const AliasVector&,
const AliasVector&,
bool);
-} // namespace anonymous
+class CKMAsyncAPIEnv
+{
+public:
+ void init(const std::string &) {
+ int temp;
+ ControlShPtr control = Control::create();
+
+ RUNNER_ASSERT_MSG(CKM_API_SUCCESS == (temp = control->removeUserData(0)),
+ "Error=" << CKM::ErrorToString(temp));
+ RUNNER_ASSERT_MSG(CKM_API_SUCCESS == (temp = control->unlockUserKey(0, TEST_PASS)),
+ "Error=" << CKM::ErrorToString(temp));
+
+ RUNNER_ASSERT_MSG(CKM_API_SUCCESS == (temp = control->removeUserData(APP_UID)),
+ "Error=" << ErrorToString(temp));
+ RUNNER_ASSERT_MSG(CKM_API_SUCCESS == (temp = control->unlockUserKey(APP_UID, TEST_PASS)),
+ "Error=" << ErrorToString(temp));
+ }
+ void finish() {
+ int temp;
+ ControlShPtr control = Control::create();
+ RUNNER_ASSERT_MSG(CKM_API_SUCCESS == (temp = control->lockUserKey(APP_UID)),
+ "Error=" << ErrorToString(temp));
+ RUNNER_ASSERT_MSG(CKM_API_SUCCESS == (temp = control->removeUserData(APP_UID)),
+ "Error=" << ErrorToString(temp));
-RUNNER_TEST_GROUP_INIT(CKM_ASYNC_API);
+ RUNNER_ASSERT_MSG(CKM_API_SUCCESS == (temp = control->lockUserKey(0)),
+ "Error=" << ErrorToString(temp));
+ RUNNER_ASSERT_MSG(CKM_API_SUCCESS == (temp = control->removeUserData(0)),
+ "Error=" << ErrorToString(temp));
+ }
+};
-RUNNER_TEST(TA0000_init)
-{
- int temp;
- ControlShPtr control = Control::create();
+} // namespace anonymous
- RUNNER_ASSERT_MSG(CKM_API_SUCCESS == (temp = control->removeUserData(0)),
- "Error=" << CKM::ErrorToString(temp));
- RUNNER_ASSERT_MSG(CKM_API_SUCCESS == (temp = control->unlockUserKey(0, TEST_PASS)),
- "Error=" << CKM::ErrorToString(temp));
- RUNNER_ASSERT_MSG(CKM_API_SUCCESS == (temp = control->removeUserData(APP_UID)),
- "Error=" << ErrorToString(temp));
- RUNNER_ASSERT_MSG(CKM_API_SUCCESS == (temp = control->unlockUserKey(APP_UID, TEST_PASS)),
- "Error=" << ErrorToString(temp));
-}
+RUNNER_TEST_GROUP_INIT(CKM_ASYNC_API);
// saveKey
-RUNNER_CHILD_TEST(TA0010_save_key_invalid_param)
+RUNNER_CHILD_TEST(TA0010_save_key_invalid_param, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
test_invalid_param(&ManagerAsync::saveKey, "alias", KeyShPtr(), Policy());
}
-RUNNER_CHILD_TEST(TA0020_save_key_already_exists)
+RUNNER_CHILD_TEST(TA0020_save_key_already_exists, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
Policy());
}
-RUNNER_CHILD_TEST(TA0050_save_key_positive)
+RUNNER_CHILD_TEST(TA0050_save_key_positive, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
// saveCertificate
-RUNNER_CHILD_TEST(TA0110_save_cert_invalid_param)
+RUNNER_CHILD_TEST(TA0110_save_cert_invalid_param, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
test_invalid_param(&ManagerAsync::saveCertificate, "alias", CertificateShPtr(), Policy());
}
-RUNNER_CHILD_TEST(TA0120_save_cert_already_exists)
+RUNNER_CHILD_TEST(TA0120_save_cert_already_exists, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
Policy());
}
-RUNNER_CHILD_TEST(TA0150_save_cert_positive)
+RUNNER_CHILD_TEST(TA0150_save_cert_positive, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
// saveData
-RUNNER_CHILD_TEST(TA0210_save_data_invalid_param)
+RUNNER_CHILD_TEST(TA0210_save_data_invalid_param, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
test_invalid_param(&ManagerAsync::saveData, "alias", RawBuffer(), Policy());
}
-RUNNER_CHILD_TEST(TA0220_save_data_already_exists)
+RUNNER_CHILD_TEST(TA0220_save_data_already_exists, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
Policy());
}
-RUNNER_CHILD_TEST(TA0250_save_data_positive)
+RUNNER_CHILD_TEST(TA0250_save_data_positive, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
// removeKey
-RUNNER_CHILD_TEST(TA0310_remove_alias_invalid_param)
+RUNNER_CHILD_TEST(TA0310_remove_alias_invalid_param, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
test_invalid_param(&ManagerAsync::removeAlias, "");
}
-RUNNER_CHILD_TEST(TA0330_remove_alias_unknown_alias)
+RUNNER_CHILD_TEST(TA0330_remove_alias_unknown_alias, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
test_negative(&ManagerAsync::removeAlias, CKM_API_ERROR_DB_ALIAS_UNKNOWN, "non-existing-alias");
}
-RUNNER_CHILD_TEST(TA0350_remove_key_positive)
+RUNNER_CHILD_TEST(TA0350_remove_key_positive, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
}
-RUNNER_CHILD_TEST(TA0450_remove_cert_positive)
+RUNNER_CHILD_TEST(TA0450_remove_cert_positive, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
}
-RUNNER_CHILD_TEST(TA0550_remove_data_positive)
+RUNNER_CHILD_TEST(TA0550_remove_data_positive, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
// getKey
-RUNNER_CHILD_TEST(TA0610_get_key_invalid_param)
+RUNNER_CHILD_TEST(TA0610_get_key_invalid_param, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
test_invalid_param(&ManagerAsync::getKey, "", "");
}
-RUNNER_CHILD_TEST(TA0630_get_key_unknown_alias)
+RUNNER_CHILD_TEST(TA0630_get_key_unknown_alias, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
test_negative(&ManagerAsync::getKey, CKM_API_ERROR_DB_ALIAS_UNKNOWN, "non-existing-alias", "");
}
-RUNNER_CHILD_TEST(TA0640_get_key_wrong_password)
+RUNNER_CHILD_TEST(TA0640_get_key_wrong_password, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
"wrong-password");
}
-RUNNER_CHILD_TEST(TA0650_get_key_positive)
+RUNNER_CHILD_TEST(TA0650_get_key_positive, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
// getCertificate
-RUNNER_CHILD_TEST(TA0710_get_cert_invalid_param)
+RUNNER_CHILD_TEST(TA0710_get_cert_invalid_param, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
test_invalid_param(&ManagerAsync::getCertificate, "", "");
}
-RUNNER_CHILD_TEST(TA0730_get_cert_unknown_alias)
+RUNNER_CHILD_TEST(TA0730_get_cert_unknown_alias, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
"");
}
-RUNNER_CHILD_TEST(TA0740_get_cert_wrong_password)
+RUNNER_CHILD_TEST(TA0740_get_cert_wrong_password, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
"wrong-password");
}
-RUNNER_CHILD_TEST(TA0750_get_cert_positive)
+RUNNER_CHILD_TEST(TA0750_get_cert_positive, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
// getData
-RUNNER_CHILD_TEST(TA0810_get_data_invalid_param)
+RUNNER_CHILD_TEST(TA0810_get_data_invalid_param, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
test_invalid_param(&ManagerAsync::getData, "", "");
}
-RUNNER_CHILD_TEST(TA0830_get_data_unknown_alias)
+RUNNER_CHILD_TEST(TA0830_get_data_unknown_alias, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
test_negative(&ManagerAsync::getData, CKM_API_ERROR_DB_ALIAS_UNKNOWN, "non-existing-alias", "");
}
-RUNNER_CHILD_TEST(TA0840_get_data_wrong_password)
+RUNNER_CHILD_TEST(TA0840_get_data_wrong_password, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
"wrong-password");
}
-RUNNER_CHILD_TEST(TA0850_get_data_positive)
+RUNNER_CHILD_TEST(TA0850_get_data_positive, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
// getKeyAliasVector
-RUNNER_CHILD_TEST(TA0910_get_key_alias_vector_invalid_param)
+RUNNER_CHILD_TEST(TA0910_get_key_alias_vector_invalid_param, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
test_no_observer(&ManagerAsync::getKeyAliasVector);
}
-RUNNER_CHILD_TEST(TA0950_get_key_alias_vector_positive)
+RUNNER_CHILD_TEST(TA0950_get_key_alias_vector_positive, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
// getCertificateAliasVector
-RUNNER_CHILD_TEST(TA1010_get_cert_alias_vector_invalid_param)
+RUNNER_CHILD_TEST(TA1010_get_cert_alias_vector_invalid_param, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
test_no_observer(&ManagerAsync::getCertificateAliasVector);
}
-RUNNER_CHILD_TEST(TA1050_get_cert_alias_vector_positive)
+RUNNER_CHILD_TEST(TA1050_get_cert_alias_vector_positive, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
// getDataAliasVector
-RUNNER_CHILD_TEST(TA1110_get_data_alias_vector_invalid_param)
+RUNNER_CHILD_TEST(TA1110_get_data_alias_vector_invalid_param, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
test_no_observer(&ManagerAsync::getDataAliasVector);
}
-RUNNER_CHILD_TEST(TA1150_get_data_alias_vector_positive)
+RUNNER_CHILD_TEST(TA1150_get_data_alias_vector_positive, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
// createKeyPairRSA
-RUNNER_CHILD_TEST(TA1210_create_key_pair_rsa_invalid_param)
+RUNNER_CHILD_TEST(TA1210_create_key_pair_rsa_invalid_param, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
Policy());
}
-RUNNER_CHILD_TEST(TA1220_create_key_pair_rsa_already_exists)
+RUNNER_CHILD_TEST(TA1220_create_key_pair_rsa_already_exists, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
Policy());
}
-RUNNER_CHILD_TEST(TA1250_create_key_pair_rsa_positive)
+RUNNER_CHILD_TEST(TA1250_create_key_pair_rsa_positive, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
}
// createKeyPairDSA
-RUNNER_CHILD_TEST(TA1270_create_key_pair_dsa_invalid_param)
+RUNNER_CHILD_TEST(TA1270_create_key_pair_dsa_invalid_param, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
Policy());
}
-RUNNER_CHILD_TEST(TA1280_create_key_pair_dsa_already_exists)
+RUNNER_CHILD_TEST(TA1280_create_key_pair_dsa_already_exists, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
Policy());
}
-RUNNER_CHILD_TEST(TA1290_create_key_pair_dsa_positive)
+RUNNER_CHILD_TEST(TA1290_create_key_pair_dsa_positive, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
}
// createKeyPairECDSA
-RUNNER_CHILD_TEST(TA1310_create_key_pair_ecdsa_invalid_param)
+RUNNER_CHILD_TEST(TA1310_create_key_pair_ecdsa_invalid_param, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
Policy());
}
-RUNNER_CHILD_TEST(TA1320_create_key_pair_ecdsa_already_exists)
+RUNNER_CHILD_TEST(TA1320_create_key_pair_ecdsa_already_exists, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
Policy());
}
-RUNNER_CHILD_TEST(TA1350_create_key_pair_ecdsa_positive)
+RUNNER_CHILD_TEST(TA1350_create_key_pair_ecdsa_positive, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
// getCertificateChain
-RUNNER_CHILD_TEST(TA1410_get_certificate_chain_invalid_param)
+RUNNER_CHILD_TEST(TA1410_get_certificate_chain_invalid_param, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
true);
}
-RUNNER_CHILD_TEST(TA1420_get_certificate_chain_negative)
+RUNNER_CHILD_TEST(TA1420_get_certificate_chain_negative, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
true);
}
-RUNNER_CHILD_TEST(TA1450_get_certificate_chain_positive)
+RUNNER_CHILD_TEST(TA1450_get_certificate_chain_positive, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
// createSignature
-RUNNER_CHILD_TEST(TA1510_create_signature_invalid_param)
+RUNNER_CHILD_TEST(TA1510_create_signature_invalid_param, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
RSAPaddingAlgorithm::PKCS1);
}
-RUNNER_CHILD_TEST(TA1520_create_signature_invalid_password)
+RUNNER_CHILD_TEST(TA1520_create_signature_invalid_password, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
RSAPaddingAlgorithm::PKCS1);
}
-RUNNER_CHILD_TEST(TA1550_create_signature_positive)
+RUNNER_CHILD_TEST(TA1550_create_signature_positive, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
// verifySignature
-RUNNER_CHILD_TEST(TA1610_verify_signature_invalid_param)
+RUNNER_CHILD_TEST(TA1610_verify_signature_invalid_param, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
RSAPaddingAlgorithm::PKCS1);
}
-RUNNER_CHILD_TEST(TA1620_verify_signature_invalid_password)
+RUNNER_CHILD_TEST(TA1620_verify_signature_invalid_password, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
RSAPaddingAlgorithm::PKCS1);
}
-RUNNER_CHILD_TEST(TA1630_verify_signature_invalid_message)
+RUNNER_CHILD_TEST(TA1630_verify_signature_invalid_message, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
RSAPaddingAlgorithm::PKCS1);
}
-RUNNER_CHILD_TEST(TA1640_verify_signature_invalid_signature)
+RUNNER_CHILD_TEST(TA1640_verify_signature_invalid_signature, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
RSAPaddingAlgorithm::PKCS1);
}
-RUNNER_CHILD_TEST(TA1650_verify_signature_wrong_key)
+RUNNER_CHILD_TEST(TA1650_verify_signature_wrong_key, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
RSAPaddingAlgorithm::PKCS1);
}
-RUNNER_CHILD_TEST(TA1660_verify_signature_positive)
+RUNNER_CHILD_TEST(TA1660_verify_signature_positive, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
// ocspCheck
-RUNNER_CHILD_TEST(TA1710_ocsp_check_invalid_param)
+RUNNER_CHILD_TEST(TA1710_ocsp_check_invalid_param, CKMAsyncAPIEnv)
{
test_no_observer(&ManagerAsync::ocspCheck, EMPTY_CERT_VECTOR);
test_invalid_param(&ManagerAsync::ocspCheck, EMPTY_CERT_VECTOR);
}
-RUNNER_CHILD_TEST(TA1720_ocsp_check_negative)
+RUNNER_CHILD_TEST(TA1720_ocsp_check_negative, CKMAsyncAPIEnv)
{
switch_to_storage_ocsp_user(TEST_LABEL);
"Verification should fail. Got: " << obs->m_ocspStatus);
}
-RUNNER_CHILD_TEST(TA1750_ocsp_check_positive)
+RUNNER_CHILD_TEST(TA1750_ocsp_check_positive, CKMAsyncAPIEnv)
{
switch_to_storage_ocsp_user(TEST_LABEL);
}
// setPermission
-RUNNER_CHILD_TEST(TA1810_allow_access_invalid_param)
+RUNNER_CHILD_TEST(TA1810_allow_access_invalid_param, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
test_invalid_param(&ManagerAsync::setPermission, "alias", "", CKM::Permission::READ | CKM::Permission::REMOVE);
}
-RUNNER_TEST(TA1820_allow_access)
+RUNNER_TEST(TA1820_allow_access, CKMAsyncAPIEnv)
{
DBCleanup dbc;
CharPtr top_label = get_label();
}
// denyAccess
-RUNNER_CHILD_TEST(TA1910_deny_access_invalid_param)
+RUNNER_CHILD_TEST(TA1910_deny_access_invalid_param, CKMAsyncAPIEnv)
{
switch_to_storage_user(TEST_LABEL);
test_invalid_param(&ManagerAsync::setPermission, "alias", "", CKM::Permission::NONE);
}
-RUNNER_TEST(TA1920_deny_access)
+RUNNER_TEST(TA1920_deny_access, CKMAsyncAPIEnv)
{
DBCleanup dbc;
CharPtr top_label = get_label();
CKM::Alias alias_PKCS_not_exportable = "async-test-PKCS-no-export";
}
-RUNNER_TEST(TA2000_PKCS_add_bundle_with_chain_certs)
+RUNNER_TEST(TA2000_PKCS_add_bundle_with_chain_certs, CKMAsyncAPIEnv)
{
DBCleanup dbc;
auto manager = CKM::Manager::create();
notExportable);
}
-RUNNER_TEST(TA2010_PKCS_get)
+RUNNER_TEST(TA2010_PKCS_get, CKMAsyncAPIEnv)
{
DBCleanup dbc;
auto manager = CKM::Manager::create();
2 == caVector.size(),
"Wrong size of vector");
}
-
-RUNNER_TEST(TA9999_deinit)
-{
- int temp;
- ControlShPtr control = Control::create();
- RUNNER_ASSERT_MSG(CKM_API_SUCCESS == (temp = control->lockUserKey(APP_UID)),
- "Error=" << ErrorToString(temp));
- RUNNER_ASSERT_MSG(CKM_API_SUCCESS == (temp = control->removeUserData(APP_UID)),
- "Error=" << ErrorToString(temp));
-
- RUNNER_ASSERT_MSG(CKM_API_SUCCESS == (temp = control->lockUserKey(0)),
- "Error=" << ErrorToString(temp));
- RUNNER_ASSERT_MSG(CKM_API_SUCCESS == (temp = control->removeUserData(0)),
- "Error=" << ErrorToString(temp));
-}