_AUTHENTICATION_FAILED,
@@ -701,7 +701,7 @@ RUNNER_TEST(TA0750_get_cert_positive, UserEnv)
     static constexpr char PASS[] = "password";
     static constexpr char ALIAS[] = "alias";
 
-    const auto cert = getTestCertificate(OCSP_AVAILABLE_LEAF);
+    const auto cert = getTestCertificate(TEST_LEAF);
 
     mgr.saveCertificate(obs, ALIAS, cert, Policy(PASS));
     obs->WaitForSuccess();
@@ -783,10 +783,10 @@ RUNNER_TEST(TA1010_get_cert_alias_vector_invalid_param, UserEnv)
 
 RUNNER_TEST(TA1050_get_cert_alias_vector_positive, UserEnv)
 {
-    test_positive(&ManagerAsync::saveCertificate, "alias1", getTestCertificate(OCSP_AVAILABLE_LEAF), Policy());
+    test_positive(&ManagerAsync::saveCertificate, "alias1", getTestCertificate(TEST_LEAF), Policy());
     test_check_aliases(&ManagerAsync::getCertificateAliasVector, { aliasWithLabelFromSelf("alias1") });
 
-    test_positive(&ManagerAsync::saveCertificate, "alias2", getTestCertificate(OCSP_AVAILABLE_IM), Policy());
+    test_positive(&ManagerAsync::saveCertificate, "alias2", getTestCertificate(TEST_IM_CA), Policy());
     test_check_aliases(&ManagerAsync::getCertificateAliasVector, { aliasWithLabelFromSelf("alias1"),
                                                                    aliasWithLabelFromSelf("alias2") });
 
@@ -955,8 +955,8 @@ RUNNER_TEST(TA1380_create_key_AES_positive, UserEnv)
 // getCertificateChain
 RUNNER_TEST(TA1410_get_certificate_chain_invalid_param, UserEnv)
 {
-    CertificateShPtr cert = getTestCertificate(OCSP_AVAILABLE_LEAF);
-    CertificateShPtrVector certv = { getTestCertificate(OCSP_AVAILABLE_IM) };
+    CertificateShPtr cert = getTestCertificate(TEST_LEAF);
+    CertificateShPtrVector certv = { getTestCertificate(TEST_IM_CA) };
     test_no_observer<certChainFn1>(&ManagerAsync::getCertificateChain,
                                    cert,
                                    certv,
@@ -984,55 +984,61 @@ RUNNER_TEST(TA1410_get_certificate_chain_invalid_param, UserEnv)
 
 RUNNER_TEST(TA1420_get_certificate_chain_negative, UserEnv)
 {
-    CertificateShPtr cert = getTestCertificate(OCSP_AVAILABLE_LEAF);
-    CertificateShPtrVector certv = { getTestCertificate(OCSP_AVAILABLE_LEAF) };
+    CertificateShPtr cert = getTestCertificate(TEST_LEAF);
+    CertificateShPtrVector certv = { getTestCertificate(TEST_LEAF) };
+    CertificateShPtrVector trustedv = { getTestCertificate(TEST_ROOT_CA) };
     test_negative<certChainFn1>(&ManagerAsync::getCertificateChain,
                                 CKM_API_ERROR_VERIFICATION_FAILED,
                                 cert,
                                 EMPTY_CERT_VECTOR,
-                                EMPTY_CERT_VECTOR,
+                                trustedv,
                                 true);
     test_negative<certChainFn1>(&ManagerAsync::getCertificateChain,
                                 CKM_API_ERROR_VERIFICATION_FAILED,
                                 cert,
                                 certv,
-                                EMPTY_CERT_VECTOR,
+                                trustedv,
                                 true);
     AliasVector aliasv = { "alias" };
-    test_positive(&ManagerAsync::saveCertificate, aliasv[0], getTestCertificate(OCSP_AVAILABLE_LEAF), Policy());
+    test_positive(&ManagerAsync::saveCertificate, aliasv[0], certv[0], Policy());
+    AliasVector trusted_aliasv = { "trusted" };
+    test_positive(&ManagerAsync::saveCertificate, trusted_aliasv[0], trustedv[0], Policy());
     test_negative<certChainFn2>(&ManagerAsync::getCertificateChain,
                                 CKM_API_ERROR_VERIFICATION_FAILED,
                                 cert,
                                 EMPTY_ALIAS_VECTOR,
-                                EMPTY_ALIAS_VECTOR,
+                                trusted_aliasv,
                                 true);
     test_negative<certChainFn2>(&ManagerAsync::getCertificateChain,
                                 CKM_API_ERROR_VERIFICATION_FAILED,
                                 cert,
                                 aliasv,
-                                EMPTY_ALIAS_VECTOR,
+                                trusted_aliasv,
                                 true);
 }
 
 RUNNER_TEST(TA1450_get_certificate_chain_positive, UserEnv)
 {
-    CertificateShPtr cert = getTestCertificate(OCSP_AVAILABLE_LEAF);
-    CertificateShPtrVector certv = { getTestCertificate(OCSP_AVAILABLE_IM) };
+    CertificateShPtr cert = getTestCertificate(TEST_LEAF);
+    CertificateShPtrVector certv = { getTestCertificate(TEST_IM_CA) };
+    CertificateShPtrVector trustedv = { getTestCertificate(TEST_ROOT_CA) };
     test_check_cert_chain<certChainFn1>(&ManagerAsync::getCertificateChain,
                                         3,
                                         cert,
                                         certv,
-                                        EMPTY_CERT_VECTOR,
-                                        true);
+                                        trustedv,
+                                        false);
 
     AliasVector aliasv = { "alias" };
-    test_positive(&ManagerAsync::saveCertificate, aliasv[0], getTestCertificate(OCSP_AVAILABLE_IM), Policy());
+    AliasVector trusted_aliasv = { "trusted" };
+    test_positive(&ManagerAsync::saveCertificate, aliasv[0], certv[0], Policy());
+    test_positive(&ManagerAsync::saveCertificate, trusted_aliasv[0], trustedv[0], Policy());
     test_check_cert_chain<certChainFn2>(&ManagerAsync::getCertificateChain,
                                         3,
                                         cert,
                                         aliasv,
-                                        EMPTY_ALIAS_VECTOR,
-                                        true);
+                                        trusted_aliasv,
+                                        false);
 }
 
 
@@ -1238,7 +1244,7 @@ RUNNER_TEST(TA1710_ocsp_check_invalid_param, UserEnv)
 
 RUNNER_TEST(TA1720_ocsp_check_negative, UserEnv)
 {
-    CertificateShPtrVector certv = { getTestCertificate(OCSP_AVAILABLE_LEAF), getTestCertificate(OCSP_AVAILABLE_LEAF) };
+    CertificateShPtrVector certv = { getTestCertificate(OCSP_AVAILABLE_IM), getTestCertificate(OCSP_AVAILABLE_IM) };
 
     auto obs = test_positive(&ManagerAsync::ocspCheck, certv);
     RUNNER_ASSERT_MSG(obs->m_ocspStatus != CKM_API_OCSP_STATUS_GOOD,
@@ -1247,8 +1253,8 @@ RUNNER_TEST(TA1720_ocsp_check_negative, UserEnv)
 
 RUNNER_TEST(TA1750_ocsp_check_positive, UserEnv)
 {
-    CertificateShPtr cert = getTestCertificate(OCSP_AVAILABLE_LEAF);
-    CertificateShPtrVector certv = { getTestCertificate(OCSP_AVAILABLE_IM) };
+    CertificateShPtr cert = getTestCertificate(OCSP_AVAILABLE_IM);
+    CertificateShPtrVector certv;
     auto obs = test_positive<certChainFn1>(&ManagerAsync::getCertificateChain,
                                            cert,
                                            certv,