RUNNER_TEST(T5010_CLIENT_APP_LOCKED_PRIVATE_DB)
{
+ RUNNER_IGNORED_MSG("This test is turn off because fix "
+ "from tizen 2.4 that unlock db with empty password");
// [prepare]
// start as system service
// add resource to the system DB
// try to access system DB item - expect success
// [prepare]
+ remove_user_data(USER_APP);
GarbageCollector gc;
gc.save(TEST_SYSTEM_ALIAS, TEST_DATA);
allow_access(TEST_SYSTEM_ALIAS, TEST_LABEL, CKMC_PERMISSION_READ);
// [test]
{
+ remove_user_data(USER_APP);
+ ScopedDBUnlock unlock(USER_APP, APP_PASS);
ScopedAccessProvider ap(TEST_LABEL);
ap.allowAPI("key-manager::api-storage", "rw");
ap.applyAndSwithToUser(USER_APP, GROUP_APP);
- ScopedDBUnlock unlock(USER_APP, APP_PASS);
ScopedSaveData ssd(TEST_ALIAS, TEST_DATA);
check_read(TEST_ALIAS, TEST_LABEL, TEST_DATA);
// try to access the system item - expect success
// [prepare]
+ remove_user_data(USER_APP);
GarbageCollector gc;
gc.save(TEST_SYSTEM_ALIAS, TEST_DATA);
allow_access(TEST_SYSTEM_ALIAS, TEST_LABEL, CKMC_PERMISSION_READ);
// [test]
{
+ ScopedDBUnlock unlock(USER_APP, APP_PASS);
ScopedAccessProvider ap(TEST_LABEL);
ap.allowAPI("key-manager::api-storage", "rw");
ap.applyAndSwithToUser(USER_APP, GROUP_APP);
- ScopedDBUnlock unlock(USER_APP, APP_PASS);
check_read(TEST_ALIAS, SYSTEM_LABEL, TEST_DATA);
}
// try to access the system item - expect fail
// [prepare]
+ remove_user_data(USER_APP);
GarbageCollector gc;
gc.save(TEST_SYSTEM_ALIAS, TEST_DATA);
// [test]
{
+ ScopedDBUnlock unlock(USER_APP, APP_PASS);
ScopedAccessProvider ap(TEST_LABEL);
ap.allowAPI("key-manager::api-storage", "rw");
ap.applyAndSwithToUser(USER_APP, GROUP_APP);
- ScopedDBUnlock unlock(USER_APP, APP_PASS);
check_read(TEST_ALIAS, SYSTEM_LABEL, TEST_DATA, CKMC_ERROR_DB_ALIAS_UNKNOWN);
}
// try to access the system item - expect fail
// [prepare]
+ remove_user_data(USER_APP);
GarbageCollector gc;
gc.save(TEST_SYSTEM_ALIAS, TEST_DATA);
allow_access(TEST_SYSTEM_ALIAS, TEST_LABEL, CKMC_PERMISSION_READ);
// [test]
{
+ ScopedDBUnlock unlock(USER_APP, APP_PASS);
ScopedAccessProvider ap(TEST_LABEL);
ap.allowAPI("key-manager::api-storage", "rw");
ap.applyAndSwithToUser(USER_APP, GROUP_APP);
- ScopedDBUnlock unlock(USER_APP, APP_PASS);
check_read(TEST_ALIAS, SYSTEM_LABEL, TEST_DATA);
}
// [test2]
{
+ ScopedDBUnlock unlock(USER_APP, APP_PASS);
ScopedAccessProvider ap(TEST_LABEL);
ap.allowAPI("key-manager::api-storage", "rw");
ap.applyAndSwithToUser(USER_APP, GROUP_APP);
- ScopedDBUnlock unlock(USER_APP, APP_PASS);
check_read(TEST_ALIAS, SYSTEM_LABEL, TEST_DATA, CKMC_ERROR_DB_ALIAS_UNKNOWN);
}
// [test]
{
+ remove_user_data(USER_APP);
+ ScopedDBUnlock unlock(USER_APP, APP_PASS);
ScopedAccessProvider ap(TEST_LABEL);
ap.allowAPI("key-manager::api-storage", "rw");
ap.applyAndSwithToUser(USER_APP, GROUP_APP);
- ScopedDBUnlock unlock(USER_APP, APP_PASS);
ScopedSaveData ssdsystem_user(TEST_ALIAS, TEST_DATA);
ScopedSaveData ssdsystem_system(TEST_SYSTEM_ALIAS, TEST_DATA, CKMC_ERROR_PERMISSION_DENIED);
// try to remove item from system DB - expect fail
// [prepare]
+ remove_user_data(USER_APP);
GarbageCollector gc;
gc.save(TEST_SYSTEM_ALIAS, TEST_DATA);
allow_access(TEST_SYSTEM_ALIAS, TEST_LABEL, CKMC_PERMISSION_READ);
// user lists items - expect system item A and private item
// [prepare]
+ remove_user_data(USER_APP);
GarbageCollector gc;
gc.save(TEST_SYSTEM_ALIAS, TEST_DATA);
gc.save(TEST_SYSTEM_ALIAS_2, TEST_DATA);
// [test2]
{
+ ScopedDBUnlock unlock(USER_APP, APP_PASS);
ScopedAccessProvider ap(TEST_LABEL);
ap.allowAPI("key-manager::api-storage", "rw");
ap.applyAndSwithToUser(USER_APP, GROUP_APP);
- ScopedDBUnlock unlock(USER_APP, APP_PASS);
ScopedSaveData user_data(TEST_ALIAS, TEST_DATA);
check_alias_list({TEST_SYSTEM_ALIAS,
// [test]
{
+ remove_user_data(USER_APP);
+ ScopedDBUnlock unlock(USER_APP, APP_PASS);
ScopedAccessProvider ap(TEST_LABEL);
ap.allowAPI("key-manager::api-storage", "rw");
ap.applyAndSwithToUser(USER_APP, GROUP_APP);
- ScopedDBUnlock unlock(USER_APP, APP_PASS);
const char *private_key_alias = "/ sys-db-priv";
const char *public_key_alias = "/ sys-db-pub";
// try to create signature in system DB - expect fail
// [prepare]
+ remove_user_data(USER_APP);
GarbageCollector gc;
const char *private_key_alias = "/ sys-db-priv";
const char *public_key_alias = "/ sys-db-pub";
// [test2]
{
+ ScopedDBUnlock unlock(USER_APP, APP_PASS);
ScopedAccessProvider ap(TEST_LABEL);
ap.allowAPI("key-manager::api-storage", "rw");
ap.applyAndSwithToUser(USER_APP, GROUP_APP);
- ScopedDBUnlock unlock(USER_APP, APP_PASS);
ckmc_hash_algo_e hash_algo = CKMC_HASH_SHA256;
ckmc_rsa_padding_algo_e pad_algo = CKMC_PKCS1_PADDING;
RUNNER_TEST(T5044_SYSTEM_SVC_5000_ACCESS_DB)
{
+ RUNNER_IGNORED_MSG("This test is turn off because fix "
+ "from tizen 2.4 that unlock db with empty password");
// [prepare]
// start as system service
// add resource to the system DB