find /usr/apps/test_DIR/ -type f -name exec -exec chmod 0755 {} +
# Load permissions templates
-api_feature_loader --verbose
+api_feature_loader --verbose --clear-permissions
+
+# Set vconf key for cc-mode testing if vconf key isn't there.
+%if "%{sec_product_feature_security_mdfpp_enable}" != "1"
+ echo "Install vconf key (file/security_mdpp/security_mdpp_state) for testing key-manager"
+ vconftool set -t string file/security_mdpp/security_mdpp_state "Unset"
+%endif
echo "security-tests postinst done ..."
const char* const ENFORCING = "Enforcing";
const char* const DISABLED = "Disabled";
const char* const READY = "Ready";
+const char* const UNSET = "Unset"; // Meaningless value for unset.
const char* const CKM_LOCK = "/var/run/key-manager.pid";
// disable CC
-int _unset_mdpp_key = vconf_unset(VCONFKEY_SECURITY_MDPP_STATE);
+/*
+ * k.tak: To unset vconf key on runtime is deprecated by vconf key policy.
+ * To make new vconf key on runtime is deprecated by vconf key policy.
+ * vconf key should be installed in package install time.
+ */
+int _unset_mdpp_key = vconf_set_str(VCONFKEY_SECURITY_MDPP_STATE, UNSET);
// Wrapper for mdpp state that restores the original value upon destruction
class MdppState
MdppState::~MdppState()
{
if (!m_original)
- vconf_unset(VCONFKEY_SECURITY_MDPP_STATE);
+ vconf_set_str(VCONFKEY_SECURITY_MDPP_STATE, UNSET);
else {
vconf_set_str(VCONFKEY_SECURITY_MDPP_STATE, m_original);
free(m_original);
RUNNER_ASSERT_MSG(0 == vconf_set_str(VCONFKEY_SECURITY_MDPP_STATE, value),
"vconf_set() failed");
else
- vconf_unset(VCONFKEY_SECURITY_MDPP_STATE);
+ vconf_set_str(VCONFKEY_SECURITY_MDPP_STATE, UNSET);
}
void remove_user_data()