From 18a482444f6cd441ad02a190b27949ae374fa704 Mon Sep 17 00:00:00 2001 From: maoyongxing Date: Wed, 27 Jul 2022 17:00:47 +0800 Subject: [PATCH] =?UTF-8?q?=E5=88=A0=E9=99=A4L2=E7=9B=B8=E5=85=B3=E4=BB=A3?= =?UTF-8?q?=E7=A0=81?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cert_mgr_service/build/BUILD.gn | 14 - cert_mgr_service/build/certconfig.gni | 12 +- cert_mgr_service/build/ohos.build | 2 +- cert_mgr_service/common/cert_mgr_errno.h | 36 - cert_mgr_service/common/log/cert_mgr_log.h | 34 - .../interfaces/innerkits/native_cpp/BUILD.gn | 56 - .../native_cpp/include/cert_mgr_client.h | 41 - .../native_cpp/include/cert_mgr_interface.h | 37 - .../include/cert_mgr_service_proxy.h | 37 - .../native_cpp/src/cert_mgr_client.cpp | 76 - .../native_cpp/src/cert_mgr_service_proxy.cpp | 66 - .../interfaces/kits/napi/BUILD.gn | 52 - .../kits/napi/include/napi_cert_mgr.h | 30 - .../kits/napi/src/napi_cert_mgr.cpp | 93 - .../interfaces/kits/napi/src/napi_init.cpp | 61 - cert_mgr_service/sample/client/BUILD.gn | 45 - .../sample/client/cert_mgr_main_client.cpp | 53 - .../services/cert_mgr_ability/BUILD.gn | 63 - .../include/cert_mgr_network_callback.h | 32 - .../include/cert_mgr_service.h | 58 - .../include/cert_mgr_service_stub.h | 40 - .../cert_mgr_system_ability_listener.h | 35 - .../include/cert_result_info.h | 21 - .../src/cert_mgr_network_callback.cpp | 69 - .../cert_mgr_ability/src/cert_mgr_service.cpp | 102 - .../src/cert_mgr_service_stub.cpp | 87 - .../src/cert_mgr_system_ability_listener.cpp | 118 -- .../cert_mgr_ability/src/cert_result_info.cpp | 32 - cert_mgr_service/services/core/BUILD.gn | 22 +- cert_mgr_service/services/core/cert_entry.c | 4 +- cert_mgr_service/services/core/cert_entry.h | 3 + .../services/core/utils/cert_utils_file.c | 49 +- .../services/core/utils/cert_utils_log.c | 10 +- cert_mgr_service/services/etc/init/BUILD.gn | 32 - .../services/etc/init/cert_mgr_sa.cfg | 16 - .../services/etc/init/cert_mgr_sa.rc | 17 - .../services/oem_adapter/BUILD.gn | 13 +- .../oem_adapter/src/cert_mgr_oem_file.c | 3 +- cert_mgr_service/services/sa_profile/7100.xml | 11 - cert_mgr_service/services/sa_profile/BUILD.gn | 21 - cert_mgr_service/test/unittest/BUILD.gn | 58 - .../unittest/src/CertMgrCoreDeviceTest.cpp | 229 -- .../test/unittest/src/CertMgrCoreMemTest.cpp | 110 - .../unittest/src/CertMgrCoreServiceTest.cpp | 1854 ----------------- .../test/unittest/src/CertMgrSdkTest.cpp | 72 - 45 files changed, 58 insertions(+), 3868 deletions(-) delete mode 100644 cert_mgr_service/common/cert_mgr_errno.h delete mode 100644 cert_mgr_service/common/log/cert_mgr_log.h delete mode 100644 cert_mgr_service/interfaces/innerkits/native_cpp/BUILD.gn delete mode 100644 cert_mgr_service/interfaces/innerkits/native_cpp/include/cert_mgr_client.h delete mode 100644 cert_mgr_service/interfaces/innerkits/native_cpp/include/cert_mgr_interface.h delete mode 100644 cert_mgr_service/interfaces/innerkits/native_cpp/include/cert_mgr_service_proxy.h delete mode 100644 cert_mgr_service/interfaces/innerkits/native_cpp/src/cert_mgr_client.cpp delete mode 100644 cert_mgr_service/interfaces/innerkits/native_cpp/src/cert_mgr_service_proxy.cpp delete mode 100644 cert_mgr_service/interfaces/kits/napi/BUILD.gn delete mode 100644 cert_mgr_service/interfaces/kits/napi/include/napi_cert_mgr.h delete mode 100644 cert_mgr_service/interfaces/kits/napi/src/napi_cert_mgr.cpp delete mode 100644 cert_mgr_service/interfaces/kits/napi/src/napi_init.cpp delete mode 100644 cert_mgr_service/sample/client/BUILD.gn delete mode 100644 cert_mgr_service/sample/client/cert_mgr_main_client.cpp delete mode 100644 cert_mgr_service/services/cert_mgr_ability/BUILD.gn delete mode 100644 cert_mgr_service/services/cert_mgr_ability/include/cert_mgr_network_callback.h delete mode 100644 cert_mgr_service/services/cert_mgr_ability/include/cert_mgr_service.h delete mode 100644 cert_mgr_service/services/cert_mgr_ability/include/cert_mgr_service_stub.h delete mode 100644 cert_mgr_service/services/cert_mgr_ability/include/cert_mgr_system_ability_listener.h delete mode 100644 cert_mgr_service/services/cert_mgr_ability/include/cert_result_info.h delete mode 100644 cert_mgr_service/services/cert_mgr_ability/src/cert_mgr_network_callback.cpp delete mode 100644 cert_mgr_service/services/cert_mgr_ability/src/cert_mgr_service.cpp delete mode 100644 cert_mgr_service/services/cert_mgr_ability/src/cert_mgr_service_stub.cpp delete mode 100644 cert_mgr_service/services/cert_mgr_ability/src/cert_mgr_system_ability_listener.cpp delete mode 100644 cert_mgr_service/services/cert_mgr_ability/src/cert_result_info.cpp delete mode 100644 cert_mgr_service/services/etc/init/BUILD.gn delete mode 100644 cert_mgr_service/services/etc/init/cert_mgr_sa.cfg delete mode 100644 cert_mgr_service/services/etc/init/cert_mgr_sa.rc delete mode 100644 cert_mgr_service/services/sa_profile/7100.xml delete mode 100644 cert_mgr_service/services/sa_profile/BUILD.gn delete mode 100644 cert_mgr_service/test/unittest/src/CertMgrCoreDeviceTest.cpp delete mode 100644 cert_mgr_service/test/unittest/src/CertMgrCoreMemTest.cpp delete mode 100644 cert_mgr_service/test/unittest/src/CertMgrCoreServiceTest.cpp delete mode 100644 cert_mgr_service/test/unittest/src/CertMgrSdkTest.cpp diff --git a/cert_mgr_service/build/BUILD.gn b/cert_mgr_service/build/BUILD.gn index 23447f2..99c1cfb 100644 --- a/cert_mgr_service/build/BUILD.gn +++ b/cert_mgr_service/build/BUILD.gn @@ -15,20 +15,6 @@ import("//build/ohos.gni") import("//base/cert_mgr_service/build/certconfig.gni") group("cert_standard_packages") { - if (is_standard_system) { - - deps = [ - "${certmanager_path}/services/etc/init:cert_mgr_etc", - "${certmanager_path}/services/sa_profile:cert_mgr_sa_profile", - "${certmanager_path}/services/cert_mgr_ability:cert_mgr_service", - "${certmanager_path}/interfaces/innerkits/native_cpp:cert_mgr_sdk", - #"${certmanager_path}/interfaces/kits/napi:cert_mgr_kit", - ] - #print("enable_cert_test_sample = ${enable_cert_test_sample}.") - if (enable_cert_test_sample) { - deps += ["${certmanager_path}/sample/client:certtestclient"] - } - } if(is_liteos_m){ deps = [ diff --git a/cert_mgr_service/build/certconfig.gni b/cert_mgr_service/build/certconfig.gni index a9456ff..a5dcdcd 100644 --- a/cert_mgr_service/build/certconfig.gni +++ b/cert_mgr_service/build/certconfig.gni @@ -8,8 +8,9 @@ certmanager_kits_path = "${certmanager_path}/interfaces/kits/napi" # 支持构建种类 declare_args() { - l2_shared_release = "l2_shared_release" - l2_shared_debug = "l2_shared_debug" + l2_shared_release = "l1_shared_release" + l2_shared_debug = "l1_shared_debug" + l1_static_release = "l1_static_release" is_liteos_m = false is_liteos_a = false } @@ -23,15 +24,12 @@ if (ohos_kernel_type == "liteos_m") { is_liteos_a = true lite_library_type = "shared_library" system_type = "small" -} else if (is_standard_system) { - lite_library_type = "shared_library" - system_type = "standard" } # 配置构建参数 declare_args() { # 构建版本 - cert_build_target = l2_shared_release + cert_build_target = l1_static_release # 模拟网络认证数据开关。true:模拟网络数据; false:访问真实网络数据。 enable_cert_test_mock_network = true @@ -58,6 +56,6 @@ declare_args() { } # 设置通用全局宏 -if (cert_build_target == l2_shared_debug) { +if (cert_build_target == l1_shared_debug) { enable_cert_common_debug = true } \ No newline at end of file diff --git a/cert_mgr_service/build/ohos.build b/cert_mgr_service/build/ohos.build index d0c05cf..281bfa2 100644 --- a/cert_mgr_service/build/ohos.build +++ b/cert_mgr_service/build/ohos.build @@ -1,7 +1,7 @@ { "subsystem": "certmanager", "parts": { - "cert_mgr_standard": { + "cert_mgr_service": { "variants": [ "phone", "ivi", diff --git a/cert_mgr_service/common/cert_mgr_errno.h b/cert_mgr_service/common/cert_mgr_errno.h deleted file mode 100644 index 2a9817b..0000000 --- a/cert_mgr_service/common/cert_mgr_errno.h +++ /dev/null @@ -1,36 +0,0 @@ -/* - * Copyright (C) 2022 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#ifndef CERT_MGR_ERRNO_H -#define CERT_MGR_ERRNO_H - -#include - -namespace OHOS { - namespace CertManager { - enum { - CERTMANAGER_FAIL = -1, - - CERTMANAGER_SUCCESS = 0, - - // SA框架使用错误码 - CERTMANAGER_SERVICE_FAILED = 0x10000 + 1, - CERTMANAGER_WRITE_FAIL = 0x10000 + 2, - CERTMANAGER_PARAM_NULL, - CERTMANAGER_SA_NO_INIT, - }; - } // end of CertManager -} // end of OHOS -#endif \ No newline at end of file diff --git a/cert_mgr_service/common/log/cert_mgr_log.h b/cert_mgr_service/common/log/cert_mgr_log.h deleted file mode 100644 index 610962c..0000000 --- a/cert_mgr_service/common/log/cert_mgr_log.h +++ /dev/null @@ -1,34 +0,0 @@ -/* - * Copyright (C) 2022 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#ifndef CERT_MGR_LOG_H -#define CERT_MGR_LOG_H - -#include - -#include "hilog/log.h" - -namespace OHOS { -namespace CertManager { -static constexpr OHOS::HiviewDFX::HiLogLabel CERTMANAGER_LABEL = {LOG_CORE, 0xD001800, "CERTMGR"}; - -#define HILOGF(...) (void)OHOS::HiviewDFX::HiLog::Fatal(CERTMANAGER_LABEL, ##__VA_ARGS__) -#define HILOGE(...) (void)OHOS::HiviewDFX::HiLog::Error(CERTMANAGER_LABEL, ##__VA_ARGS__) -#define HILOGW(...) (void)OHOS::HiviewDFX::HiLog::Warn(CERTMANAGER_LABEL, ##__VA_ARGS__) -#define HILOGI(...) (void)OHOS::HiviewDFX::HiLog::Info(CERTMANAGER_LABEL, ##__VA_ARGS__) -#define HILOGD(...) (void)OHOS::HiviewDFX::HiLog::Debug(CERTMANAGER_LABEL, ##__VA_ARGS__) -} // end of CertManager -} // end of OHOS -#endif \ No newline at end of file diff --git a/cert_mgr_service/interfaces/innerkits/native_cpp/BUILD.gn b/cert_mgr_service/interfaces/innerkits/native_cpp/BUILD.gn deleted file mode 100644 index c789d08..0000000 --- a/cert_mgr_service/interfaces/innerkits/native_cpp/BUILD.gn +++ /dev/null @@ -1,56 +0,0 @@ -# Copyright (c) 2021 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -import("//build/ohos.gni") -import("//base/cert_mgr_service/build/certconfig.gni") - -config("cert_mgr_sdk_config") { - visibility = [ ":*" ] - cflags = [ - "-Wall", - ] - include_dirs = [ - "include", - "${certmanager_standard_path}/common", - "${certmanager_standard_path}/common/log", - "//utils/native/base/include", - "//utils/system/safwk/native/include", - "${certmanager_standard_path}/services/cert_mgr_ability/include", - ] -} - -ohos_shared_library("cert_mgr_sdk") { - sources = [ - "src/cert_mgr_service_proxy.cpp", - "src/cert_mgr_client.cpp", - "${certmanager_standard_path}/services/cert_mgr_ability/src/cert_result_info.cpp", - ] - - configs = [ - ":cert_mgr_sdk_config", - ] - - deps = [ - "//utils/native/base:utils", - ] - - external_deps = [ - "hiviewdfx_hilog_native:libhilog", - "ipc:ipc_core", - "safwk:system_ability_fwk", - "samgr_standard:samgr_proxy", - ] - - subsystem_name = "certmanager" - part_name = "cert_mgr_standard" -} diff --git a/cert_mgr_service/interfaces/innerkits/native_cpp/include/cert_mgr_client.h b/cert_mgr_service/interfaces/innerkits/native_cpp/include/cert_mgr_client.h deleted file mode 100644 index e6b1603..0000000 --- a/cert_mgr_service/interfaces/innerkits/native_cpp/include/cert_mgr_client.h +++ /dev/null @@ -1,41 +0,0 @@ -/* - * Copyright (C) 2022 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#ifndef CERT_MGR_CLIENT_H -#define CERT_MGR_CLIENT_H - -#include -#include "iremote_object.h" -#include "cert_mgr_interface.h" -#include "singleton.h" - -namespace OHOS { -namespace CertManager { -class CertMgrClient { - DECLARE_DELAYED_SINGLETON(CertMgrClient) - -public: - int GetCertStatus(CertResultInfo &certResultInfo); - -private: - CertMgrClient(const CertMgrClient&); - CertMgrClient& operator=(const CertMgrClient&); - int InitClientService(); - - sptr certClientInterface_; -}; -} // end of CertManager -} // end of OHOS -#endif \ No newline at end of file diff --git a/cert_mgr_service/interfaces/innerkits/native_cpp/include/cert_mgr_interface.h b/cert_mgr_service/interfaces/innerkits/native_cpp/include/cert_mgr_interface.h deleted file mode 100644 index 049bc01..0000000 --- a/cert_mgr_service/interfaces/innerkits/native_cpp/include/cert_mgr_interface.h +++ /dev/null @@ -1,37 +0,0 @@ -/* - * Copyright (C) 2022 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#ifndef CERT_MGR_INTERFACE_H -#define CERT_MGR_INTERFACE_H - -#include -#include "iremote_broker.h" -#include "cert_result_info.h" - -namespace OHOS { -namespace CertManager { -class CertMgrInterface : public OHOS::IRemoteBroker { -public: - DECLARE_INTERFACE_DESCRIPTOR(u"ohos.CertManager.CertMgrInterface"); - - virtual int32_t GetCertStatus(CertResultInfo &certResultInfo) = 0; - - enum { - GET_AUTH_RESULT = 0, - }; -}; -} // end of CertManager -} // end of OHOS -#endif \ No newline at end of file diff --git a/cert_mgr_service/interfaces/innerkits/native_cpp/include/cert_mgr_service_proxy.h b/cert_mgr_service/interfaces/innerkits/native_cpp/include/cert_mgr_service_proxy.h deleted file mode 100644 index e8f9ddd..0000000 --- a/cert_mgr_service/interfaces/innerkits/native_cpp/include/cert_mgr_service_proxy.h +++ /dev/null @@ -1,37 +0,0 @@ -/* - * Copyright (C) 2022 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#ifndef CERT_MGR_SERVICE_PROXY_H -#define CERT_MGR_SERVICE_PROXY_H - -#include -#include "iremote_proxy.h" -#include "cert_mgr_interface.h" - -namespace OHOS { -namespace CertManager { -class CertMgrServiceProxy : public IRemoteProxy { -public: - explicit CertMgrServiceProxy(const sptr &impl) - : IRemoteProxy(impl) {} - ~CertMgrServiceProxy() {} - - int32_t GetCertStatus(CertResultInfo &certResultInfo) override; -private: - static inline BrokerDelegator delegator_; -}; -} // end of CertManager -} // end of OHOS -#endif \ No newline at end of file diff --git a/cert_mgr_service/interfaces/innerkits/native_cpp/src/cert_mgr_client.cpp b/cert_mgr_service/interfaces/innerkits/native_cpp/src/cert_mgr_client.cpp deleted file mode 100644 index d2af7c8..0000000 --- a/cert_mgr_service/interfaces/innerkits/native_cpp/src/cert_mgr_client.cpp +++ /dev/null @@ -1,76 +0,0 @@ -/* - * Copyright (C) 2022 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#include "cert_mgr_client.h" - -#include "system_ability_definition.h" - -#include "iservice_registry.h" - -#include "cert_mgr_log.h" -#include "cert_mgr_errno.h" -#include "cert_result_info.h" - -using namespace std; - - -namespace OHOS { -namespace CertManager { -CertMgrClient::CertMgrClient() -{ - InitClientService(); -} - -CertMgrClient::~CertMgrClient() -{ -} - -int CertMgrClient::InitClientService() -{ - HILOGI("CertManageClient InitClientService begin"); - if (certClientInterface_ != nullptr) { - HILOGI("CertManageClient InitClientService already init"); - return CERTMANAGER_SUCCESS; - } - - auto samgr = SystemAbilityManagerClient::GetInstance().GetSystemAbilityManager(); - if (!samgr) { - HILOGE("Failed to get system ability mgr."); - return CERTMANAGER_SA_NO_INIT; - } - - auto object = samgr->CheckSystemAbility(CERT_MANAGER_PROFILE_SA_ID); - if (!object) { - HILOGE("Failed to get Cert Manager."); - return CERTMANAGER_SA_NO_INIT; - } - certClientInterface_ = iface_cast(object); - HILOGI("CertManageClient InitClientService success"); - return CERTMANAGER_SUCCESS; -} - -int CertMgrClient::GetCertStatus(CertResultInfo &certResultInfo) -{ - HILOGI("CertMgrClient GetCertStatus Begin"); - if (certClientInterface_ == nullptr) { - HILOGE("CertMgrClient GetCertStatus certClientInterface_ is null"); - return CERTMANAGER_FAIL; - } - int res = certClientInterface_->GetCertStatus(certResultInfo); - HILOGI("CertMgrClient GetCertStatus end res = %{public}d", res); - return res; -} -} -} \ No newline at end of file diff --git a/cert_mgr_service/interfaces/innerkits/native_cpp/src/cert_mgr_service_proxy.cpp b/cert_mgr_service/interfaces/innerkits/native_cpp/src/cert_mgr_service_proxy.cpp deleted file mode 100644 index f73ff7f..0000000 --- a/cert_mgr_service/interfaces/innerkits/native_cpp/src/cert_mgr_service_proxy.cpp +++ /dev/null @@ -1,66 +0,0 @@ -/* - * Copyright (C) 2022 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#include "cert_mgr_service_proxy.h" - -#include "cert_mgr_log.h" -#include "cert_mgr_errno.h" -#include "cert_result_info.h" - -using namespace std; -namespace OHOS { -namespace CertManager { -namespace { -const std::u16string CERTMANAGER_PROXY_INTERFACE_TOKEN = u"ohos.certmanager.accessToken"; -} -int32_t CertMgrServiceProxy::GetCertStatus(CertResultInfo &certResultInfo) -{ - HILOGI("CertMgrServiceProxy GetCertStatus begin"); - MessageParcel data; - MessageParcel reply; - MessageOption option; - - if (!data.WriteInterfaceToken(CERTMANAGER_PROXY_INTERFACE_TOKEN)) { - HILOGE("GetCertStatus write interface token failed"); - return CERTMANAGER_FAIL; - } - - sptr remote = Remote(); - if (remote == nullptr) { - HILOGE("remote service null"); - return CERTMANAGER_FAIL; - } - int ret = remote->SendRequest(GET_AUTH_RESULT, data, reply, option); - if (ret != CERTMANAGER_SUCCESS) { - HILOGE("GetCertStatus: call SendRequest failed %{public}d", ret); - return CERTMANAGER_FAIL; - } - int32_t authRet; - if (!reply.ReadInt32(authRet)) { - HILOGE("GetCertStatus: authRet failed %{public}d", authRet); - return CERTMANAGER_FAIL; - } - if (authRet == CERTMANAGER_SUCCESS) { - sptr certResultInfoPtr = CertResultInfo::Unmarshalling(reply); - certResultInfo = *certResultInfoPtr; - } else { - HILOGE("GetCertStatus: authRet failed code %{public}d", authRet); - return CERTMANAGER_FAIL; - } - - return CERTMANAGER_SUCCESS; -} -} -} \ No newline at end of file diff --git a/cert_mgr_service/interfaces/kits/napi/BUILD.gn b/cert_mgr_service/interfaces/kits/napi/BUILD.gn deleted file mode 100644 index c164240..0000000 --- a/cert_mgr_service/interfaces/kits/napi/BUILD.gn +++ /dev/null @@ -1,52 +0,0 @@ -# Copyright (c) 2021 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -import("//base/cert_mgr_service/build/certconfig.gni") -import("//build/ohos.gni") - -config("cert_mgr_kit_config") { - include_dirs = [ - "${certmanager_kits_path}/include", - "//third_party/libuv/include", - "//third_party/node/src", - "//foundation/ace/napi/interfaces/kits", - ] -} - -ohos_shared_library("cert_mgr_kit") { - include_dirs = [] - configs = [ ":cert_mgr_kit_config" ] - public_configs = [ - ":cert_mgr_kit_config", - ] - sources = [ - "${certmanager_kits_path}/src/napi_init.cpp", - "${certmanager_kits_path}/src/napi_cert_mgr.cpp", - ] - - deps = [ - "${certmanager_innerkit_path}/native_cpp:cert_mgr_sdk", - "//foundation/ace/napi/:ace_napi", - "//utils/native/base:utils", - ] - - relative_install_dir = "module" - - external_deps = [ - "hiviewdfx_hilog_native:libhilog", - "ipc:ipc_core", - ] - - subsystem_name = "certmanager" - part_name = "cert_mgr_standard" -} diff --git a/cert_mgr_service/interfaces/kits/napi/include/napi_cert_mgr.h b/cert_mgr_service/interfaces/kits/napi/include/napi_cert_mgr.h deleted file mode 100644 index 71fc5bd..0000000 --- a/cert_mgr_service/interfaces/kits/napi/include/napi_cert_mgr.h +++ /dev/null @@ -1,30 +0,0 @@ -/* - * Copyright (c) 2021 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#ifndef NAPI_CERT_MGR_H -#define NAPI_CERT_MGR_H - -#include -#include -#include -#include "napi/native_api.h" -#include "napi/native_node_api.h" - -namespace OHOS { -namespace CertMgrJsKit { -napi_value CertMgrKitJsInit(napi_env env, napi_value exports); -} // namespace AccountJsKit -} // namespace OHOS -#endif // NAPI_OS_ACCOUNT_H \ No newline at end of file diff --git a/cert_mgr_service/interfaces/kits/napi/src/napi_cert_mgr.cpp b/cert_mgr_service/interfaces/kits/napi/src/napi_cert_mgr.cpp deleted file mode 100644 index 7079aeb..0000000 --- a/cert_mgr_service/interfaces/kits/napi/src/napi_cert_mgr.cpp +++ /dev/null @@ -1,93 +0,0 @@ -/* - * Copyright (c) 2021 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#include "napi_cert_mgr.h" - -namespace OHOS { -namespace CertMgrJsKit { -static napi_value Add(napi_env env, napi_callback_info info) -{ - size_t requireArgc = 2; - size_t argc = 2; - napi_value args[2] = { nullptr }; - NAPI_CALL(env, napi_get_cb_info(env, info, &argc, args, nullptr, nullptr)); - - NAPI_ASSERT(env, argc >= requireArgc, "Wrong number of arguments"); - - napi_valuetype valuetype0; - NAPI_CALL(env, napi_typeof(env, args[0], &valuetype0)); - - napi_valuetype valuetype1; - NAPI_CALL(env, napi_typeof(env, args[1], &valuetype1)); - - NAPI_ASSERT(env, valuetype0 == napi_number && valuetype1 == napi_number, "Wrong argument type. Numbers expected."); - - double value0; - NAPI_CALL(env, napi_get_value_double(env, args[0], &value0)); - - double value1; - NAPI_CALL(env, napi_get_value_double(env, args[1], &value1)); - - napi_value sum; - NAPI_CALL(env, napi_create_double(env, value0 + value1, &sum)); - - return sum; -} - -struct AsyncCallbackInfo { - napi_async_work asyncWork = nullptr; - napi_deferred deferred = nullptr; - napi_ref callback[2] = { 0 }; -}; -/* -static napi_value ProcCert(napi_env env, napi_callback_info) -{ - napi_deferred deferred = nullptr; - napi_value promise = nullptr; - NAPI_CALL(env, napi_create_promise(env, &deferred, &promise)); - - auto asyncCallbackInfo = new AsyncCallbackInfo { - .asyncWork = nullptr, - .deferred = deferred, - }; - - napi_value resourceName = nullptr; - napi_create_string_latin1(env, "TestPromise", NAPI_AUTO_LENGTH, &resourceName); - napi_create_async_work( - env, nullptr, resourceName, [](napi_env env, void* data) {}, - [](napi_env env, napi_status status, void* data) { - AsyncCallbackInfo* asyncCallbackInfo = (AsyncCallbackInfo*)data; - napi_value result = nullptr; - napi_create_string_utf8(env, "TestPromise", NAPI_AUTO_LENGTH, &result); - napi_resolve_deferred(env, asyncCallbackInfo->deferred, result); - napi_delete_async_work(env, asyncCallbackInfo->asyncWork); - delete asyncCallbackInfo; - }, - (void*)asyncCallbackInfo, &asyncCallbackInfo->asyncWork); - napi_queue_async_work(env, asyncCallbackInfo->asyncWork); - return promise; -} -*/ -napi_value CertMgrKitJsInit(napi_env env, napi_value exports) -{ - napi_property_descriptor desc[] = { - DECLARE_NAPI_FUNCTION("add", Add), - // DECLARE_NAPI_FUNCTION("ProcCert", ProcCert), - }; - NAPI_CALL(env, napi_define_properties(env, exports, sizeof(desc) / sizeof(desc[0]), desc)); - return exports; -} -} // namespace CertMgrJsKit -} // namespace OHOS \ No newline at end of file diff --git a/cert_mgr_service/interfaces/kits/napi/src/napi_init.cpp b/cert_mgr_service/interfaces/kits/napi/src/napi_init.cpp deleted file mode 100644 index 8150e87..0000000 --- a/cert_mgr_service/interfaces/kits/napi/src/napi_init.cpp +++ /dev/null @@ -1,61 +0,0 @@ -/* - * Copyright (c) 2021 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#include "napi_cert_mgr.h" - -#include "napi/native_api.h" -#include "napi/native_node_api.h" - -namespace OHOS { -namespace CertMgrJsKit { -EXTERN_C_START -/* - * Module export function - */ -static napi_value Init(napi_env env, napi_value exports) -{ - /* - * Propertise define - */ - CertMgrKitJsInit(env, exports); - - return exports; -} -EXTERN_C_END - -/* - * Module define - */ -static napi_module _module = { - - .nm_version = 1, - .nm_flags = 0, - .nm_filename = nullptr, - .nm_register_func = Init, - .nm_modname = "certMgrJsKit", - .nm_priv = ((void *)0), - .reserved = {0} - -}; - -/* - * Module register function - */ -extern "C" __attribute__((constructor)) void RegisterModule(void) -{ - napi_module_register(&_module); -} -} // namespace CertMgrJsKit -} // namespace OHOS \ No newline at end of file diff --git a/cert_mgr_service/sample/client/BUILD.gn b/cert_mgr_service/sample/client/BUILD.gn deleted file mode 100644 index a854101..0000000 --- a/cert_mgr_service/sample/client/BUILD.gn +++ /dev/null @@ -1,45 +0,0 @@ -# Copyright (c) 2021 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -import("//build/ohos.gni") -import("//base/cert_mgr_service/build/certconfig.gni") - -ohos_executable("certtestclient") { - sources = [ - "cert_mgr_main_client.cpp", - "${certmanager_standard_path}/services/cert_mgr_ability/src/cert_result_info.cpp", - ] - - include_dirs = [ - "${certmanager_standard_path}/common", - "${certmanager_standard_path}/common/log", - "${certmanager_innerkit_path}/native_cpp/include", - "//utils/native/base/include", - "${certmanager_standard_path}/services/cert_mgr_ability/include", - ] - - deps = [ - "${certmanager_standard_path}/interfaces/innerkits/native_cpp:cert_mgr_sdk", - "//utils/native/base:utils", - ] - - external_deps = [ - "hiviewdfx_hilog_native:libhilog", - "ipc:ipc_core", - "safwk:system_ability_fwk", - "samgr_standard:samgr_proxy", - ] - - subsystem_name = "certmanager" - part_name = "cert_mgr_standard" -} \ No newline at end of file diff --git a/cert_mgr_service/sample/client/cert_mgr_main_client.cpp b/cert_mgr_service/sample/client/cert_mgr_main_client.cpp deleted file mode 100644 index 0028ac9..0000000 --- a/cert_mgr_service/sample/client/cert_mgr_main_client.cpp +++ /dev/null @@ -1,53 +0,0 @@ -/* - * Copyright (C) 2022 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#include "cert_mgr_client.h" - -#include -#include - -#include "iservice_registry.h" -#include "system_ability_definition.h" -#include "system_ability.h" -#include "singleton.h" - -#include "cert_mgr_log.h" -#include "cert_result_info.h" - -using namespace OHOS; -using namespace OHOS::CertManager; -int main(int argc, char *arg[]) -{ - HILOGI("Test client main begin"); - // CertMgrClient* certManager = nullptr; - // certManager = &CertMgrClient::getInstance(); - - CertResultInfo certResultInfo; - certResultInfo.authResult_ = 3; - certResultInfo.softwareResult_ = 3; - certResultInfo.ticket_ = "test"; - HILOGI("certResultInfo authResult_ %{public}d", certResultInfo.authResult_); - HILOGI("certResultInfo softwareResult_ %{public}d", certResultInfo.softwareResult_); - HILOGI("certResultInfo ticket_ %{public}s", certResultInfo.ticket_.c_str()); - - int res = DelayedSingleton::GetInstance()->GetCertStatus(certResultInfo); - - HILOGI("certResultInfo authResult_ %{public}d", certResultInfo.authResult_); - HILOGI("certResultInfo softwareResult_ %{public}d", certResultInfo.softwareResult_); - HILOGI("certResultInfo ticket_ %{public}s", certResultInfo.ticket_.c_str()); - - HILOGI("Test client GetAuthRes = %{public}d", res); - return 0; -} \ No newline at end of file diff --git a/cert_mgr_service/services/cert_mgr_ability/BUILD.gn b/cert_mgr_service/services/cert_mgr_ability/BUILD.gn deleted file mode 100644 index 224f7b6..0000000 --- a/cert_mgr_service/services/cert_mgr_ability/BUILD.gn +++ /dev/null @@ -1,63 +0,0 @@ -# Copyright (c) 2021 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -import("//build/ohos.gni") -import("//base/cert_mgr_service/build/certconfig.gni") - -config("cert_mgr_service_config") { - visibility = [ ":*" ] - cflags = [ - "-Wall", - ] - include_dirs = [ - "include", - "${certmanager_standard_path}/services/core", - "${certmanager_standard_path}/services/core/include/cer_mgr", - "${certmanager_standard_path}/common", - "${certmanager_standard_path}/common/log", - "${certmanager_innerkit_path}/native_cpp/include", - "//utils/native/base/include", - "//utils/system/safwk/native/include", - "${certmanager_standard_path}/services/core/include", - ] -} - -ohos_shared_library("cert_mgr_service") { - sources = [ - "src/cert_mgr_service.cpp", - "src/cert_mgr_service_stub.cpp", - "src/cert_mgr_network_callback.cpp", - "src/cert_mgr_system_ability_listener.cpp", - "src/cert_result_info.cpp", - ] - - configs = [ - ":cert_mgr_service_config", - ] - - deps = [ - "//utils/native/base:utils", - "${certmanager_standard_path}/services/core:cert_mgr_core", - ] - - external_deps = [ - "hiviewdfx_hilog_native:libhilog", - "ipc:ipc_core", - "safwk:system_ability_fwk", - "samgr_standard:samgr_proxy", - "netmanager_base:net_conn_manager_if", - ] - - subsystem_name = "certmanager" - part_name = "cert_mgr_standard" -} diff --git a/cert_mgr_service/services/cert_mgr_ability/include/cert_mgr_network_callback.h b/cert_mgr_service/services/cert_mgr_ability/include/cert_mgr_network_callback.h deleted file mode 100644 index d2840fe..0000000 --- a/cert_mgr_service/services/cert_mgr_ability/include/cert_mgr_network_callback.h +++ /dev/null @@ -1,32 +0,0 @@ -/* - * Copyright (C) 2022 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#ifndef CERT_MGR_NETWORK_CALLBACK_H -#define CERT_MGR_NETWORK_CALLBACK_H - - -#include "net_conn_callback_stub.h" - -namespace OHOS { -namespace CertManager { -using namespace NetManagerStandard; - -class CertMgrNetworkCallback : public NetConnCallbackStub { - // int32_t NetAvailable(sptr &netHandle) override; - int32_t NetCapabilitiesChange(sptr &netHandle, const sptr &netAllCap) override; -}; -} // CertManager -} // OHOS -#endif // CERT_MGR_NETWORK_CALLBACK_H \ No newline at end of file diff --git a/cert_mgr_service/services/cert_mgr_ability/include/cert_mgr_service.h b/cert_mgr_service/services/cert_mgr_ability/include/cert_mgr_service.h deleted file mode 100644 index 9681722..0000000 --- a/cert_mgr_service/services/cert_mgr_ability/include/cert_mgr_service.h +++ /dev/null @@ -1,58 +0,0 @@ -/* - * Copyright (C) 2022 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#ifndef CERT_MGR_SERVICE_H -#define CERT_MGR_SERVICE_H - -#include -#include -#include "system_ability.h" -#include "iremote_stub.h" -#include "iremote_object.h" -#include "cert_mgr_interface.h" -#include "cert_mgr_service_stub.h" -#include "system_ability_status_change_stub.h" -#include "cert_result_info.h" - -namespace OHOS { -namespace CertManager { -enum class ServiceRunningState { - STATE_NOT_START, - STATE_RUNNING -}; - -class CertMgrService : public SystemAbility, public CertMgrServiceStub { - DECLARE_SYSTEM_ABILITY(CertMgrService); -public: - CertMgrService(int32_t systemAbilityId, bool runOnCreate = true):SystemAbility(systemAbilityId, runOnCreate) {}; - ~CertMgrService() = default; - void OnStart() override; - void OnStop() override; - ServiceRunningState QueryServiceState() const - { - return state_; - } - int32_t GetCertStatus(CertResultInfo &certResultInfo) override; - -private: - bool Init(); - ServiceRunningState state_ = ServiceRunningState::STATE_NOT_START; - bool registerToSa_ = false; - bool CheckPermission(const std::string &packageName); - const int32_t NETMANAGER_SAMGR_ID = 1151; -}; -} // end of CertManager -} // end of OHOS -#endif \ No newline at end of file diff --git a/cert_mgr_service/services/cert_mgr_ability/include/cert_mgr_service_stub.h b/cert_mgr_service/services/cert_mgr_ability/include/cert_mgr_service_stub.h deleted file mode 100644 index 8e05079..0000000 --- a/cert_mgr_service/services/cert_mgr_ability/include/cert_mgr_service_stub.h +++ /dev/null @@ -1,40 +0,0 @@ -/* - * Copyright (C) 2022 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#ifndef CERT_MGR_SERVICE_STUB_H -#define CERT_MGR_SERVICE_STUB_H - -#include -#include -#include "iremote_stub.h" -#include "iremote_object.h" -#include "cert_mgr_interface.h" - -namespace OHOS { -namespace CertManager { -class CertMgrServiceStub : public IRemoteStub { -public: - CertMgrServiceStub(); - ~CertMgrServiceStub(); - int OnRemoteRequest(uint32_t code, MessageParcel& data, MessageParcel& reply, MessageOption& option) override; - -private: - int GetCertStatusInner(MessageParcel& data, MessageParcel& reply); - using RequestFuncType = int (CertMgrServiceStub::*)(MessageParcel& data, MessageParcel& reply); - std::map requestFuncMap_; -}; -} // end of CertManager -} // end of OHOS -#endif \ No newline at end of file diff --git a/cert_mgr_service/services/cert_mgr_ability/include/cert_mgr_system_ability_listener.h b/cert_mgr_service/services/cert_mgr_ability/include/cert_mgr_system_ability_listener.h deleted file mode 100644 index 9aec7e4..0000000 --- a/cert_mgr_service/services/cert_mgr_ability/include/cert_mgr_system_ability_listener.h +++ /dev/null @@ -1,35 +0,0 @@ -/* - * Copyright (C) 2022 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#ifndef CERT_MGR_SYSTEM_ABILITY_LISTENER_H -#define CERT_MGR_SYSTEM_ABILITY_LISTENER_H - - -#include "system_ability_status_change_stub.h" - -namespace OHOS { -namespace CertManager { -class CertMgrSystemAbilityListener : public SystemAbilityStatusChangeStub { -public: - void OnAddSystemAbility(int32_t systemAbilityId, const std::string& deviceId) override; - void OnRemoveSystemAbility(int32_t systemAbilityId, const std::string& deviceId) override; - bool AddCertMgrSystemAbilityListener(int32_t systemAbilityId); -private: - bool RemoveCertMgrSystemAbilityListener(int32_t systemAbilityId); - bool CheckInputSysAbilityId(int32_t systemAbilityId); -}; -} // CertManager -} // OHOS -#endif // CERT_MGR_SYSTEM_ABILITY_LISTENER_H \ No newline at end of file diff --git a/cert_mgr_service/services/cert_mgr_ability/include/cert_result_info.h b/cert_mgr_service/services/cert_mgr_ability/include/cert_result_info.h deleted file mode 100644 index 7f39776..0000000 --- a/cert_mgr_service/services/cert_mgr_ability/include/cert_result_info.h +++ /dev/null @@ -1,21 +0,0 @@ -#ifndef CERT_RESULT_INFO_H -#define CERT_RESULT_INFO_H - -#include "parcel.h" -#include -#include - -namespace OHOS { -namespace CertManager { -class CertResultInfo : public Parcelable { -public: - int32_t authResult_ = -1; - int32_t softwareResult_ = -1; - std::string ticket_; - - virtual bool Marshalling(Parcel &parcel) const override; - static sptr Unmarshalling(Parcel &parcel); -}; -} // end of CertManager -} // end of OHOS -#endif \ No newline at end of file diff --git a/cert_mgr_service/services/cert_mgr_ability/src/cert_mgr_network_callback.cpp b/cert_mgr_service/services/cert_mgr_ability/src/cert_mgr_network_callback.cpp deleted file mode 100644 index 1af951f..0000000 --- a/cert_mgr_service/services/cert_mgr_ability/src/cert_mgr_network_callback.cpp +++ /dev/null @@ -1,69 +0,0 @@ -/* - * Copyright (C) 2022 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#include "cert_mgr_network_callback.h" - -#include "cstdint" - -#include "net_conn_client.h" -#include "net_conn_constants.h" - -#include "cert_mgr_log.h" -#include "cert_entry.h" - -namespace OHOS { -namespace CertManager { -int32_t CertMgrNetworkCallback::NetCapabilitiesChange( - sptr &netHandle, const sptr &netAllCap) -{ - if (netHandle == nullptr || netAllCap == nullptr) { - HILOGI("[NetCapabilitiesChange] invalid parameter"); - return 0; - } - - for (auto netCap : netAllCap->netCaps_) { - switch (netCap) { - case NET_CAPABILITY_MMS: - HILOGI("[NetCapabilitiesChange] NET_CAPABILITY_MMS start"); - break; - case NET_CAPABILITY_NOT_METERED: - HILOGI("[NetCapabilitiesChange] NET_CAPABILITY_NOT_METERED start"); - break; - case NET_CAPABILITY_INTERNET: - { - HILOGI("[NetCapabilitiesChange] NET_CAPABILITY_INTERNET start"); - int ret = CertTask(); - HILOGI("CertMgrService test success, ret = %{public}d", ret); - break; - } - case NET_CAPABILITY_NOT_VPN: - HILOGI("[NetCapabilitiesChange] NET_CAPABILITY_NOT_VPN start"); - break; - case NET_CAPABILITY_VALIDATED: - HILOGI("[NetCapabilitiesChange] NET_CAPABILITY_VALIDATED start"); - break; - case NET_CAPABILITY_CAPTIVE_PORTAL: - HILOGI("[NetCapabilitiesChange] NET_CAPABILITY_CAPTIVE_PORTAL start"); - break; - default: - HILOGI("[NetCapabilitiesChange] default start"); - break; - } - } - return 0; -} -} // CertManager -} // OHOS - diff --git a/cert_mgr_service/services/cert_mgr_ability/src/cert_mgr_service.cpp b/cert_mgr_service/services/cert_mgr_ability/src/cert_mgr_service.cpp deleted file mode 100644 index 74fc76c..0000000 --- a/cert_mgr_service/services/cert_mgr_ability/src/cert_mgr_service.cpp +++ /dev/null @@ -1,102 +0,0 @@ -/* - * Copyright (C) 2022 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#include "cert_mgr_service.h" - -#include -#include -#include - -#include "cstdint" - -#include "system_ability_definition.h" -#include "system_ability_status_change_stub.h" -#include "iservice_registry.h" - -#include "net_conn_client.h" -#include "net_conn_constants.h" - -#include "cert_mgr_errno.h" -#include "cert_mgr_log.h" -#include "cert_mgr_system_ability_listener.h" -#include "cert_result_info.h" -#include "cert_entry.h" - -using namespace std; -namespace OHOS { -namespace CertManager { -REGISTER_SYSTEM_ABILITY_BY_ID(CertMgrService, CERT_MANAGER_PROFILE_SA_ID, true) - -void CertMgrService::OnStart() -{ - HILOGI("CertMgrService OnStart"); - if (state_ == ServiceRunningState::STATE_RUNNING) { - HILOGI("CertManager Service has already started."); - return; - } - if (!Init()) { - HILOGE("Failed to init CertMgrService."); - return; - } - state_ = ServiceRunningState::STATE_RUNNING; - HILOGI("CertMgrService start success"); - sptr certMgrSystemAbilityListener = - (std::make_unique()).release(); - if (!certMgrSystemAbilityListener->AddCertMgrSystemAbilityListener(NETMANAGER_SAMGR_ID)) { - HILOGE("AddCertMgrSystemAbilityListener failed."); - } -} -bool CertMgrService::Init() -{ - HILOGI("CertMgrService Init begin"); - if (!registerToSa_) { - bool ret = Publish(this); - if (!ret) { - HILOGE("CertMgrService Init Publish failed"); - return false; - } - registerToSa_ = true; - } - HILOGI("CertMgrService Init Success"); - return true; -} -void CertMgrService::OnStop() -{ - HILOGI("CertMgrService OnStop Begin"); - state_ = ServiceRunningState::STATE_NOT_START; - registerToSa_ = false; -} -int CertMgrService::GetCertStatus(CertResultInfo &certResultInfo) -{ - char* ticketStr = NULL; - int authRes = QueryCert(&certResultInfo.authResult_, &certResultInfo.softwareResult_, &ticketStr); - if (authRes == CERTMANAGER_SUCCESS) { - certResultInfo.ticket_ = ticketStr; - } - HILOGI("GetCertStatus end success %{public}d", authRes); - return authRes; -} -// 根据入参判断接口权限,当前没有入参,后续确认不需要后再删除 -bool CertMgrService::CheckPermission(const std::string &packageName) -{ - HILOGI("CertMgrService CheckPermission packageName %{public}s", packageName.c_str()); - if (packageName.empty()) { - HILOGE("CheckPermission param is null"); - return false; - } - return true; -} -} // end of CertManager -} // end of OHOS \ No newline at end of file diff --git a/cert_mgr_service/services/cert_mgr_ability/src/cert_mgr_service_stub.cpp b/cert_mgr_service/services/cert_mgr_ability/src/cert_mgr_service_stub.cpp deleted file mode 100644 index 2c76d0b..0000000 --- a/cert_mgr_service/services/cert_mgr_ability/src/cert_mgr_service_stub.cpp +++ /dev/null @@ -1,87 +0,0 @@ -/* - * Copyright (C) 2022 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#include "cert_mgr_service_stub.h" - -#include - -#include "system_ability_definition.h" -#include "iremote_object.h" -#include "iremote_stub.h" -#include "iservice_registry.h" - -#include "cert_mgr_log.h" -#include "cert_mgr_errno.h" -#include "cert_result_info.h" - -namespace OHOS { -namespace CertManager { -namespace { -const std::u16string CERTMANAGER_PROXY_INTERFACE_TOKEN = u"ohos.certmanager.accessToken"; -} - - -CertMgrServiceStub::CertMgrServiceStub() -{ - requestFuncMap_[GET_AUTH_RESULT] = &CertMgrServiceStub::GetCertStatusInner; -} - -CertMgrServiceStub::~CertMgrServiceStub() -{ - requestFuncMap_.clear(); -} - -int CertMgrServiceStub::OnRemoteRequest(uint32_t code, MessageParcel& data, MessageParcel& reply, MessageOption& option) -{ - HILOGD("CertMgrServiceStub::OnRemoteRequest, cmd = %{public}d, flags = %{public}d", code, option.GetFlags()); - std::u16string remoteDescriptor = data.ReadInterfaceToken(); - if (CERTMANAGER_PROXY_INTERFACE_TOKEN != remoteDescriptor) { - HILOGE("CertMgrServiceStub::OnRemoteRequest failed, descriptor is not matched!"); - return CERTMANAGER_SERVICE_FAILED; - } - auto itFunc = requestFuncMap_.find(code); - if (itFunc != requestFuncMap_.end()) { - auto requestFunc = itFunc->second; - if (requestFunc != nullptr) { - return (this->*requestFunc)(data, reply); - } - } - HILOGE("CertMgrServiceStub::OnRemoteRequest, default case"); - return IPCObjectStub::OnRemoteRequest(code, data, reply, option); -} - -int CertMgrServiceStub::GetCertStatusInner(MessageParcel& data, MessageParcel& reply) -{ - HILOGD("CertMgrServiceStub::GetCertStatusInner"); - CertResultInfo certResultInfo; - int ret = GetCertStatus(certResultInfo); - if (!reply.WriteInt32(ret)) { - HILOGE("GetCertStatusInner: write result fail, %{public}d", ret); - return CERTMANAGER_FAIL; - } - if (ret == CERTMANAGER_SUCCESS) { - sptr certResultInfoPtr = (std::make_unique(certResultInfo)).release(); - if (!certResultInfoPtr->Marshalling(reply)) { - HILOGE("GetCertStatusInner stub Marshalling failed"); - return CERTMANAGER_FAIL; - } - } else { - HILOGE("GetCertStatusInner: GetCertStatus fail, %{public}d", ret); - return CERTMANAGER_FAIL; - } - return CERTMANAGER_SUCCESS; -} -} // end of CertManager -} // end of OHOS \ No newline at end of file diff --git a/cert_mgr_service/services/cert_mgr_ability/src/cert_mgr_system_ability_listener.cpp b/cert_mgr_service/services/cert_mgr_ability/src/cert_mgr_system_ability_listener.cpp deleted file mode 100644 index 296793a..0000000 --- a/cert_mgr_service/services/cert_mgr_ability/src/cert_mgr_system_ability_listener.cpp +++ /dev/null @@ -1,118 +0,0 @@ -/* - * Copyright (C) 2022 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#include "cert_mgr_system_ability_listener.h" - -#include "cstdint" -#include - -#include "net_conn_client.h" -#include "net_conn_constants.h" - -#include "system_ability_definition.h" -#include "system_ability_status_change_stub.h" -#include "iservice_registry.h" - -#include "cert_mgr_log.h" -#include "cert_mgr_network_callback.h" - -namespace OHOS { -namespace CertManager { -using namespace NetManagerStandard; -constexpr std::int32_t WAIT_FOR_KVSTORE = 1000; - -void CertMgrSystemAbilityListener::OnAddSystemAbility(int32_t systemAbilityId, const std::string& deviceId) -{ - HILOGI("SA:%{public}d added", systemAbilityId); - - std::shared_ptr netManager = DelayedSingleton::GetInstance(); - if (netManager == nullptr) { - HILOGE("Failed to init NetConnClient."); - return; - } - - sptr callback = (std::make_unique()).release(); - int32_t ret = 0; - for (size_t i = 0; i < 5; i++) { - std::this_thread::sleep_for(std::chrono::milliseconds(WAIT_FOR_KVSTORE)); - ret = netManager->RegisterNetConnCallback(callback); - if (ret == NetConnResultCode::NET_CONN_SUCCESS) { - break; - } - } - - if (ret == NetConnResultCode::NET_CONN_SUCCESS) { - HILOGE("RegisterNetConnCallback success."); - } else { - HILOGE("RegisterNetConnCallback failed."); - } - - if (RemoveCertMgrSystemAbilityListener(systemAbilityId)) { - HILOGE("RemoveSystemAbilityListener success."); - } -} - -void CertMgrSystemAbilityListener::OnRemoveSystemAbility(int32_t systemAbilityId, const std::string& deviceId) -{ - HILOGI("SA:%{public}d removed", systemAbilityId); -} - -bool CertMgrSystemAbilityListener::AddCertMgrSystemAbilityListener(int32_t systemAbilityId) -{ - HILOGI("AddCertMgrSystemAbilityListener start"); - if (!CheckInputSysAbilityId(systemAbilityId)) { - HILOGI("systemAbilityId invalid %{public}d", systemAbilityId); - return false; - } - auto samgrProxy = SystemAbilityManagerClient::GetInstance().GetSystemAbilityManager(); - if (samgrProxy == nullptr) { - HILOGI("failed to get samgrProxy"); - return false; - } - int32_t ret = samgrProxy->SubscribeSystemAbility(systemAbilityId, this); - HILOGI("SubscribeSystemAbility ret: %{public}d", ret); - if (ret) { - HILOGI("failed to subscribe sa: %{public}d", systemAbilityId); - return false; - } - return true; -} - -bool CertMgrSystemAbilityListener::RemoveCertMgrSystemAbilityListener(int32_t systemAbilityId) -{ - if (!CheckInputSysAbilityId(systemAbilityId)) { - HILOGI("systemAbilityId invalid %{public}d", systemAbilityId); - return false; - } - auto samgrProxy = SystemAbilityManagerClient::GetInstance().GetSystemAbilityManager(); - if (samgrProxy == nullptr) { - HILOGI("failed to get samgrProxy"); - return false; - } - int32_t ret = samgrProxy->UnSubscribeSystemAbility(systemAbilityId, this); - HILOGI("UnSubscribeSystemAbility ret: %{public}d", ret); - if (ret) { - HILOGI("failed to unsubscribe sa: %{public}d", systemAbilityId); - return false; - } - return true; -} - -bool CertMgrSystemAbilityListener::CheckInputSysAbilityId(int32_t systemAbilityId) -{ - return (systemAbilityId >= FIRST_SYS_ABILITY_ID) && (systemAbilityId <= LAST_SYS_ABILITY_ID); -} -} // CertManager -} // OHOS \ No newline at end of file diff --git a/cert_mgr_service/services/cert_mgr_ability/src/cert_result_info.cpp b/cert_mgr_service/services/cert_mgr_ability/src/cert_result_info.cpp deleted file mode 100644 index 62dd11f..0000000 --- a/cert_mgr_service/services/cert_mgr_ability/src/cert_result_info.cpp +++ /dev/null @@ -1,32 +0,0 @@ -#include "cert_result_info.h" - -namespace OHOS { -namespace CertManager { -bool CertResultInfo::Marshalling(Parcel &parcel) const -{ - if (!parcel.WriteInt32(authResult_)) { - return false; - } - if (!parcel.WriteInt32(softwareResult_)) { - return false; - } - if (!parcel.WriteString(ticket_)) { - return false; - } - return true; -} - -sptr CertResultInfo::Unmarshalling(Parcel &parcel) -{ - sptr ptr = (std::make_unique()).release(); - if (ptr == nullptr) { - return nullptr; - } - if (!parcel.ReadInt32(ptr->authResult_) || !parcel.ReadInt32(ptr->softwareResult_) || - !parcel.ReadString(ptr->ticket_)) { - return nullptr; - } - return ptr; -} -} -} \ No newline at end of file diff --git a/cert_mgr_service/services/core/BUILD.gn b/cert_mgr_service/services/core/BUILD.gn index b7de0eb..55b7fe4 100644 --- a/cert_mgr_service/services/core/BUILD.gn +++ b/cert_mgr_service/services/core/BUILD.gn @@ -13,9 +13,9 @@ import("//base/cert_mgr_service/build/certconfig.gni") if (defined(ohos_lite)) { -import("//build/lite/config/component/lite_component.gni") + import("//build/lite/config/component/lite_component.gni") } else { -import("//build/ohos.gni") + import("//build/ohos.gni") } local_deps = [] @@ -71,24 +71,6 @@ config("cert_mgr_core_config") { ] } - if (is_standard_system) { - local_deps += [ - "//third_party/openssl:libssl_static", - "//third_party/openssl:openssl_static", - "//third_party/openssl:ssl_source", - "//third_party/openssl:libcrypto_static", - "//base/startup/syspara_lite/interfaces/innerkits/native/syspara:syspara", - "${certmanager_standard_path}/services/oem_adapter:cert_mgr_oem_adapter" - ] - external_deps = [ - "hiviewdfx_hilog_native:libhilog", - "utils_base:utils", - "startup_l2:syspara", - ] - subsystem_name = "certmanager" - part_name = "cert_mgr_standard" - } - if (is_liteos_m) { include_dirs += ["${certmanager_path}/services/oem_adapter/include"] defines += [ diff --git a/cert_mgr_service/services/core/cert_entry.c b/cert_mgr_service/services/core/cert_entry.c index e099c4d..6b98dc5 100644 --- a/cert_mgr_service/services/core/cert_entry.c +++ b/cert_mgr_service/services/core/cert_entry.c @@ -45,7 +45,7 @@ static void CloudTask(void *argv) } static void CertAuthCallBack() { - if (CreateCertThread(CloudTask, (void *)ProcCert, "CertAuth") != CERT_OK) { + if (CreateCertThread(CloudTask, (void *)ProcCert, CERT_CALLBACK_THREAD_NAME) != CERT_OK) { CERT_LOG_ERROR("[CertAuthCallBack] CreateCertThread return faile"); } return; @@ -80,7 +80,7 @@ static void CertSdkMain(void) osThreadAttr_t attr = {0}; attr.stack_size = LITEOS_M_STACK_SIZE; attr.priority = osPriorityNormal; - attr.name = "CertSdk"; + attr.name = CERT_TASK_THREAD_NAME; if (osThreadNew((osThreadFunc_t)CertTask, NULL, &attr) == NULL) { CERT_LOG_INFO("[CertSdkMain]: osThreadNew CertTask failed.\n"); } diff --git a/cert_mgr_service/services/core/cert_entry.h b/cert_mgr_service/services/core/cert_entry.h index 5a35078..42c8313 100644 --- a/cert_mgr_service/services/core/cert_entry.h +++ b/cert_mgr_service/services/core/cert_entry.h @@ -22,6 +22,9 @@ extern "C" { #endif #endif /* __cplusplus */ +#define CERT_TASK_THREAD_NAME "CertSdk" +#define CERT_CALLBACK_THREAD_NAME "CertAuth" + typedef void(*CloudCommunicationCallback)(); int32_t CertTask(); diff --git a/cert_mgr_service/services/core/utils/cert_utils_file.c b/cert_mgr_service/services/core/utils/cert_utils_file.c index 1419342..b2889d4 100644 --- a/cert_mgr_service/services/core/utils/cert_utils_file.c +++ b/cert_mgr_service/services/core/utils/cert_utils_file.c @@ -36,11 +36,11 @@ bool IsOverTemperatureLimit(void) if (ret != HI_ERR_SUCCESS) { ret = hi_tsensor_read_temperature(&temperature); if (ret != HI_ERR_SUCCESS) { - printf("[IsOverTemperatureLimit]: Get temperature fail, ret = %d\n", ret); + CERT_LOG_ERROR("[IsOverTemperatureLimit]: Get temperature fail, ret = %d\n", ret); return true; } } - printf("[IsOverTemperatureLimit]: device's temperature = %d\n", temperature); + CERT_LOG_DEBUG("[IsOverTemperatureLimit]: device's temperature = %d\n", temperature); return (temperature >= WRITE_FLASH_MAX_TEMPERATURE); } @@ -74,6 +74,7 @@ static bool L0IsFileExist(const char* path) if (path == NULL) { return false; } + int32_t fd = UtilsFileOpen(path, O_RDONLY_FS, 0); if (fd < 0) { return false; @@ -87,6 +88,7 @@ static int32_t L0CreateFile(const char* path) if (path == NULL) { return CERT_ERR; } + int32_t fd = UtilsFileOpen(path, O_CREAT_FS, 0); if (fd < 0) { return CERT_ERR; @@ -106,14 +108,16 @@ static int32_t L0WriteFile(const char* path, const char* data, uint32_t dataLen, if (IsOverTemperatureLimit()) { return CERT_ERR; } + int32_t fd = UtilsFileOpen(path, flag, 0); if (fd < 0) { - printf("[WriteFile] : Open file failed\n"); + CERT_LOG_ERROR("[WriteFile] : Open file failed\n"); return CERT_ERR; } + int ret = 0; if (UtilsFileWrite(fd, data, dataLen) != dataLen) { - printf("[WriteFile] : Write data failed\n"); + CERT_LOG_ERROR("[WriteFile] : Write data failed\n"); ret = CERT_ERR; } (void)UtilsFileClose(fd); @@ -129,20 +133,22 @@ static int32_t L0ReadFile(const char* path, char* buffer, uint32_t bufferLen) if (!L0IsFileExist(path)) { return CERT_ERR; } + uint32_t fileSize = 0; - if (UtilsFileStat(path, &fileSize)!= 0) { + if (UtilsFileStat(path, &fileSize) != 0) { return CERT_ERR; } if (fileSize > bufferLen) { - printf("[ReadFile] : Read data over buffer length\n"); + CERT_LOG_ERROR("[ReadFile] : Read data over buffer length\n"); return CERT_ERR; } int32_t fd = UtilsFileOpen(path, O_EXCL_FS | O_RDWR_FS, 0); if (fd < 0) { - printf("[ReadFile] : Open file failed\n"); + CERT_LOG_ERROR("[ReadFile] : Open file failed\n"); return CERT_ERR; } + int ret = 0; ret = UtilsFileRead(fd, buffer, bufferLen); (void)UtilsFileClose(fd); @@ -161,7 +167,11 @@ int32_t GetFileSize(const char* path, const char* fileName, uint32_t* result) // L0demo if (CERT_L0_DEVICE_FLAG) { - return UtilsFileStat(fileName, result); + int32_t ret = UtilsFileStat(fileName, result); + if (ret < 0) { + return CERT_ERR; + } + return CERT_OK; } char* filePath = GenFilePath(path, fileName); @@ -203,7 +213,11 @@ int32_t WriteFile(const char* path, const char* fileName, const char* data, uint } // L0demo if (CERT_L0_DEVICE_FLAG) { - return L0WriteFile(fileName, data, dataLen, O_CREAT_FS | O_TRUNC_FS | O_RDWR_FS); + int32_t ret = L0WriteFile(fileName, data, dataLen, O_CREAT_FS | O_TRUNC_FS | O_RDWR_FS); + if (ret < 0) { + return CERT_ERR; + } + return CERT_OK; } char* filePath = GenFilePath(path, fileName); @@ -251,7 +265,11 @@ int32_t ReadFile(const char* path, const char* fileName, char* buffer, uint32_t // L0demo if (CERT_L0_DEVICE_FLAG) { - return L0ReadFile(fileName, buffer, bufferLen); + int32_t ret = L0ReadFile(fileName, buffer, bufferLen); + if (ret < 0) { + return CERT_ERR; + } + return CERT_OK; } char* filePath = GenFilePath(path, fileName); @@ -292,7 +310,11 @@ int32_t CreateFile(const char* path, const char* fileName) // L0demo if (CERT_L0_DEVICE_FLAG) { - return L0CreateFile(fileName); + int32_t ret = L0CreateFile(fileName); + if (ret < 0) { + return CERT_ERR; + } + return CERT_OK; } char* formatPath = realpath(path, NULL); @@ -334,7 +356,10 @@ bool IsFileExist(const char* path, const char* fileName) // L0demo if (CERT_L0_DEVICE_FLAG) { - return L0IsFileExist(fileName); + if (!L0IsFileExist(fileName)) { + return false; + } + return true; } char* filePath = GenFilePath(path, fileName); diff --git a/cert_mgr_service/services/core/utils/cert_utils_log.c b/cert_mgr_service/services/core/utils/cert_utils_log.c index c57ec6a..6b1146f 100644 --- a/cert_mgr_service/services/core/utils/cert_utils_log.c +++ b/cert_mgr_service/services/core/utils/cert_utils_log.c @@ -25,19 +25,19 @@ static void CertLogPrint(CertLogLevel logLevel, const char *logBuf) #ifdef __CERT_L0_DEVICE__ switch (logLevel) { case CERT_LOG_LEVEL_DEBUG: - printf("%s%s\r\n", "[D]",logBuf); + printf("%s%s\r\n", "[D]", logBuf); break; case CERT_LOG_LEVEL_INFO: - printf("%s%s\r\n", "[I]",logBuf); + printf("%s%s\r\n", "[I]", logBuf); break; case CERT_LOG_LEVEL_WARN: - printf("%s%s\r\n", "[W]",logBuf); + printf("%s%s\r\n", "[W]", logBuf); break; case CERT_LOG_LEVEL_ERROR: - printf("%s%s\r\n", "[E]",logBuf); + printf("%s%s\r\n", "[E]", logBuf); break; case CERT_LOG_LEVEL_FATAL: - printf("%s%s\r\n", "[F]",logBuf); + printf("%s%s\r\n", "[F]", logBuf); break; default: break; diff --git a/cert_mgr_service/services/etc/init/BUILD.gn b/cert_mgr_service/services/etc/init/BUILD.gn deleted file mode 100644 index a138f69..0000000 --- a/cert_mgr_service/services/etc/init/BUILD.gn +++ /dev/null @@ -1,32 +0,0 @@ -# Copyright (c) 2021 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -import("//build/ohos.gni") -import("//base/cert_mgr_service/build/certconfig.gni") - -group("cert_mgr_etc") { - deps = [ - ":cert_mgr_sa.rc", - ] -} - -ohos_prebuilt_etc("cert_mgr_sa.rc") { - if (use_musl) { - source = "cert_mgr_sa.cfg" - } else { - source = "cert_mgr_sa.rc" - } - relative_install_dir = "init" - subsystem_name = "certmanager" - part_name = "cert_mgr_standard" -} diff --git a/cert_mgr_service/services/etc/init/cert_mgr_sa.cfg b/cert_mgr_service/services/etc/init/cert_mgr_sa.cfg deleted file mode 100644 index 90e0c2e..0000000 --- a/cert_mgr_service/services/etc/init/cert_mgr_sa.cfg +++ /dev/null @@ -1,16 +0,0 @@ -{ - "jobs" : [{ - "name" : "post-fs-data", - "cmds" : [ - "start cert_mgr_server" - ] - } - ], - "services" : [{ - "name" : "cert_mgr_server", - "path" : ["/system/bin/sa_main", "/system/profile/cert_mgr_service.xml"], - "uid" : "root", - "gid" : ["system", "shell", "uhid", "root"] - } - ] -} diff --git a/cert_mgr_service/services/etc/init/cert_mgr_sa.rc b/cert_mgr_service/services/etc/init/cert_mgr_sa.rc deleted file mode 100644 index 6f2dbbf..0000000 --- a/cert_mgr_service/services/etc/init/cert_mgr_sa.rc +++ /dev/null @@ -1,17 +0,0 @@ -# Copyright (C) 2021 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -service cert_mgr_server /system/bin/sa_main /system/profile/cert_mgr_service.xml - class z_core - user root - group system shell diff --git a/cert_mgr_service/services/oem_adapter/BUILD.gn b/cert_mgr_service/services/oem_adapter/BUILD.gn index d9ee086..c7dce06 100644 --- a/cert_mgr_service/services/oem_adapter/BUILD.gn +++ b/cert_mgr_service/services/oem_adapter/BUILD.gn @@ -13,9 +13,9 @@ import("//base/cert_mgr_service/build/certconfig.gni") if (defined(ohos_lite)) { -import("//build/lite/config/component/lite_component.gni") + import("//build/lite/config/component/lite_component.gni") } else { -import("//build/ohos.gni") + import("//build/ohos.gni") } @@ -33,15 +33,6 @@ config("cert_mgr_oem_adapter_config") { "//third_party/bounds_checking_function/include", ] - if (is_standard_system) { - external_deps = [ - "hiviewdfx_hilog_native:libhilog", - "utils_base:utils", - ] - subsystem_name = "certmanager" - part_name = "cert_mgr_standard" - } - defines = [] if(is_liteos_m){ diff --git a/cert_mgr_service/services/oem_adapter/src/cert_mgr_oem_file.c b/cert_mgr_service/services/oem_adapter/src/cert_mgr_oem_file.c index 4265bbf..6d00348 100644 --- a/cert_mgr_service/services/oem_adapter/src/cert_mgr_oem_file.c +++ b/cert_mgr_service/services/oem_adapter/src/cert_mgr_oem_file.c @@ -35,11 +35,9 @@ bool OEMIsOverTemperatureLimit(void) if (ret != HI_ERR_SUCCESS) { ret = hi_tsensor_read_temperature(&temperature); if (ret != HI_ERR_SUCCESS) { - printf("OEM Adapter: Get temperature fail, ret = %d\n", ret); return true; } } - printf("OEM Adapter: device's temperature = %d\n", temperature); return (temperature >= WRITE_FLASH_MAX_TEMPERATURE); } @@ -145,6 +143,7 @@ static int32_t WriteFile(const char* path, const char* data, uint32_t dataLen, i printf("OEM Adapter : Open file failed\n"); return CERT_MGR_OEM_ERR; } + int ret = 0; if (UtilsFileWrite(fd,data,dataLen) != dataLen) { ret = CERT_MGR_OEM_ERR; diff --git a/cert_mgr_service/services/sa_profile/7100.xml b/cert_mgr_service/services/sa_profile/7100.xml deleted file mode 100644 index 28e2469..0000000 --- a/cert_mgr_service/services/sa_profile/7100.xml +++ /dev/null @@ -1,11 +0,0 @@ - - - cert_mgr_service - - 7100 - libcert_mgr_service.z.so - true - false - 1 - - \ No newline at end of file diff --git a/cert_mgr_service/services/sa_profile/BUILD.gn b/cert_mgr_service/services/sa_profile/BUILD.gn deleted file mode 100644 index f345abc..0000000 --- a/cert_mgr_service/services/sa_profile/BUILD.gn +++ /dev/null @@ -1,21 +0,0 @@ -# Copyright (c) 2021 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -import("//build/ohos.gni") -import("//base/cert_mgr_service/build/certconfig.gni") - -ohos_sa_profile("cert_mgr_sa_profile") { - sources = [ "7100.xml" ] - - part_name = "cert_mgr_standard" -} diff --git a/cert_mgr_service/test/unittest/BUILD.gn b/cert_mgr_service/test/unittest/BUILD.gn index 11e6c0c..4ba9469 100644 --- a/cert_mgr_service/test/unittest/BUILD.gn +++ b/cert_mgr_service/test/unittest/BUILD.gn @@ -3,64 +3,6 @@ import("//build/test.gni") import("//base/cert_mgr_service/build/certconfig.gni") -if (is_standard_system) { -module_output_path = "certmgr/uttest" - -deps_in = [ - "//third_party/cJSON:cjson_static", - "//third_party/mbedtls:mbedtls_shared", - "//third_party/googletest:gtest_main", - "//third_party/googletest:gmock", - "//utils/native/base:utils" -] - -deps_ex = [ - "hiviewdfx_hilog_native:libhilog", - "ipc:ipc_core", - "safwk:system_ability_fwk", - "samgr_standard:samgr_proxy", -] - -ohos_unittest("CertMgrSdkTest") { - module_out_path = module_output_path - - sources = [ - "src/CertMgrSdkTest.cpp", - ] - - configs = [ ":module_private_config" ] - - deps = deps_in - deps += [ - "${certmanager_standard_path}/interfaces/innerkits/native_cpp:cert_mgr_sdk", - ] - external_deps = deps_ex -} - -ohos_unittest("CertMgrCoreTest") { - module_out_path = module_output_path - - sources = [ - "src/CertMgrCoreDeviceTest.cpp", - "src/CertMgrCoreServiceTest.cpp", - "src/CertMgrCoreMemTest.cpp", - "src/cert_mock.c", - ] - - configs = [ ":module_private_config" ] - - deps = deps_in - deps += [ - "${certmanager_standard_path}/services/core:cert_mgr_core", - "${certmanager_standard_path}/services/cert_mgr_ability:cert_mgr_service", - "${certmanager_standard_path}/interfaces/innerkits/native_cpp:cert_mgr_sdk", - "//utils/native/base:utils", - ] - external_deps = deps_ex -} - -} - config("module_private_config") { visibility = [ ":*" ] cflags_cc = [ diff --git a/cert_mgr_service/test/unittest/src/CertMgrCoreDeviceTest.cpp b/cert_mgr_service/test/unittest/src/CertMgrCoreDeviceTest.cpp deleted file mode 100644 index 10b7095..0000000 --- a/cert_mgr_service/test/unittest/src/CertMgrCoreDeviceTest.cpp +++ /dev/null @@ -1,229 +0,0 @@ -/* - * Copyright (C) 2022 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#include -#include -#include "cJSON.h" -#include -#include -#include "pthread.h" -#include "cert_mgr_log.h" -#include "cert_type.h" -#include "cert_utils.h" -#include "cert_utils_log.h" -#include "cert_adapter.h" -#include "cert_adapter_os.h" -#include "cert_service_device.h" - -using namespace testing; -using namespace testing::ext; -using namespace std; -using namespace OHOS; -using namespace OHOS::CertManager; - -extern char* g_devSysInfos []; -extern SetDataFunc g_setDataFunc[]; -extern const char* g_devSysInfosStr[]; - -class CertMgrCoreDeviceTest : public testing::Test { -public: - // 测试套预置动作,在第一个TestCase之前执行 - static void SetUpTestCase(void); - // 测试套清理动作,在最后一个TestCase后执行 - static void TearDownTestCase(void); - // 用例的预置动作 - void SetUp(); - // 用例的清理动作 - void TearDown(); - int32_t InitSysDataTest(void); -}; - -void CertMgrCoreDeviceTest::SetUpTestCase(void) -{ - // input testsuit setup step,setup invoked before all testcases -} - -void CertMgrCoreDeviceTest::TearDownTestCase(void) -{ - // input testsuit teardown step,teardown invoked after all testcases -} - -void CertMgrCoreDeviceTest::SetUp(void) -{ - // input testcase setup step,setup invoked before each testcases -} - -void CertMgrCoreDeviceTest::TearDown(void) -{ - // input testcase teardown step,teardown invoked after each testcases -} - -/** - * - * @tc.name: CertMgrService_Example_001 - * @tc.desc: test add function - * @tc.type: FUNC - */ - -HWTEST_F(CertMgrCoreDeviceTest, CertMgrService_Example_001, TestSize.Level0) -{ - // step 1: 准备数据 - HILOGI("-------------CertMgrService_Example_001 begin -----------------"); - int result = 4; - - // step 2: 验证功能 - EXPECT_EQ(result, 4) << "EXPECT_EQ(result, 4) is false."<< endl; - - // step 3: 恢复环境 - EXPECT_NE(result, 5) << "EXPECT_NE(result, 5) is false" << endl; - - HILOGI("-------------CertMgrService_Example_001 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreDeviceTest_InitSysData_001 - * @tc.desc: 验证初始化系统参数功能 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreDeviceTest, CertMgrCoreDeviceTest_InitSysData_001, TestSize.Level0) -{ - // step 1: 准备数据 - - // step 2: 验证功能 - HILOGI("-------------CertMgrCoreDeviceTest_InitSysData_001 begin -----------------"); - int32_t result = InitSysData(); - EXPECT_EQ(CERT_OK, result) << "InitSysData failed." << endl; - - for (int32_t type = 0; type < SYS_DEV_MAX; type++) { - if (type == RANDOM_UUID) { // UUID为随机数,暂时跳过。 - continue; - } - char* devSysInfo = StrdupDevInfo((SYS_DEV_TYPE_E)type); // 读系统参数 - ASSERT_TRUE(devSysInfo != NULL) << "devSysInfo == NULL" << endl; - SetDataFunc setDataFunc = g_setDataFunc[type]; // 读取文件 - ASSERT_TRUE(setDataFunc != NULL) << "setDataFunc == NULL" << endl; - char* devInfo = setDataFunc(); - ASSERT_TRUE(devSysInfo != NULL) << "devSysInfo == NULL" << endl; - EXPECT_STREQ(devSysInfo, devInfo) << g_devSysInfosStr[type] << " is not equal. System para ="<< - devSysInfo <<", device para =" << devInfo <<"."<< endl; - } - - // step 3: 恢复环境 - DestroySysData(); - EXPECT_TRUE(g_devSysInfos[0] == NULL) << "g_devSysInfos[0]:" << g_devSysInfos[0] << endl; - HILOGI("-------------CertMgrCoreDeviceTest_InitSysData_001 end -----------------"); -} - - -/** - * - * @tc.name: CertMgrService_DestroySysData_001 - * @tc.desc: 验证销毁功能 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreDeviceTest, CertMgrCoreDeviceTest_DestroySysData_001, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreDeviceTest_DestroySysData_001 begin -----------------"); - // step 1: 准备数据 - int32_t result = InitSysData(); - ASSERT_TRUE(result == CERT_OK) << "InitSysData failed." << endl; - - // step 2: 验证功能 - DestroySysData(); - for (int32_t type = 0; type < SYS_DEV_MAX; type++) { - ASSERT_TRUE(g_devSysInfos[type] == NULL) << "devSysInfo != NULL" << endl; - } - - // step 3: 恢复环境 - HILOGI("-------------CertMgrCoreDeviceTest_DestroySysData_001 end -----------------"); -} - -/** - * - * @tc.name: CertMgrService_DestroySysData_002 - * @tc.desc: 验证重复销毁,第二次不处理。 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreDeviceTest, CertMgrCoreDeviceTest_DestroySysData_002, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreDeviceTest_DestroySysData_002 begin -----------------"); - // step 1: 准备数据 - int32_t result = InitSysData(); - ASSERT_TRUE(result == CERT_OK) << "InitSysData failed." << endl; - ASSERT_TRUE(g_devSysInfos[0] != NULL) << "g_devSysInfos[0]:" << g_devSysInfos[0] << endl; - - // step 2: 验证功能 - DestroySysData(); - ASSERT_TRUE(g_devSysInfos[0] == NULL) << "g_devSysInfos[0]:" << g_devSysInfos[0] << endl; - - // step 3: 恢复环境 - HILOGI("-------------CertMgrCoreDeviceTest_DestroySysData_002 end -----------------"); -} - -/** - * - * @tc.name: CertMgrService_StrdupDevInfo_001 - * @tc.desc: StrdupDevInfo传入参与大于SYS_DEV_MAX,返回NULL - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreDeviceTest, CertMgrCoreDeviceTest_StrdupDevInfo_001, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreDeviceTest_StrdupDevInfo_001 begin -----------------"); - // step 1: 准备数据 - int32_t result = InitSysData(); - ASSERT_TRUE(result == CERT_OK) << "InitSysData failed." << endl; - ASSERT_TRUE(g_devSysInfos[0] != NULL) << "g_devSysInfos[0]:" << g_devSysInfos[0] << endl; - - // step 2: 验证功能 - char* devInfo = StrdupDevInfo(SYS_DEV_MAX); - EXPECT_TRUE(devInfo == NULL) << "devInfo:" << devInfo << endl; - - devInfo = StrdupDevInfo(SYS_DEV_TYPE_E(SYS_DEV_MAX + 1)); - EXPECT_TRUE(devInfo == NULL) << "devInfo:" << devInfo << endl; - - // step 3: 恢复环境 - DestroySysData(); - ASSERT_TRUE(g_devSysInfos[0] == NULL) << "g_devSysInfos[0]:" << g_devSysInfos[0] << endl; - HILOGI("-------------CertMgrCoreDeviceTest_StrdupDevInfo_001 end -----------------"); -} - -/** - * - * @tc.name: CertMgrService_StrdupDevInfo_002 - * @tc.desc: StrdupDevInfo拷贝字符串功能 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreDeviceTest, CertMgrCoreDeviceTest_StrdupDevInfo_002, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreDeviceTest_StrdupDevInfo_002 begin -----------------"); - // step 1: 准备数据 - int32_t result = InitSysData(); - ASSERT_TRUE(result == CERT_OK) << "InitSysData failed." << endl; - ASSERT_TRUE(g_devSysInfos[0] != NULL) << "g_devSysInfos[0]:" << g_devSysInfos[0] << endl; - - // step 2: 验证功能 - for (int32_t type = 0; type < SYS_DEV_MAX; type ++) { - char* devInfoDup = StrdupDevInfo((SYS_DEV_TYPE_E)type); - char* devInfo = g_devSysInfos[(SYS_DEV_TYPE_E)type]; - EXPECT_STREQ(devInfoDup, devInfo) << "devInfoDup != devInfo" << endl; - CERT_MEM_FREE(devInfoDup); - } - - // step 3: 恢复环境 - DestroySysData(); - ASSERT_TRUE(g_devSysInfos[0] == NULL) << "g_devSysInfos[0]:" << g_devSysInfos[0] << endl; - HILOGI("-------------CertMgrCoreDeviceTest_StrdupDevInfo_002 end -----------------"); -} diff --git a/cert_mgr_service/test/unittest/src/CertMgrCoreMemTest.cpp b/cert_mgr_service/test/unittest/src/CertMgrCoreMemTest.cpp deleted file mode 100644 index 578108a..0000000 --- a/cert_mgr_service/test/unittest/src/CertMgrCoreMemTest.cpp +++ /dev/null @@ -1,110 +0,0 @@ -/* - * Copyright (C) 2022 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - - -#include "cert_type.h" -#include "cert_utils.h" -#include "cert_utils_list.h" -#include "cert_utils_log.h" -#include "cert_utils_memleak.h" -#include "cert_mgr_log.h" -#include - -using namespace testing; -using namespace testing::ext; -using namespace std; -using namespace OHOS; -using namespace OHOS::CertManager; - -class CertMgrCoreMemTest : public testing::Test { -public: - // 测试套预置动作,在第一个TestCase之前执行 - static void SetUpTestCase(void); - // 测试套清理动作,在最后一个TestCase后执行 - static void TearDownTestCase(void); - // 用例的预置动作 - void SetUp(); - // 用例的清理动作 - void TearDown(); -}; - -void CertMgrCoreMemTest::SetUpTestCase(void) -{ - // input testsuit setup step,setup invoked before all testcases -} - -void CertMgrCoreMemTest::TearDownTestCase(void) -{ - // input testsuit teardown step,teardown invoked after all testcases -} - -void CertMgrCoreMemTest::SetUp(void) -{ - // input testcase setup step,setup invoked before each testcases -} - -void CertMgrCoreMemTest::TearDown(void) -{ - // input testcase teardown step,teardown invoked after each testcases -} - -/** - * - * @tc.name: CertMgrCoreMemTest_001 - * @tc.desc: 验证打桩功能 - * @tc.type: FUNC - */ - -extern List *g_memNodeList; - -HWTEST_F(CertMgrCoreMemTest, CertMgrCoreMemTest_001, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreMemTest_001 begin -----------------"); - EXPECT_TRUE(CERT_DEBUG_MEMORY_LEAK == true) << "CERT_DEBUG_MEMORY_LEAK is false." << endl; - - ASSERT_TRUE(g_memNodeList == NULL) << "g_memNodeList is not null." << endl; - InitMemNodeList(); - ASSERT_TRUE(g_memNodeList != NULL) << "InitMemNodeList failed." << endl; - - uint32_t size = GetListSize(g_memNodeList); - EXPECT_TRUE(size == 0) << "GetListSize failed." << endl; - - char *test1 = (char *)CERT_MEM_MALLOC(10); - size = GetListSize(g_memNodeList); - EXPECT_TRUE(size == 1) << "malloc test1 failed." << endl; - EXPECT_TRUE(test1 != NULL) << "test1 == NULL." << endl; - - char *test2 = (char *)CERT_MEM_MALLOC(10); - size = GetListSize(g_memNodeList); - EXPECT_TRUE(size == 2) << "malloc test2 failed." << endl; - EXPECT_TRUE(test2 != NULL) << "test2 == NULL." << endl; - - PrintMemNodeList(); - - CERT_MEM_FREE(test1); - size = GetListSize(g_memNodeList); - EXPECT_TRUE(size == 1) << "free test1 failed." << endl; - EXPECT_TRUE(test1 == NULL) << "test1 != NULL." << endl; - - CERT_MEM_FREE(test2); - size = GetListSize(g_memNodeList); - EXPECT_TRUE(size == 0) << "free test2 failed." << endl; - EXPECT_TRUE(test2 == NULL) << "test2 != NULL." << endl; - - PrintMemNodeList(); - DestroyMemNodeList(); - EXPECT_TRUE(g_memNodeList == NULL) << "DestroyMemNodeList failed." << endl; - HILOGI("-------------CertMgrCoreMemTest_001 end -----------------"); -} \ No newline at end of file diff --git a/cert_mgr_service/test/unittest/src/CertMgrCoreServiceTest.cpp b/cert_mgr_service/test/unittest/src/CertMgrCoreServiceTest.cpp deleted file mode 100644 index 4382c38..0000000 --- a/cert_mgr_service/test/unittest/src/CertMgrCoreServiceTest.cpp +++ /dev/null @@ -1,1854 +0,0 @@ -/* - * Copyright (C) 2022 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#include -#include -#include "cJSON.h" -#include "cert_mock.h" -#include -#include -#include "pthread.h" -#include "cert_type.h" -#include "cert_utils.h" -#include "cert_utils_file.h" -#include "cert_utils_log.h" -#include "cert_security_token.h" -#include "cert_adapter.h" -#include "cert_service_auth.h" -#include "cert_service_reset.h" -#include "cert_service_active.h" -#include "cert_service_device.h" -#include "cert_service_challenge.h" -#include "cert_network.h" -#include "cert_service.h" -#include "cert_service_device.h" -#include "cert_mgr_log.h" -#include "cert_mgr_client.h" -#include "iservice_registry.h" -#include "system_ability_definition.h" -#include "system_ability.h" -#include "singleton.h" -#include "cert_utils_list.h" -#include "cert_mgr_errno.h" -#include "cert_result_info.h" -#include - -using namespace testing; -using namespace testing::ext; -using namespace std; -using namespace OHOS; -using namespace OHOS::CertManager; - -class CertMgrCoreServiceTest : public testing::Test -{ -public: - // 测试套预置动作,在第一个TestCase之前执行 - static void SetUpTestCase(void); - // 测试套清理动作,在最后一个TestCase后执行 - static void TearDownTestCase(void); - // 用例的预置动作 - void SetUp(); - // 用例的清理动作 - void TearDown(); - // 预置网络数据 当前预置数据对应OH00000D - static void CreateMockFile(); - static void DeleteMockFile(); -}; - -void CertMgrCoreServiceTest::SetUpTestCase(void) -{ - // input testsuit setup step,setup invoked before all testcases -} - -void CertMgrCoreServiceTest::TearDownTestCase(void) -{ - // input testsuit teardown step,teardown invoked after all testcases -} - -void CertMgrCoreServiceTest::SetUp(void) -{ - // input testcase setup step,setup invoked before each testcases - CreateMockFile(); -} - -void CertMgrCoreServiceTest::TearDown(void) -{ - // input testcase teardown step,teardown invoked after each testcases - DeleteMockFile(); -} - -void CertMgrCoreServiceTest::CreateMockFile(void) -{ - // input testcase teardown step,teardown invoked after each testcases - - // 创建文件 - int32_t ret = CreateFile(CERT_MOCK_DATA_PATH, CERT_MOCK_TOKEN_FILE_NAME); - ret = CreateFile(CERT_MOCK_DATA_PATH, CERT_MOCK_DEVICE_PARA_FILE_NAME); - ret = CreateFile(CERT_MOCK_DATA_PATH, CERT_MOCK_NETWORK_PARA_FILE_NAME); -} - -void CertMgrCoreServiceTest::DeleteMockFile(void) -{ - // input testcase teardown step,teardown invoked after each testcases - if (IsFileExist(CERT_MOCK_DATA_PATH, CERT_MOCK_TOKEN_FILE_NAME)) { - DeleteFile(CERT_MOCK_DATA_PATH, CERT_MOCK_TOKEN_FILE_NAME); - } - - if (IsFileExist(CERT_MOCK_DATA_PATH, CERT_MOCK_DEVICE_PARA_FILE_NAME)) { - DeleteFile(CERT_MOCK_DATA_PATH, CERT_MOCK_DEVICE_PARA_FILE_NAME); - } - - if (IsFileExist(CERT_MOCK_DATA_PATH, CERT_MOCK_NETWORK_PARA_FILE_NAME)) { - DeleteFile(CERT_MOCK_DATA_PATH, CERT_MOCK_NETWORK_PARA_FILE_NAME); - } - - if (IsFileExist(CERT_MOCK_DATA_PATH, CERT_MOCK_AUTH_STATUS_FILE_NAME)) { - DeleteFile(CERT_MOCK_DATA_PATH, CERT_MOCK_AUTH_STATUS_FILE_NAME); - } - if (IsFileExist(CERT_MOCK_DATA_PATH, CERT_MOCK_RESET_FLAG_FILE_NAME)) { - DeleteFile(CERT_MOCK_DATA_PATH, CERT_MOCK_RESET_FLAG_FILE_NAME); - } - if (IsFileExist(CERT_MOCK_DATA_PATH, CERT_MOCK_TICKET_FILE_NAME)) { - DeleteFile(CERT_MOCK_DATA_PATH, CERT_MOCK_TICKET_FILE_NAME); - } - -} - -/** - * - * @tc.name: CertMgrService_ProcCert_001 - * @tc.desc: 验证打桩功能 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_001, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_001 begin -----------------"); - // step 1: 准备数据 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - int32_t result = ProcCert(); - ASSERT_TRUE(result == CERT_OK) << "ProcCert failed." << endl; - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_001 end -----------------"); -} - -/** - * - * @tc.name: CertMgrService_ProcCert_002 - * @tc.desc: 验证预置数据后,是否正常触发认证 - * @tc.desc: 验证预置数据后,是否正常刷新token - * @tc.desc: 验证预置数据后,是否正常生成ticket,authStatus,flag - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_002, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_002 begin -----------------"); - // step 1: 准备数据 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - int32_t result = ProcCert(); - // 验证触发认证并且认证成功 - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 读取token - char token[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH, CERT_MOCK_TOKEN_FILE_NAME, token, sizeof(token)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否更新 - EXPECT_STRNE(CERT_MOCK_TOKEN, token) << "token updated failed." << endl; - - // 验证三个文件是否生成 - bool flag = IsFileExist(CERT_MOCK_DATA_PATH, CERT_MOCK_AUTH_STATUS_FILE_NAME); - flag = IsFileExist(CERT_MOCK_DATA_PATH, CERT_MOCK_TICKET_FILE_NAME); - flag = IsFileExist(CERT_MOCK_DATA_PATH, CERT_MOCK_RESET_FLAG_FILE_NAME); - - EXPECT_TRUE(flag) << "authStatus or ticket or reset_flag create failed." << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_002 end -----------------"); -} - -/** - * - * @tc.name: CertMgrService_ProcCert_003 - * @tc.desc: 验证认证成功后替换versionID不一致的auth_status,再次执行是否认证成功 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_003, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_003 begin -----------------"); - // step 1: 准备数据 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - int32_t result = ProcCert(); - // 认证完之后,更换version_id 不一致的auth_status - const char *auth_status = ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQxIn0."; - WriteFile(CERT_MOCK_DATA_PATH, CERT_MOCK_AUTH_STATUS_FILE_NAME, auth_status, strlen(auth_status)); - - // 再次执行认证 - result = ProcCert(); - - // 验证触发认证并且认证成功 - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 验证 auth_status 是否更新 - const int len = strlen(auth_status) + 1; - char afterAuth[len]; - (void)memset_s(afterAuth, len, 0, len); - ret = ReadFile(CERT_MOCK_DATA_PATH, CERT_MOCK_AUTH_STATUS_FILE_NAME, afterAuth, sizeof(afterAuth)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - // 验证auth_status是否更新 - EXPECT_STRNE(auth_status, afterAuth) << "auth_status updated failed." << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_003 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_004 - * @tc.desc: 验证认证成功后替换已超期的auth_status,再次执行是否认证成功 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_004, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_004 begin -----------------"); - // step 1: 准备数据 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - int32_t result = ProcCert(); - - // 认证完之后,更换已超期的auth_status - const char *auth_status = ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2MDc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ."; - if (!IsFileExist(CERT_MOCK_DATA_PATH, CERT_MOCK_AUTH_STATUS_FILE_NAME)) { - ret = CreateFile(CERT_MOCK_DATA_PATH,CERT_MOCK_AUTH_STATUS_FILE_NAME); - ASSERT_TRUE(ret == CERT_OK) << "CreateFile failed." << endl; - } - - ret = WriteFile(CERT_MOCK_DATA_PATH, CERT_MOCK_AUTH_STATUS_FILE_NAME, auth_status, strlen(auth_status)); - ASSERT_TRUE(ret == CERT_OK) << "WriteFile failed." << endl; - - // 再次执行认证 - result = ProcCert(); - - // 验证触发认证并且认证成功 - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 读取 auth_status - const int len = strlen(auth_status) + 1; - char afterAuth[len]; - (void)memset_s(afterAuth, len, 0, len); - ret = ReadFile(CERT_MOCK_DATA_PATH, CERT_MOCK_AUTH_STATUS_FILE_NAME, afterAuth, sizeof(afterAuth)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - // 验证auth_status是否更新 - EXPECT_STRNE(auth_status, afterAuth) << "auth_status updated failed." << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_004 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_005 - * @tc.desc: 上一次认证失败,下一次可认证成功 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_005, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_005 begin -----------------"); - // step 1: 准备数据 - - //1.写入AuthNetMockData中errcode为9999 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 9999, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证且结果为失败的 - int32_t result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert Success." << endl; - - // 认证完之后,创建已超期的auth_status - const char* auth_status = ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2MDc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ."; - if (!IsFileExist(CERT_MOCK_DATA_PATH, CERT_MOCK_AUTH_STATUS_FILE_NAME)) { - ret = CreateFile(CERT_MOCK_DATA_PATH,CERT_MOCK_AUTH_STATUS_FILE_NAME); - ASSERT_TRUE(ret == CERT_OK) << "CreateFile failed." << endl; - } - - ret = WriteFile(CERT_MOCK_DATA_PATH,CERT_MOCK_AUTH_STATUS_FILE_NAME,auth_status,strlen(auth_status)); - ASSERT_TRUE(ret == CERT_OK) << "WriteFile failed." << endl; - - // 并且重新预置errcode为0的network - CertNetworkMockData networkMockData = { - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}; - ret = WriteNetWorkMock(&networkMockData); - ASSERT_TRUE(ret == CERT_OK) << "WriteNetWorkMock failed." << endl; - // 再次执行认证 - result = ProcCert(); - - // 验证触发认证并且认证成功 - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_005 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_006 - * @tc.desc: 设置发起挑战值阶段为9999,检查是否认证失败不重试 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_006, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_006 begin -----------------"); - // step 1: 准备数据 - // 1.写入AuthNetMockData中errcode为9999 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 9999, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证且结果为失败的 - int32_t result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert Success." << endl; - - // 读取token - char token[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH,CERT_MOCK_TOKEN_FILE_NAME,token,sizeof(token)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 未更新 - EXPECT_STREQ(CERT_MOCK_TOKEN, token) << "token updated." << endl; - - // 检查是否不重试 期望是false - EXPECT_FALSE(IS_WISE_RETRY(-result)) << "AuthDevice RETRY" << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_006 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_007 - * @tc.desc: 设置发起挑战值阶段为4999,检查是否认证失败重试 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_007, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_007 begin -----------------"); - // step 1: 准备数据 - //1.写入AuthNetMockData中errcode为4999 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 4999, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证且结果为失败的 - int32_t result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert Success." << endl; - - // 读取token - char token[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH,CERT_MOCK_TOKEN_FILE_NAME,token,sizeof(token)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - // 验证token是否 未更新 - EXPECT_STREQ(CERT_MOCK_TOKEN, token) << "token updated." << endl; - - // 检查是否 不重试 期望是true - EXPECT_TRUE(IS_WISE_RETRY(-result)) << "AuthDevice NOT RETRY" << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_007 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_008 - * @tc.desc: 设置认证设备的errcode为4999,检查是否认证失败重试 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_008, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_008 begin -----------------"); - // step 1: 准备数据 - //1.写入AuthNetMockData中errcode为4999 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 4999}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证且结果为失败的 - int32_t result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert Success." << endl; - - // 读取token - char token[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH,CERT_MOCK_TOKEN_FILE_NAME,token,sizeof(token)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - // 验证token是否 未更新 - EXPECT_STREQ(CERT_MOCK_TOKEN, token) << "token updated." << endl; - - // 检查是否 不重试 期望是true - EXPECT_TRUE(IS_WISE_RETRY(-result)) << "AuthDevice NOT RETRY" << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_008 end -----------------"); -} -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_009 - * @tc.desc: 设置认证返回的响应中的errCode为14000,检查认证失败未重试 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_009, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_009 begin -----------------"); - // step 1: 准备数据 - //1.重新写入AuthNetMockData中ResponseErrCode为14000的network - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 14000}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证且结果为失败的 - int32_t result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert Success." << endl; - - // 读取token - char token[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH,CERT_MOCK_TOKEN_FILE_NAME,token,sizeof(token)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 未更新 - EXPECT_STREQ(CERT_MOCK_TOKEN, token) << "token updated." << endl; - - // 检查是否 不重试 期望是true - EXPECT_FALSE(IS_WISE_RETRY(-result)) << "AuthDevice not RETRY" << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_009 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_010 - * @tc.desc: 设置认证返回的响应中的errCode为14001,检查认证失败 重试 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_010, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_010 begin -----------------"); - // step 1: 准备数据 - //1.重新写入AuthNetMockData中ResponseErrCode为14001的network - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 14001}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证且结果为失败的 - int32_t result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert Success." << endl; - - // 读取token - char token[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH,CERT_MOCK_TOKEN_FILE_NAME,token,sizeof(token)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 未更新 - EXPECT_STREQ(CERT_MOCK_TOKEN, token) << "token updated." << endl; - - // 检查是否 重试 - EXPECT_TRUE(IS_WISE_RETRY(-result)) << "AuthDevice not RETRY" << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_010 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_011 - * @tc.desc: 设置认证返回的响应中的errCode为14002,检查认证失败未重试 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_011, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_011 begin -----------------"); - // step 1: 准备数据 - //1.重新写入AuthNetMockData中ResponseErrCode为14002的network - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 14002}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证且结果为失败的 - int32_t result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert Success." << endl; - - // 读取token - char token[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH,CERT_MOCK_TOKEN_FILE_NAME,token,sizeof(token)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 未更新 - EXPECT_STREQ(CERT_MOCK_TOKEN, token) << "token updated." << endl; - - // 检查是否 不重试 - EXPECT_FALSE(IS_WISE_RETRY(-result)) << "AuthDevice RETRY" << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_011 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_012 - * @tc.desc: 设置认证返回的响应中的errCode为14004,检查认证失败未重试 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_012, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_012 begin -----------------"); - // step 1: 准备数据 - //1.重新写入AuthNetMockData中ResponseErrCode为14004的network - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 14004}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证且结果为失败的 - int32_t result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert Success." << endl; - - // 读取token - char token[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH,CERT_MOCK_TOKEN_FILE_NAME,token,sizeof(token)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 未更新 - EXPECT_STREQ(CERT_MOCK_TOKEN, token) << "token updated." << endl; - - // 检查是否 不重试 - EXPECT_FALSE(IS_WISE_RETRY(-result)) << "AuthDevice RETRY" << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_012 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_013 - * @tc.desc: 设置认证返回的响应中的errCode为30002,检查认证失败未重试 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_013, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_013 begin -----------------"); - // step 1: 准备数据 - //1.重新写入AuthNetMockData中ResponseErrCode为30002的network - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 30002}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证且结果为失败的 - int32_t result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert Success." << endl; - - // 读取token - char token[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH,CERT_MOCK_TOKEN_FILE_NAME,token,sizeof(token)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 未更新 - EXPECT_STREQ(CERT_MOCK_TOKEN, token) << "token updated." << endl; - - // 检查是否 不重试 - EXPECT_FALSE(IS_WISE_RETRY(-result)) << "AuthDevice RETRY" << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_013 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_014 - * @tc.desc: 设置认证返回的响应中的errCode为30003,检查认证失败未重试 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_014, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_014 begin -----------------"); - // step 1: 准备数据 - //1.重新写入AuthNetMockData中ResponseErrCode为30003的network - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 30003}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证且结果为失败的 - int32_t result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert Success." << endl; - - // 读取token - char token[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH,CERT_MOCK_TOKEN_FILE_NAME,token,sizeof(token)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 未更新 - EXPECT_STREQ(CERT_MOCK_TOKEN, token) << "token updated." << endl; - - // 检查是否 不重试 - EXPECT_FALSE(IS_WISE_RETRY(-result)) << "AuthDevice RETRY" << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_014 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_015 - * @tc.desc: 设置认证返回的响应中的errCode为30004,检查认证失败未重试 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_015, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_015 begin -----------------"); - // step 1: 准备数据 - //1.重新写入AuthNetMockData中ResponseErrCode为30004的network - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 30004}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证且结果为失败的 - int32_t result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert Success." << endl; - - // 读取token - char token[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH,CERT_MOCK_TOKEN_FILE_NAME,token,sizeof(token)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 未更新 - EXPECT_STREQ(CERT_MOCK_TOKEN, token) << "token updated." << endl; - - // 检查是否 不重试 - EXPECT_FALSE(IS_WISE_RETRY(-result)) << "AuthDevice RETRY" << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_015 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_016 - * @tc.desc: 设置认证激活阶段 返回的响应中的errCode为4999,检查认证失败未重试 token更新 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_016, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_016 begin -----------------"); - // step 1: 准备数据 - //1.写入ActiveNetMockData中ResponseErrCode为4999 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 4999}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证且结果为失败的 - int32_t result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert Success." << endl; - - // 读取token - char token[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH,CERT_MOCK_TOKEN_FILE_NAME,token,sizeof(token)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 已更新 - EXPECT_STRNE(CERT_MOCK_TOKEN, token) << "token not updated." << endl; - - // 检查是否 重试 - EXPECT_TRUE(IS_WISE_RETRY(-result)) << "ActiveToken not RETRY" << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_016 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_017 - * @tc.desc: 设置认证激活阶段 返回的响应中的errCode为4999,检查token更新 ticket 和 auth_status 不更新 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_017, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_017 begin -----------------"); - // step 1: 准备数据 - - // 写入ActiveNetMockData中ResponseErrCode为4999 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 4999}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证且结果为失败的 - int32_t result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert Success." << endl; - - // 读取token - char token[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH,CERT_MOCK_TOKEN_FILE_NAME,token,sizeof(token)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 已更新 - EXPECT_STRNE(CERT_MOCK_TOKEN, token) << "token updated." << endl; - - // 验证 ticket和 auth_status 未更新 - EXPECT_FALSE(IsFileExist(CERT_MOCK_DATA_PATH, CERT_MOCK_AUTH_STATUS_FILE_NAME)) << "auth_status updated." << endl; - EXPECT_FALSE(IsFileExist(CERT_MOCK_DATA_PATH, CERT_MOCK_TICKET_FILE_NAME)) << "ticket updated." << endl; - - // 检查是否 重试 - EXPECT_TRUE(IS_WISE_RETRY(-result)) << "ActiveToken not RETRY" << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_017 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_018 - * @tc.desc: 设置认证激活阶段 返回的响应中的errCode为14001,检查认证失败 重试 TOKEN下发 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_018, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_018 begin -----------------"); - // step 1: 准备数据 - //1.写入ActiveNetMockData中ResponseErrCode为14001 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 14001}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - - // 开始认证且结果为失败的 - int32_t result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert Success." << endl; - - // 读取token - char token[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH,CERT_MOCK_TOKEN_FILE_NAME,token,sizeof(token)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 已更新 - EXPECT_STRNE(CERT_MOCK_TOKEN, token) << "token updated." << endl; - - // 检查是否 重试 - EXPECT_TRUE(IS_WISE_RETRY(-result)) << "ActiveToken not RETRY" << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_018 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_019 - * @tc.desc: 设置认证激活阶段 返回的响应中的errCode为14002,检查认证失败 不重试 TOKEN下发 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_019, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_019 begin -----------------"); - // step 1: 准备数据 - //1.写入ActiveNetMockData中ResponseErrCode为14002的network - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 14002}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证且结果为失败的 - int32_t result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert Success." << endl; - - // 读取token - char token[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH,CERT_MOCK_TOKEN_FILE_NAME,token,sizeof(token)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 已更新 - EXPECT_STRNE(CERT_MOCK_TOKEN, token) << "token updated." << endl; - - // 检查是否 不重试 - EXPECT_FALSE(IS_WISE_RETRY(-result)) << "ActiveToken RETRY" << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_019 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_020 - * @tc.desc: 设置认证激活阶段 返回的响应中的errCode为30015,检查认证失败 不重试 TOKEN下发 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_020, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_020 begin -----------------"); - // step 1: 准备数据 - //1.重新写入AuthNetMockData中ResponseErrCode为30015的network - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 30015}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证且结果为失败的 - int32_t result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert Success." << endl; - - // 读取token - char token[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH,CERT_MOCK_TOKEN_FILE_NAME,token,sizeof(token)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 已更新 - EXPECT_STRNE(CERT_MOCK_TOKEN, token) << "token updated." << endl; - - // 检查是否 不重试 - EXPECT_FALSE(IS_WISE_RETRY(-result)) << "ActiveToken RETRY" << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_020 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_021 - * @tc.desc: 设置重置阶段阶段 返回的响应中的errCode为4999,检查不走重置流程,TOKEN下发 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_021, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_021 begin -----------------"); - // step 1: 准备数据 - //1.写入ResetNetMockData中ResponseErrCode为4999的network - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 4999}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 预置reset_flag - ret = CreateFile(CERT_MOCK_DATA_PATH, CERT_MOCK_RESET_FLAG_FILE_NAME); - ASSERT_TRUE(ret == CERT_OK) << "CreateFile failed." << endl; - - // 开始认证 - int32_t result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert Success." << endl; - - // 读取token - char token[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH,CERT_MOCK_TOKEN_FILE_NAME,token,sizeof(token)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 已更新 - EXPECT_STRNE(CERT_MOCK_TOKEN, token) << "token not updated." << endl; - - // 检查是否 不走重置 - EXPECT_TRUE(CertIsResetFlagExist()) << "Reset Flag not Exist" << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_021 end -----------------"); -} - - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_022 - * @tc.desc: 设置重置阶段阶段 ResponseErrCode为4999,删除reset_flag,保留auth_status,检查不生成reset_flag,更新Auth_status,TOKEN - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_022, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_022 begin -----------------"); - // step 1: 准备数据 - //1.先走正常流程 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证 - int32_t result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 删除reset_flag - bool flag = DeleteFile(CERT_MOCK_DATA_PATH, CERT_MOCK_RESET_FLAG_FILE_NAME); - ASSERT_TRUE(flag) << "DeleteFile failed." << endl; - - // 读取token - char beforeToken[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH, CERT_MOCK_TOKEN_FILE_NAME, beforeToken, sizeof(beforeToken)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 预置network 重置流程返回值为4999 - CertNetworkMockData networkMockData = { - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 4999}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}; - ret = WriteNetWorkMock(&networkMockData); - ASSERT_TRUE(ret == CERT_OK) << "WriteNetWorkMock failed." << endl; - - // 认证完之后,更换已超期的auth_status, - const char *auth_status = ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2MDc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ."; - if (!IsFileExist(CERT_MOCK_DATA_PATH, CERT_MOCK_AUTH_STATUS_FILE_NAME)) { - ret = CreateFile(CERT_MOCK_DATA_PATH,CERT_MOCK_AUTH_STATUS_FILE_NAME); - ASSERT_TRUE(ret == CERT_OK) << "CreateFile failed." << endl; - } - ret = WriteFile(CERT_MOCK_DATA_PATH, CERT_MOCK_AUTH_STATUS_FILE_NAME, auth_status, strlen(auth_status)); - ASSERT_TRUE(ret == CERT_OK) << "WriteFile failed." << endl; - - // 再次认证 - result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 读取token - char afterToken[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH, CERT_MOCK_TOKEN_FILE_NAME, afterToken, sizeof(afterToken)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 已更新 - EXPECT_STRNE(beforeToken, afterToken) << "token not updated." << endl; - - // 检查是否生成reset_flag标签 - EXPECT_FALSE(CertIsResetFlagExist()) << "Reset Flag Exist" << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_022 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_023 - * @tc.desc: 设置重置阶段阶段 ResponseErrCode为4999,检查不生成reset_flag,更新TOKEN - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_023, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_023 begin -----------------"); - // step 1: 准备数据 - //1.先走正常流程 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 4999}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证 - int32_t result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 读取token - char afterToken[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH, CERT_MOCK_TOKEN_FILE_NAME, afterToken, sizeof(afterToken)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 已更新 - EXPECT_STRNE(CERT_MOCK_TOKEN, afterToken) << "token not updated." << endl; - - // 检查是否生成reset_flag标签 - EXPECT_FALSE(CertIsResetFlagExist()) << "Reset Flag Exist" << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_023 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_024 - * @tc.desc: 设置重置阶段阶段 ResponseErrCode为14000,验证 重置失败后不重试,token成功下发 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_024, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_024 begin -----------------"); - // step 1: 准备数据 - //1.先走正常流程 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 14000}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证 - int32_t result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 读取token - char afterToken[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH, CERT_MOCK_TOKEN_FILE_NAME, afterToken, sizeof(afterToken)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 已更新 - EXPECT_STRNE(CERT_MOCK_TOKEN, afterToken) << "token not updated." << endl; - - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_024 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_025 - * @tc.desc: 设置重置阶段阶段 ResponseErrCode为14001,验证 重置失败后重试,token成功下发 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_025, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_025 begin -----------------"); - // step 1: 准备数据 - //1.先走正常流程 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 14001}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证 - int32_t result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 读取token - char afterToken[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH, CERT_MOCK_TOKEN_FILE_NAME, afterToken, sizeof(afterToken)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 已更新 - EXPECT_STRNE(CERT_MOCK_TOKEN, afterToken) << "token not updated." << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_025 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_026 - * @tc.desc: 设置重置阶段阶段 ResponseErrCode为14002,验证 重置失败后不重试,token成功下发 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_026, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_026 begin -----------------"); - // step 1: 准备数据 - //1.先走正常流程 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 14002}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证 - int32_t result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 读取token - char afterToken[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH, CERT_MOCK_TOKEN_FILE_NAME, afterToken, sizeof(afterToken)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 已更新 - EXPECT_STRNE(CERT_MOCK_TOKEN, afterToken) << "token not updated." << endl; - - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_026 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_027 - * @tc.desc: 设置重置阶段阶段 ResponseErrCode为14004,验证 重置失败后不重试,token成功下发 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_027, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_027 begin -----------------"); - // step 1: 准备数据 - //1.先走正常流程 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 14004}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证 - int32_t result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 读取token - char afterToken[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH, CERT_MOCK_TOKEN_FILE_NAME, afterToken, sizeof(afterToken)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 已更新 - EXPECT_STRNE(CERT_MOCK_TOKEN, afterToken) << "token not updated." << endl; - - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_027 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_028 - * @tc.desc: 设置重置阶段阶段 ResponseErrCode为15003,验证 重置失败后不重试,token成功下发 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_028, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_028 begin -----------------"); - // step 1: 准备数据 - //1.先走正常流程 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 15003}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证 - int32_t result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 读取token - char afterToken[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH, CERT_MOCK_TOKEN_FILE_NAME, afterToken, sizeof(afterToken)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 已更新 - EXPECT_STRNE(CERT_MOCK_TOKEN, afterToken) << "token not updated." << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_028 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_029 - * @tc.desc: 验证一次主流程不超30S - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_029, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_029 begin -----------------"); - // step 1: 准备数据 - //1.先走正常流程 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 获取认证前时间戳 - time_t beforeTimet; - time(&beforeTimet); - - // 开始认证 - ret = ProcCert(); - EXPECT_EQ(ret,CERT_OK) << "ProcCert failed" << endl; - - // 获取认证后时间戳 - time_t afterTimet; - time(&afterTimet); - - EXPECT_TRUE(difftime(afterTimet,beforeTimet) <= 30) << "out of 30 Seconds" << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_029 end -----------------"); -} - - - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_030 - * @tc.desc: 异常报文攻击,设置authDevice返回authStatus为abc,验证认证失败 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_030, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_030 begin -----------------"); - // step 1: 准备数据 - //1.先走正常流程 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", "abc", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证 - int32_t result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert Success." << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_030 end -----------------"); -} - - - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_031 - * @tc.desc: 本地autResult预置14004的状态下再次触发认证 token是否正常下发 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_031, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_031 begin -----------------"); - // step 1: 准备数据 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", - ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 预置auth_status 本地AuthResult为14004 - const char *auth_status = ".eyJhdXRoUmVzdWx0IjoxNDAwNCwiYXV0aFR5cGUiOiJUT0tFTl9FTkFCTEUiLCJleHBpcmVUaW1lIjoxNjc3OTMwMTM0MzgzLCJraXRQb2xpY3kiOltdLCJzb2Z0d2FyZVJlc3VsdCI6MCwidWRpZCI6IjFBQUE4ODk2OTBFRjMzRThEMTg2NkYzMEU4MEExM0ExOTEzNEE3NTE4QkYwQzc4MzRBOTNDN0E1QkY0RDUxRjkiLCJ2ZXJzaW9uSWQiOiJkZWZhdWx0L2h1YS13ZWkvSHVhV2VpVGVzdC9kZWZhdWx0L09wZW5IYXJtb255LTIuMi4wLjAoKS9vaG9zVGVzdC9kZWZhdWx0LzgvZGVmYXVsdC9kZWZhdWx0In0."; - if (!IsFileExist(CERT_MOCK_DATA_PATH, CERT_MOCK_AUTH_STATUS_FILE_NAME)) { - ret = CreateFile(CERT_MOCK_DATA_PATH,CERT_MOCK_AUTH_STATUS_FILE_NAME); - ASSERT_TRUE(ret == CERT_OK) << "CreateFile failed." << endl; - } - ret = WriteFile(CERT_MOCK_DATA_PATH, CERT_MOCK_AUTH_STATUS_FILE_NAME, auth_status, strlen(auth_status)); - ASSERT_TRUE(ret == CERT_OK) << "WriteFile failed." << endl; - - // 开始认证 - int32_t result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 读取token - char afterToken[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH, CERT_MOCK_TOKEN_FILE_NAME, afterToken, sizeof(afterToken)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 已更新 - EXPECT_STRNE(CERT_MOCK_TOKEN, afterToken) << "token not updated." << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_031 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_032 - * @tc.desc: 检查第一次token写失败时,第二次认证是否成功 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_032, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_032 begin -----------------"); - // step 1: 准备数据 设备认证返回14001 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", - ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 14001}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证 - int32_t result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert Success." << endl; - - // 读取token - char afterToken[TOKEN_ENCRYPT_LEN + 1] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH, CERT_MOCK_TOKEN_FILE_NAME, afterToken, sizeof(afterToken)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 未更新 - EXPECT_STREQ(CERT_MOCK_TOKEN, afterToken) << "token updated." << endl; - - // 第二次预置数据,currentTime改为1651234567890 - CertNetworkMockData networkMockData = { - {1651234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1651234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1651234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", - ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1651234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}; - ret = WriteNetWorkMock(&networkMockData); - ASSERT_TRUE(ret == CERT_OK) << "WriteNetWorkMock failed." << endl; - - - // 开始认证 - result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 第二次读取Token - ret = ReadFile(CERT_MOCK_DATA_PATH, CERT_MOCK_TOKEN_FILE_NAME, afterToken, sizeof(afterToken)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证token是否 更新 - EXPECT_STRNE(CERT_MOCK_TOKEN, afterToken) << "token not updated." << endl; - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_032 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_033 - * @tc.desc: 检查第一次ticket,authStatus写失败时,第二次认证是否成功 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_033, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_033 begin -----------------"); - // step 1: 准备数据 设备认证返回14001 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", - ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 14001}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证 - int32_t result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert Success." << endl; - - // 验证ticket 与 auth_status 未更新 认证前不存在这俩文件 - EXPECT_FALSE(IsFileExist(CERT_MOCK_DATA_PATH,CERT_MOCK_TICKET_FILE_NAME)) << "ticket EXIST." << endl; - EXPECT_FALSE(IsFileExist(CERT_MOCK_DATA_PATH,CERT_MOCK_AUTH_STATUS_FILE_NAME)) << "auth_status EXIST." << endl; - - //第二次预置数据 - CertNetworkMockData networkMockData = { - {1651234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1651234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1651234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", - ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1651234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}; - ret = WriteNetWorkMock(&networkMockData); - ASSERT_TRUE(ret == CERT_OK) << "WriteNetWorkMock failed." << endl; - - // 开始认证 - result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 第二次读取Token - // 验证ticket 与 auth_status 更新 认证后存在这俩文件 - EXPECT_TRUE(IsFileExist(CERT_MOCK_DATA_PATH,CERT_MOCK_TICKET_FILE_NAME)) << "ticket not EXIST." << endl; - EXPECT_TRUE(IsFileExist(CERT_MOCK_DATA_PATH,CERT_MOCK_AUTH_STATUS_FILE_NAME)) << "auth_status NOT EXIST." << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_033 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_034 - * @tc.desc: 检查第一次reset_flag写失败时,第二次认证是否成功 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_034, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_034 begin -----------------"); - // step 1: 准备数据 设备重置返回14001 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 14001}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", - ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证 - int32_t result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 验证reset_flag未更新 认证前不存在 - EXPECT_FALSE(IsFileExist(CERT_MOCK_DATA_PATH,CERT_MOCK_RESET_FLAG_FILE_NAME)) << "reset_flag EXIST." << endl; - - // 第二次预置数据 - CertNetworkMockData networkMockData = { - {1681234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1681234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1681234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", - ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2OTc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1681234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}; - ret = WriteNetWorkMock(&networkMockData); - ASSERT_TRUE(ret == CERT_OK) << "WriteNetWorkMock failed." << endl; - // 开始认证 - result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 第二次读取Token - // 验证reset_flag更新 认证后存在 - EXPECT_TRUE(IsFileExist(CERT_MOCK_DATA_PATH,CERT_MOCK_RESET_FLAG_FILE_NAME)) << "reset_flag not Exist." << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_034 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_035 - * @tc.desc: 认证结果超期,自动触发认证时 网络异常 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_035, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_035 begin -----------------"); - // step 1: 准备数据 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", - ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证 - int32_t result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 读取当前本地认证结果 - char beforeAuthStatus[AUTH_SATUS_LEN] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH, CERT_MOCK_AUTH_STATUS_FILE_NAME, beforeAuthStatus, sizeof(beforeAuthStatus)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 第二次预置数据 - CertNetworkMockData networkMockData = { - {1681234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1681234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1681234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", - ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2OTc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 14001}, - {1681234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}; - ret = WriteNetWorkMock(&networkMockData); - ASSERT_TRUE(ret == CERT_OK) << "WriteNetWorkMock failed." << endl; - - // 开始认证 - result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert failed." << endl; - - // 第二次读取AuthStatus - char afterAuthStatus[AUTH_SATUS_LEN] = {0}; - ret = ReadFile(CERT_MOCK_DATA_PATH, CERT_MOCK_AUTH_STATUS_FILE_NAME, afterAuthStatus, sizeof(afterAuthStatus)); - ASSERT_TRUE(ret == CERT_OK) << "ReadFile failed." << endl; - - // 验证认证结果未更新 - EXPECT_STREQ(beforeAuthStatus,afterAuthStatus) << "Auth Status updated." << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_035 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_036 - * @tc.desc: 模拟恢复出场设置,验证是否重新生成 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_036, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_036 begin -----------------"); - // step 1: 准备数据 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", - ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证 - int32_t result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 验证三个文件是否生成 - bool flag = IsFileExist(CERT_MOCK_DATA_PATH, CERT_MOCK_AUTH_STATUS_FILE_NAME); - flag = IsFileExist(CERT_MOCK_DATA_PATH, CERT_MOCK_TICKET_FILE_NAME); - flag = IsFileExist(CERT_MOCK_DATA_PATH, CERT_MOCK_RESET_FLAG_FILE_NAME); - - EXPECT_TRUE(flag)<< "authStatus or ticket or reset_flag not Exist." << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_036 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_037 - * @tc.desc: 设备进行重置,解绑成功,重新认证成功 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_037, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_037 begin -----------------"); - // step 1: 准备数据 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", - ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证 - int32_t result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 删除reset_flag - bool flag = DeleteFile(CERT_MOCK_DATA_PATH, CERT_MOCK_RESET_FLAG_FILE_NAME); - ASSERT_TRUE(flag) << "DeleteFile failed." << endl; - - // 重新预置networkMockData - CertNetworkMockData networkMockData = { - {1681234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1681234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1681234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", - ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2OTc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1681234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}; - ret = WriteNetWorkMock(&networkMockData); - ASSERT_TRUE(ret == CERT_OK) << "WriteNetWorkMock failed." << endl; - - // 再次认证 - result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 验证reset_flag是否生成 - flag = IsFileExist(CERT_MOCK_DATA_PATH, CERT_MOCK_RESET_FLAG_FILE_NAME); - EXPECT_TRUE(flag)<< "authStatus or ticket or reset_flag not EXIST." << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_037 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_038 - * @tc.desc: 认证成功,查询认证结果接口是否认证成功 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_038, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_038 begin -----------------"); - // step 1: 准备数据 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", - ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证 - int32_t result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 查询认证结果 - CertResultInfo certResultInfo; - certResultInfo.authResult_ = 3; - certResultInfo.softwareResult_ = 3; - certResultInfo.ticket_ = "test"; - - int res = DelayedSingleton::GetInstance()->GetCertStatus(certResultInfo); - EXPECT_EQ(res, CERTMANAGER_SUCCESS) << "GetCertStatus failed." << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_038 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_039 - * @tc.desc: 认证成功,清除认证结果,查询认证结果接口 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_039, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_039 begin -----------------"); - // step 1: 准备数据 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", - ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证 - int32_t result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 删除认证结果 - if (IsFileExist(CERT_MOCK_DATA_PATH, CERT_MOCK_AUTH_STATUS_FILE_NAME)) { - result = DeleteFile(CERT_MOCK_DATA_PATH, CERT_MOCK_AUTH_STATUS_FILE_NAME); - ASSERT_TRUE(ret == CERT_OK) << "DeleteFile failed." << endl; - } - - // 查询认证结果 - CertResultInfo certResultInfo; - certResultInfo.authResult_ = 3; - certResultInfo.softwareResult_ = 3; - certResultInfo.ticket_ = "test"; - - int res = DelayedSingleton::GetInstance()->GetCertStatus(certResultInfo); - EXPECT_EQ(res, CERTMANAGER_FAIL) << "GetCertStatus Success." << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_039 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_040 - * @tc.desc: 认证失败,查询认证结果接口 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_040, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_040 begin -----------------"); - // step 1: 准备数据 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", - ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 4999}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证 - int32_t result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert failed." << endl; - - // 查询认证结果 - CertResultInfo certResultInfo; - certResultInfo.authResult_ = 3; - certResultInfo.softwareResult_ = 3; - certResultInfo.ticket_ = "test"; - - int res = DelayedSingleton::GetInstance()->GetCertStatus(certResultInfo); - EXPECT_EQ(res, CERTMANAGER_FAIL) << "GetCertStatus Success." << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_040 end -----------------"); -} - -/** - * - * @tc.name: CertMgrCoreServiceTest_ProcCert_040 - * @tc.desc: 第一次认证成功,第二次认证失败,查询认证结果接口 - * @tc.type: FUNC - */ -HWTEST_F(CertMgrCoreServiceTest, CertMgrCoreServiceTest_ProcCert_041, TestSize.Level0) -{ - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_041 begin -----------------"); - // step 1: 准备数据 - CertMockData certMockData = { - {"default/hua-wei/HuaWeiTest/default/OpenHarmony-2.2.0.0()/ohosTest/default/8/default/default", "test", "OpenHarmony 3.1.5.3", "hua-wei", "ohosTest", "HuaWeiTest", "2022-04-09", "7001005458323933328a00fce1983800"}, - {{1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", - ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2Nzc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 0}, - {1641234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}}; - int32_t ret = InitMockData(&certMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 开始认证 - int32_t result = ProcCert(); - EXPECT_EQ(result, CERT_OK) << "ProcCert failed." << endl; - - // 重新预置networkMockData - CertNetworkMockData networkMockData = { - {1681234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0}, - {1681234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}, - {1681234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, "ujlrjJ6loo16/32VSKj9hZ+vDpiPgt+L", "95335c19-b688-40ea-b9c8-08edf3f3c8f0", - ".eyJhdXRoUmVzdWx0IjowLCJhdXRoVHlwZSI6IlRPS0VOX0VOQUJMRSIsImV4cGlyZVRpbWUiOjE2OTc5MzAxMzQzODMsImtpdFBvbGljeSI6W10sInNvZnR3YXJlUmVzdWx0IjowLCJ1ZGlkIjoiMUFBQTg4OTY5MEVGMzNFOEQxODY2RjMwRTgwQTEzQTE5MTM0QTc1MThCRjBDNzgzNEE5M0M3QTVCRjRENTFGOSIsInZlcnNpb25JZCI6ImRlZmF1bHQvaHVhLXdlaS9IdWFXZWlUZXN0L2RlZmF1bHQvT3Blbkhhcm1vbnktMi4yLjAuMCgpL29ob3NUZXN0L2RlZmF1bHQvOC9kZWZhdWx0L2RlZmF1bHQifQ.", - "RKp35yO9fOHBcytcO1pywKYO3rmm5z2i", 4999}, - {1681234567890, "b39b752290266b95acedde9b2f89fa5ebea6e060d509b0b20d07c922bcea7b64", 0, 0}}; - ret = WriteNetWorkMock(&networkMockData); - ASSERT_TRUE(ret == CERT_OK) << "InitMockData failed." << endl; - - // 再次认证 - result = ProcCert(); - EXPECT_NE(result, CERT_OK) << "ProcCert Success." << endl; - - // 查询认证结果 - CertResultInfo certResultInfo; - certResultInfo.authResult_ = 3; - certResultInfo.softwareResult_ = 3; - certResultInfo.ticket_ = "test"; - - int res = DelayedSingleton::GetInstance()->GetCertStatus(certResultInfo); - EXPECT_EQ(res, CERTMANAGER_SUCCESS) << "GetCertStatus failed." << endl; - - HILOGI("-------------CertMgrCoreServiceTest_ProcCert_041 end -----------------"); -} \ No newline at end of file diff --git a/cert_mgr_service/test/unittest/src/CertMgrSdkTest.cpp b/cert_mgr_service/test/unittest/src/CertMgrSdkTest.cpp deleted file mode 100644 index 391b460..0000000 --- a/cert_mgr_service/test/unittest/src/CertMgrSdkTest.cpp +++ /dev/null @@ -1,72 +0,0 @@ -/* - * Copyright (C) 2022 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#include "cert_mgr_client.h" -#include "cJSON.h" -#include - -using namespace testing::ext; -using namespace OHOS; -using namespace OHOS::CertManager; - -class CertMgrSdkTest : public testing::Test { -public: - // 测试套预置动作,在第一个TestCase之前执行 - static void SetUpTestCase(void); - // 测试套清理动作,在最后一个TestCase后执行 - static void TearDownTestCase(void); - // 用例的预置动作 - void SetUp(); - // 用例的清理动作 - void TearDown(); -}; - -void CertMgrSdkTest::SetUpTestCase(void) -{ - // input testsuit setup step,setup invoked before all testcases -} - -void CertMgrSdkTest::TearDownTestCase(void) -{ - // input testsuit teardown step,teardown invoked after all testcases -} - -void CertMgrSdkTest::SetUp(void) -{ - // input testcase setup step,setup invoked before each testcases -} - -void CertMgrSdkTest::TearDown(void) -{ - // input testcase teardown step,teardown invoked after each testcases -} - -/** - * @tc.name: GetCertStatus_Test_001 - * @tc.desc: Verify the sub function. - * @tc.type: FUNC - * @tc.require: Issue Number - */ -HWTEST_F(CertMgrSdkTest, GetCertStatus_Test_001, TestSize.Level0) -{ - // step 1:调用函数获取结果 - // printf("-------------GetCertStatus_Test_001 begin -----------------"); - // CertMgrClient* certManager = nullptr; - // certManager = DelayedSingleton::GetInstance(); - // int res = certManager->GetCertStatus(); - - // Step 2:使用断言比较预期与实际结果 - // EXPECT_EQ(0, res); -} \ No newline at end of file -- Gitee