提交 26f04f6d 编写于 作者: O openharmony_ci 提交者: Gitee

!128 fix failed testcases

Merge pull request !128 from aaronwangjun/OpenHarmony_1.0.1_release
...@@ -12,6 +12,7 @@ ...@@ -12,6 +12,7 @@
# limitations under the License. # limitations under the License.
import("//test/xts/tools/lite/build/suite_lite.gni") import("//test/xts/tools/lite/build/suite_lite.gni")
import("//base/security/huks/build/config.gni")
hctest_suite("ActsSecurityDataTest") { hctest_suite("ActsSecurityDataTest") {
suite_name = "acts" suite_name = "acts"
...@@ -22,7 +23,9 @@ hctest_suite("ActsSecurityDataTest") { ...@@ -22,7 +23,9 @@ hctest_suite("ActsSecurityDataTest") {
"src/security_data_huks_gen_del_test.c", "src/security_data_huks_gen_del_test.c",
"src/security_data_huks_sign_verify_test.c", "src/security_data_huks_sign_verify_test.c",
] ]
if (disable_authenticate == true) {
defines = [ "_CUT_AUTHENTICATE_" ]
}
include_dirs = [ include_dirs = [
"src", "src",
"//base/security/huks/interfaces/innerkits/huks_lite/", "//base/security/huks/interfaces/innerkits/huks_lite/",
......
...@@ -53,7 +53,7 @@ static BOOL SecurityDataHuksExportHashRandomHmacTestSuiteTearDown(void) ...@@ -53,7 +53,7 @@ static BOOL SecurityDataHuksExportHashRandomHmacTestSuiteTearDown(void)
printf("-++++++++++++++++++++++++++++++++++++++++++++-\n"); printf("-++++++++++++++++++++++++++++++++++++++++++++-\n");
return TRUE; return TRUE;
} }
#ifndef _CUT_AUTHENTICATE_
// +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++Export Public key // +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++Export Public key
// begin++++++++++++++++++++++++++++++++++++++++++++++1000-1090 // begin++++++++++++++++++++++++++++++++++++++++++++++1000-1090
...@@ -326,7 +326,9 @@ securityDataExportPublicKey1090, Function | MediumTest | Level2) ...@@ -326,7 +326,9 @@ securityDataExportPublicKey1090, Function | MediumTest | Level2)
TEST_ASSERT_EQUAL_INT(NUM1010, status); TEST_ASSERT_EQUAL_INT(NUM1010, status);
HksBlobDestroyT1(&publicKey1); HksBlobDestroyT1(&publicKey1);
} }
#endif
#ifndef _CUT_AUTHENTICATE_
// +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++Export Public key // +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++Export Public key
// end++++++++++++++++++++++++++++++++++++++++++++++++1000-1090 // end++++++++++++++++++++++++++++++++++++++++++++++++1000-1090
...@@ -545,7 +547,7 @@ LITE_TEST_CASE(SecurityDataHuksExportHashRandomHmacTestSuite, securityDataHash11 ...@@ -545,7 +547,7 @@ LITE_TEST_CASE(SecurityDataHuksExportHashRandomHmacTestSuite, securityDataHash11
HksBlobDestroyT1(&hash); HksBlobDestroyT1(&hash);
TEST_ASSERT_EQUAL_INT(NUM1007, status); TEST_ASSERT_EQUAL_INT(NUM1007, status);
} }
#endif
// +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++Hash // +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++Hash
// end+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++1100-1190 // end+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++1100-1190
......
...@@ -54,6 +54,7 @@ void HksBlobDestroyT1(struct hks_blob *blob) ...@@ -54,6 +54,7 @@ void HksBlobDestroyT1(struct hks_blob *blob)
} }
int TestSecShuksGenerateKeyNormal(void) int TestSecShuksGenerateKeyNormal(void)
{ {
#ifndef _CUT_AUTHENTICATE_
char testFileName[] = "keyalias1"; char testFileName[] = "keyalias1";
char testFileName1[] = "key_auth_id1"; char testFileName1[] = "key_auth_id1";
struct hks_blob keyAlias; struct hks_blob keyAlias;
...@@ -72,10 +73,12 @@ int TestSecShuksGenerateKeyNormal(void) ...@@ -72,10 +73,12 @@ int TestSecShuksGenerateKeyNormal(void)
keyParam.key_pad = 0; keyParam.key_pad = 0;
int32_t status = hks_generate_key(&keyAlias, &keyParam); int32_t status = hks_generate_key(&keyAlias, &keyParam);
TEST_ASSERT_EQUAL_INT(0, status); TEST_ASSERT_EQUAL_INT(0, status);
#endif
return 0; return 0;
} }
int TestSecShuksDeleteKeyNormal(void) int TestSecShuksDeleteKeyNormal(void)
{ {
#ifndef _CUT_AUTHENTICATE_
char testFileName[] = "keyalias1"; char testFileName[] = "keyalias1";
struct hks_blob keyAlias = { 0 }; struct hks_blob keyAlias = { 0 };
...@@ -85,12 +88,15 @@ int TestSecShuksDeleteKeyNormal(void) ...@@ -85,12 +88,15 @@ int TestSecShuksDeleteKeyNormal(void)
int32_t status = hks_delete_key(&keyAlias); int32_t status = hks_delete_key(&keyAlias);
TEST_ASSERT_EQUAL_INT(0, status); TEST_ASSERT_EQUAL_INT(0, status);
#endif
return 0; return 0;
} }
int TestSecShuksExportPublicNormal(struct hks_blob *keyAlias, struct hks_blob *publicKey1) int TestSecShuksExportPublicNormal(struct hks_blob *keyAlias, struct hks_blob *publicKey1)
{ {
#ifndef _CUT_AUTHENTICATE_
int32_t status = hks_export_public_key(keyAlias, publicKey1); int32_t status = hks_export_public_key(keyAlias, publicKey1);
TEST_ASSERT_EQUAL_INT(0, status); TEST_ASSERT_EQUAL_INT(0, status);
#endif
return 0; return 0;
} }
void BuildBlobData(struct hks_blob *param, const char *str, uint8_t type, uint32_t size, uint8_t isDataNull) void BuildBlobData(struct hks_blob *param, const char *str, uint8_t type, uint32_t size, uint8_t isDataNull)
...@@ -171,6 +177,7 @@ void TestInitKeyParam1(struct hks_key_param *keyParam, uint32_t keyType, uint32_ ...@@ -171,6 +177,7 @@ void TestInitKeyParam1(struct hks_key_param *keyParam, uint32_t keyType, uint32_
int TestSecShuksImportPublicNormal(void) int TestSecShuksImportPublicNormal(void)
{ {
#ifndef _CUT_AUTHENTICATE_
char testFileName[] = "keyalias1"; char testFileName[] = "keyalias1";
struct hks_key_param keyParam1 = { 0 }; struct hks_key_param keyParam1 = { 0 };
...@@ -196,6 +203,7 @@ int TestSecShuksImportPublicNormal(void) ...@@ -196,6 +203,7 @@ int TestSecShuksImportPublicNormal(void)
TEST_ASSERT_EQUAL_INT(0, status); TEST_ASSERT_EQUAL_INT(0, status);
HksBlobDestroyT1(&publicKey1); HksBlobDestroyT1(&publicKey1);
#endif
return 0; return 0;
} }
...@@ -240,6 +248,7 @@ static BOOL SecurityDataHuksGenDelTestSuiteTearDown(void) ...@@ -240,6 +248,7 @@ static BOOL SecurityDataHuksGenDelTestSuiteTearDown(void)
* @tc.name : Generate key, normal input parameters keyAlias and keyParam * @tc.name : Generate key, normal input parameters keyAlias and keyParam
* @tc.desc : [C- SECURITY -1400] * @tc.desc : [C- SECURITY -1400]
*/ */
#ifndef _CUT_AUTHENTICATE_
LITE_TEST_CASE(SecurityDataHuksGenDelTestSuite, securityDataGenerateKey0000, Function | MediumTest | Level1) LITE_TEST_CASE(SecurityDataHuksGenDelTestSuite, securityDataGenerateKey0000, Function | MediumTest | Level1)
{ {
char testFileName[] = "keyalias1"; char testFileName[] = "keyalias1";
...@@ -831,5 +840,5 @@ LITE_TEST_CASE(SecurityDataHuksGenDelTestSuite, securityDataDeleteKey0190, Funct ...@@ -831,5 +840,5 @@ LITE_TEST_CASE(SecurityDataHuksGenDelTestSuite, securityDataDeleteKey0190, Funct
} }
// +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++Delete key // +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++Delete key
// end+++++++++++++++++++++++++++++++++++++++++++++++++++++++0130-0190 // end+++++++++++++++++++++++++++++++++++++++++++++++++++++++0130-0190
#endif
RUN_TEST_SUITE(SecurityDataHuksGenDelTestSuite); RUN_TEST_SUITE(SecurityDataHuksGenDelTestSuite);
...@@ -53,7 +53,7 @@ static BOOL SecurityDataHuksSignVerifyTestSuiteTearDown(void) ...@@ -53,7 +53,7 @@ static BOOL SecurityDataHuksSignVerifyTestSuiteTearDown(void)
printf("-++++++++++++++++++++++++++++++++++++++++++++-\n"); printf("-++++++++++++++++++++++++++++++++++++++++++++-\n");
return TRUE; return TRUE;
} }
#ifndef _CUT_AUTHENTICATE_
// +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++Sign key // +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++Sign key
// begin+++++++++++++++++++++++++++++++++++++++++++++++++++++++0200-0340 // begin+++++++++++++++++++++++++++++++++++++++++++++++++++++++0200-0340
...@@ -1267,7 +1267,7 @@ LITE_TEST_CASE(SecurityDataHuksSignVerifyTestSuite, securityDataAsymmetricVerify ...@@ -1267,7 +1267,7 @@ LITE_TEST_CASE(SecurityDataHuksSignVerifyTestSuite, securityDataAsymmetricVerify
status = hks_asymmetric_verify(&keyAlias, &keyParam, &hash, &signature); status = hks_asymmetric_verify(&keyAlias, &keyParam, &hash, &signature);
TEST_ASSERT_EQUAL_INT(NUM135, status); TEST_ASSERT_EQUAL_INT(NUM135, status);
} }
#endif
// +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++Verify key // +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++Verify key
// end+++++++++++++++++++++++++++++++++++++++++++++++++++++++0350-0510 // end+++++++++++++++++++++++++++++++++++++++++++++++++++++++0350-0510
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册