javacommons/security/tsrc/javasrc/com/nokia/mj/impl/security/midp/authorization/InteractiveAccessControllerTests.java
changeset 78 71ad690e91f5
parent 64 0ea12c182930
equal deleted inserted replaced
72:1f0034e370aa 78:71ad690e91f5
   107     // Begin j2meunit test framework setup
   107     // Begin j2meunit test framework setup
   108     public void installerMain(String[] args)
   108     public void installerMain(String[] args)
   109     {
   109     {
   110         TestSuite suite = new TestSuite(this.getClass().getName());
   110         TestSuite suite = new TestSuite(this.getClass().getName());
   111 
   111 
   112         suite.addTest(new InteractiveAccessControllerTests("testAVKONSecurityPrompts", new TestMethod()
   112         suite.addTest(new InteractiveAccessControllerTests("testSecurityPrompts", new TestMethod()
   113         {
   113         {
   114             public void run(TestCase tc)
   114             public void run(TestCase tc)
   115             {
   115             {
   116                 ((InteractiveAccessControllerTests)tc).testAVKONSecurityPrompts();
   116                 ((InteractiveAccessControllerTests)tc).testSecurityPrompts();
   117             }
   117             }
   118         }));
   118         }));
   119 
   119 
   120         com.nokia.mj.impl.utils.OmjTestRunner.run(suite);
   120         com.nokia.mj.impl.utils.OmjTestRunner.run(suite);
   121     }
   121     }
   144 
   144 
   145     protected void tearDown()
   145     protected void tearDown()
   146     {
   146     {
   147     }
   147     }
   148 
   148 
   149     private void testAVKONSecurityPrompts()
   149     private void testSecurityPrompts()
   150     {
   150     {
   151         System.setProperty("com.nokia.mj.impl.rt.ui", "com.nokia.mj.impl.rt.ui.avkon.RuntimeUiAvkon");
   151         System.setProperty("com.nokia.mj.impl.rt.ui", "com.nokia.mj.impl.rt.ui.avkon.RuntimeUiAvkon");
   152         testSecurityPrompts();
   152         try
       
   153         {
       
   154             Class.forName("com.nokia.mj.impl.rt.ui.qt.RuntimeUiQt");
       
   155             System.setProperty("com.nokia.mj.impl.rt.ui", "com.nokia.mj.impl.rt.ui.qt.RuntimeUiQt");
       
   156         }catch(Throwable t)
       
   157         {
       
   158         }
       
   159         runTests();
   153     }
   160     }
   154 
   161 
   155     private void testSecurityPrompts()
   162     private void runTests()
   156     {
   163     {
   157         // init the new mapping & policies
   164         // init the new mapping & policies
   158         //initMappingTable();
   165         //initMappingTable();
   159         IMPL_PERMISSION_MAPPING_TABLE = PermissionMappingTable.setMappingTable(TestPermissionMappingTable.getMappingTable());
   166         IMPL_PERMISSION_MAPPING_TABLE = PermissionMappingTable.setMappingTable(TestPermissionMappingTable.getMappingTable());
   160         SecurityPolicyModule.policiesDir = TEST_DATA_DIR;
   167         SecurityPolicyModule.policiesDir = TEST_DATA_DIR;
   180                                StorageNames.SECURITY_WARNINGS,
   187                                StorageNames.SECURITY_WARNINGS,
   181                                "" + GeneralSecuritySettings.DEFAULT_SECURITY_MODE));
   188                                "" + GeneralSecuritySettings.DEFAULT_SECURITY_MODE));
   182         session.write(StorageNames.MIDP_PACKAGE_TABLE, entry);
   189         session.write(StorageNames.MIDP_PACKAGE_TABLE, entry);
   183         // prompts for composite actions
   190         // prompts for composite actions
   184         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE);
   191         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE);
   185         PermissionResolver.testClearCache();
   192         PermissionResolver.cleanup();
   186         grantedPermissions = new Vector();
   193         grantedPermissions = new Vector();
   187         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   194         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   188                                           "com.nokia.mj.impl.security.midp.authorization.PermissionWithCompositeActionsImpl",
   195                                           "com.nokia.mj.impl.security.midp.authorization.PermissionWithCompositeActionsImpl",
   189                                           "uri://",
   196                                           "uri://",
   190                                           "action1",
   197                                           "action1",
   228             assertTrue(true);
   235             assertTrue(true);
   229         }
   236         }
   230         assertTrue(true);
   237         assertTrue(true);
   231         // for NORMAL security mode, in case of identical prompts, only show one (even though they are part of different function groups)
   238         // for NORMAL security mode, in case of identical prompts, only show one (even though they are part of different function groups)
   232         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE);
   239         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE);
   233         PermissionResolver.testClearCache();
   240         PermissionResolver.cleanup();
   234         grantedPermissions = new Vector();
   241         grantedPermissions = new Vector();
   235         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   242         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   236                                           "com.nokia.mj.impl.security.midp.authorization.CommProtocolPermissionImpl",
   243                                           "com.nokia.mj.impl.security.midp.authorization.CommProtocolPermissionImpl",
   237                                           "comm://",
   244                                           "comm://",
   238                                           null,
   245                                           null,
   260         ac.checkPermission(new CommProtocolPermissionImpl("comm://", "\n(choose ALLOW and make sure this text is shown only once)"));
   267         ac.checkPermission(new CommProtocolPermissionImpl("comm://", "\n(choose ALLOW and make sure this text is shown only once)"));
   261         // for USER security mode, in case of identical prompts, show them both
   268         // for USER security mode, in case of identical prompts, show them both
   262         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE);
   269         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE);
   263         AccessControllerFactoryImpl.destroyAccessController(appUID);
   270         AccessControllerFactoryImpl.destroyAccessController(appUID);
   264         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   271         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   265         PermissionResolver.testClearCache();
   272         PermissionResolver.cleanup();
   266         grantedPermissions = new Vector();
   273         grantedPermissions = new Vector();
   267         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   274         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   268                                           "com.nokia.mj.impl.security.midp.authorization.CommProtocolPermissionImpl",
   275                                           "com.nokia.mj.impl.security.midp.authorization.CommProtocolPermissionImpl",
   269                                           "comm://",
   276                                           "comm://",
   270                                           null,
   277                                           null,
   292         ac.checkPermission(new CommProtocolPermissionImpl("comm://", "\n(choose ALLOW and make sure this text is shown twice)"));
   299         ac.checkPermission(new CommProtocolPermissionImpl("comm://", "\n(choose ALLOW and make sure this text is shown twice)"));
   293         // check user permission with oneshot interaction mode -> multiple prompts and deny is oneshot deny
   300         // check user permission with oneshot interaction mode -> multiple prompts and deny is oneshot deny
   294         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE);
   301         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE);
   295         AccessControllerFactoryImpl.destroyAccessController(appUID);
   302         AccessControllerFactoryImpl.destroyAccessController(appUID);
   296         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   303         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   297         PermissionResolver.testClearCache();
   304         PermissionResolver.cleanup();
   298         grantedPermissions = new Vector();
   305         grantedPermissions = new Vector();
   299         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   306         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   300                                           "com.nokia.mj.impl.security.midp.authorization.CommProtocolPermissionImpl",
   307                                           "com.nokia.mj.impl.security.midp.authorization.CommProtocolPermissionImpl",
   301                                           "comm://",
   308                                           "comm://",
   302                                           null,
   309                                           null,
   333         AccessControllerFactoryImpl.destroyAccessController(appUID);
   340         AccessControllerFactoryImpl.destroyAccessController(appUID);
   334         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   341         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   335         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE);
   342         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE);
   336         AccessControllerFactoryImpl.destroyAccessController(appUID);
   343         AccessControllerFactoryImpl.destroyAccessController(appUID);
   337         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   344         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   338         PermissionResolver.testClearCache();
   345         PermissionResolver.cleanup();
   339         grantedPermissions = new Vector();
   346         grantedPermissions = new Vector();
   340         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   347         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   341                                           "com.nokia.mj.impl.security.midp.authorization.HttpProtocolPermissionImpl",
   348                                           "com.nokia.mj.impl.security.midp.authorization.HttpProtocolPermissionImpl",
   342                                           "http://",
   349                                           "http://",
   343                                           null,
   350                                           null,
   359         AccessControllerFactoryImpl.destroyAccessController(appUID);
   366         AccessControllerFactoryImpl.destroyAccessController(appUID);
   360         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   367         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   361         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE);
   368         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE);
   362         AccessControllerFactoryImpl.destroyAccessController(appUID);
   369         AccessControllerFactoryImpl.destroyAccessController(appUID);
   363         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   370         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   364         PermissionResolver.testClearCache();
   371         PermissionResolver.cleanup();
   365         grantedPermissions = new Vector();
   372         grantedPermissions = new Vector();
   366         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   373         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   367                                           "com.nokia.mj.impl.security.midp.authorization.HttpProtocolPermissionImpl",
   374                                           "com.nokia.mj.impl.security.midp.authorization.HttpProtocolPermissionImpl",
   368                                           "http://",
   375                                           "http://",
   369                                           null,
   376                                           null,
   401         assertTrue(true);
   408         assertTrue(true);
   402         // check user permission with session interaction mode, user says no -> second prompt is not shown in normal security mode
   409         // check user permission with session interaction mode, user says no -> second prompt is not shown in normal security mode
   403         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE);
   410         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE);
   404         AccessControllerFactoryImpl.destroyAccessController(appUID);
   411         AccessControllerFactoryImpl.destroyAccessController(appUID);
   405         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   412         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   406         PermissionResolver.testClearCache();
   413         PermissionResolver.cleanup();
   407         grantedPermissions = new Vector();
   414         grantedPermissions = new Vector();
   408         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   415         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   409                                           "com.nokia.mj.impl.security.midp.authorization.HttpProtocolPermissionImpl",
   416                                           "com.nokia.mj.impl.security.midp.authorization.HttpProtocolPermissionImpl",
   410                                           "http://",
   417                                           "http://",
   411                                           null,
   418                                           null,
   441 
   448 
   442         // check user permission with session interaction mode, user says no -> second prompt is not shown in user security mode
   449         // check user permission with session interaction mode, user says no -> second prompt is not shown in user security mode
   443         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE);
   450         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE);
   444         AccessControllerFactoryImpl.destroyAccessController(appUID);
   451         AccessControllerFactoryImpl.destroyAccessController(appUID);
   445         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   452         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   446         PermissionResolver.testClearCache();
   453         PermissionResolver.cleanup();
   447         grantedPermissions = new Vector();
   454         grantedPermissions = new Vector();
   448         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   455         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   449                                           "com.nokia.mj.impl.security.midp.authorization.HttpProtocolPermissionImpl",
   456                                           "com.nokia.mj.impl.security.midp.authorization.HttpProtocolPermissionImpl",
   450                                           "http://",
   457                                           "http://",
   451                                           null,
   458                                           null,
   480         assertTrue(true);
   487         assertTrue(true);
   481         // check user permission with blanket interaction mode, user says no -> second prompt is not shown
   488         // check user permission with blanket interaction mode, user says no -> second prompt is not shown
   482         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE);
   489         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE);
   483         AccessControllerFactoryImpl.destroyAccessController(appUID);
   490         AccessControllerFactoryImpl.destroyAccessController(appUID);
   484         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   491         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   485         PermissionResolver.testClearCache();
   492         PermissionResolver.cleanup();
   486         grantedPermissions = new Vector();
   493         grantedPermissions = new Vector();
   487         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   494         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   488                                           "com.nokia.mj.impl.security.midp.authorization.FileProtocolPermissionImpl",
   495                                           "com.nokia.mj.impl.security.midp.authorization.FileProtocolPermissionImpl",
   489                                           "file://*",
   496                                           "file://*",
   490                                           "read",
   497                                           "read",
   528 
   535 
   529         // check user permission with blanket interaction mode, user says no -> second prompt is not shown
   536         // check user permission with blanket interaction mode, user says no -> second prompt is not shown
   530         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE);
   537         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE);
   531         AccessControllerFactoryImpl.destroyAccessController(appUID);
   538         AccessControllerFactoryImpl.destroyAccessController(appUID);
   532         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   539         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   533         PermissionResolver.testClearCache();
   540         PermissionResolver.cleanup();
   534         grantedPermissions = new Vector();
   541         grantedPermissions = new Vector();
   535         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   542         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   536                                           "com.nokia.mj.impl.security.midp.authorization.FileProtocolPermissionImpl",
   543                                           "com.nokia.mj.impl.security.midp.authorization.FileProtocolPermissionImpl",
   537                                           "file://*",
   544                                           "file://*",
   538                                           "read",
   545                                           "read",
   577         AccessControllerFactoryImpl.destroyAccessController(appUID);
   584         AccessControllerFactoryImpl.destroyAccessController(appUID);
   578         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   585         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   579         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE);
   586         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE);
   580         AccessControllerFactoryImpl.destroyAccessController(appUID);
   587         AccessControllerFactoryImpl.destroyAccessController(appUID);
   581         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   588         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   582         PermissionResolver.testClearCache();
   589         PermissionResolver.cleanup();
   583         grantedPermissions = new Vector();
   590         grantedPermissions = new Vector();
   584         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   591         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   585                                           "com.nokia.mj.impl.security.midp.authorization.FileProtocolPermissionImpl",
   592                                           "com.nokia.mj.impl.security.midp.authorization.FileProtocolPermissionImpl",
   586                                           "file://*",
   593                                           "file://*",
   587                                           "read",
   594                                           "read",
   610         storage.removeGrantedPermissions(appUID);
   617         storage.removeGrantedPermissions(appUID);
   611         // user permission with blanket interaction mode, show prompt, do an update, check if the promtps is still shown
   618         // user permission with blanket interaction mode, show prompt, do an update, check if the promtps is still shown
   612         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE);
   619         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE);
   613         storage.removeAuthenticationStorageData(appUID);
   620         storage.removeAuthenticationStorageData(appUID);
   614         permissionGranter.removeSecurityData(session,appUID);
   621         permissionGranter.removeSecurityData(session,appUID);
   615         PermissionResolver.testClearCache();
   622         PermissionResolver.cleanup();
   616         allAttributes.clear();
   623         allAttributes.clear();
   617         allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2));
   624         allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2));
   618         allAttributes.put(AuthenticationAttribute.MAIN_ATTRIBUTE_PREFIX + "1-1", new Attribute("",        "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"));
   625         allAttributes.put(AuthenticationAttribute.MAIN_ATTRIBUTE_PREFIX + "1-1", new Attribute("",        "MIICWDCCAcECBEhQwOgwDQYJKoZIhvcNAQEEBQAwczELMAkGA1UEBhMCZmkxEjAQBgNVBAgTCVBpcmthbm1hYTEQMA4GA1UEBxMHVGFtcGVyZTEOMAwGA1UEChMFTm9raWExDTALBgNVBAsTBEphdmExHzAdBgNVBAMMFkpQX1RoaXJkX1BhcnR5X1RydXN0ZWQwHhcNMDgwNjEyMDYyMzM2WhcNMTgwNjEwMDYyMzM2WjBzMQswCQYDVQQGEwJmaTESMBAGA1UECBMJUGlya2FubWFhMRAwDgYDVQQHEwdUYW1wZXJlMQ4wDAYDVQQKEwVOb2tpYTENMAsGA1UECxMESmF2YTEfMB0GA1UEAwwWSlBfVGhpcmRfUGFydHlfVHJ1c3RlZDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEArAesh03rswICRUjexWMoIH9ZZqUtlx+tfhZhuzuYhiL6cLdhxNlU8yuIdw4f17XP3yxVIB8rz1EEagCMd0Y5ZleNFZ992ReLcf9VH13RxaZ88PRxBLLROm1jcwTknYSS6AxGMup77DMwwFSN8XPnOHWt4aLGUrecMeUyI2c5UbsCAwEAATANBgkqhkiG9w0BAQQFAAOBgQAylJ+3aSq6a7AAL7UM8V8JhGZlLneErF7A/BJGDi7Vmr5gmlGyf6RCJJIg4qCp+J3Tv3eCRNNuphQaSRdFpaulwCmtfCzSZNtvZg0VhMOVsZqTwQgmP6NzKoIbqqzlgm5U+yUJw8FmX17vgdeSEdJ/oL/WT4AKrWFJYl8MdQ9ZnQ=="));
   619         allAttributes.put(AuthenticationAttribute.SECOND_LEGACY_ATTRIBUTE_NAME ,new Attribute("", "F9/dB/WITCC1n886yppP9QTQBeQT6/8pV0UKwbTU9L8mP5qFuX2bjw7gPQZNxAC/4qNHYnmnMmwkfOPDjZzbOojdGJyEYXFyF0sBtLZKYYHylW8uXz4HDdtC1c2WHn8/Zl+a0Zoa8MjuxGRi5IVNY4XONlpPfzLxkOMVjna4KhA="));
   626         allAttributes.put(AuthenticationAttribute.SECOND_LEGACY_ATTRIBUTE_NAME ,new Attribute("", "F9/dB/WITCC1n886yppP9QTQBeQT6/8pV0UKwbTU9L8mP5qFuX2bjw7gPQZNxAC/4qNHYnmnMmwkfOPDjZzbOojdGJyEYXFyF0sBtLZKYYHylW8uXz4HDdtC1c2WHn8/Zl+a0Zoa8MjuxGRi5IVNY4XONlpPfzLxkOMVjna4KhA="));
   620         allAttributes.put(com.nokia.mj.impl.security.midp.common.PermissionAttribute.MANDATORY_LEGACY_ATTRIBUTE_NAME, new Attribute("","javax.microedition.io.Connector.socket,javax.microedition.io.Connector.http"));
   627         allAttributes.put(com.nokia.mj.impl.security.midp.common.PermissionAttribute.MANDATORY_LEGACY_ATTRIBUTE_NAME, new Attribute("","javax.microedition.io.Connector.socket,javax.microedition.io.Connector.http"));
   645                                          "MIDlet-Certificate-1-1"));
   652                                          "MIDlet-Certificate-1-1"));
   646         appPackageEntry.addAttribute(new StorageAttribute(
   653         appPackageEntry.addAttribute(new StorageAttribute(
   647                                          StorageNames.VALUE,
   654                                          StorageNames.VALUE,
   648                                          "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"));
   655                                          "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"));
   649         session.write(StorageNames.APPLICATION_PACKAGE_ATTRIBUTES_TABLE, appPackageEntry);
   656         session.write(StorageNames.APPLICATION_PACKAGE_ATTRIBUTES_TABLE, appPackageEntry);
   650         PermissionResolver.testClearCache();
   657         PermissionResolver.cleanup();
   651         allAttributes.clear();
   658         allAttributes.clear();
   652         allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2));
   659         allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2));
   653         allAttributes.put(AuthenticationAttribute.MAIN_ATTRIBUTE_PREFIX + "1-1", new Attribute("",        "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"));
   660         allAttributes.put(AuthenticationAttribute.MAIN_ATTRIBUTE_PREFIX + "1-1", new Attribute("",        "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"));
   654         allAttributes.put(AuthenticationAttribute.SECOND_LEGACY_ATTRIBUTE_NAME ,new Attribute("", "F9/dB/WITCC1n886yppP9QTQBeQT6/8pV0UKwbTU9L8mP5qFuX2bjw7gPQZNxAC/4qNHYnmnMmwkfOPDjZzbOojdGJyEYXFyF0sBtLZKYYHylW8uXz4HDdtC1c2WHn8/Zl+a0Zoa8MjuxGRi5IVNY4XONlpPfzLxkOMVjna4KhA="));
   661         allAttributes.put(AuthenticationAttribute.SECOND_LEGACY_ATTRIBUTE_NAME ,new Attribute("", "F9/dB/WITCC1n886yppP9QTQBeQT6/8pV0UKwbTU9L8mP5qFuX2bjw7gPQZNxAC/4qNHYnmnMmwkfOPDjZzbOojdGJyEYXFyF0sBtLZKYYHylW8uXz4HDdtC1c2WHn8/Zl+a0Zoa8MjuxGRi5IVNY4XONlpPfzLxkOMVjna4KhA="));
   655         allAttributes.put(com.nokia.mj.impl.security.midp.common.PermissionAttribute.MANDATORY_LEGACY_ATTRIBUTE_NAME, new Attribute("","javax.microedition.io.Connector.socket,javax.microedition.io.Connector.http"));
   662         allAttributes.put(com.nokia.mj.impl.security.midp.common.PermissionAttribute.MANDATORY_LEGACY_ATTRIBUTE_NAME, new Attribute("","javax.microedition.io.Connector.socket,javax.microedition.io.Connector.http"));
   667         permissionGranter.addSecurityData(session, appUID, appUID);
   674         permissionGranter.addSecurityData(session, appUID, appUID);
   668         blanketPromptShown = storage.readUserSecuritySettingsPromptFlag(appUID, "Net Access");
   675         blanketPromptShown = storage.readUserSecuritySettingsPromptFlag(appUID, "Net Access");
   669         ac.checkPermission(new HttpProtocolPermissionImpl("http://", "\n(IF YOU SEE THIS PROMPT THE TEST FAILED)"));
   676         ac.checkPermission(new HttpProtocolPermissionImpl("http://", "\n(IF YOU SEE THIS PROMPT THE TEST FAILED)"));
   670         storage.removeAuthenticationStorageData(appUID);
   677         storage.removeAuthenticationStorageData(appUID);
   671         permissionGranter.removeSecurityData(session,appUID);
   678         permissionGranter.removeSecurityData(session,appUID);
   672         PermissionResolver.testClearCache();
   679         PermissionResolver.cleanup();
   673         assertTrue(blanketPromptShown);
   680         assertTrue(blanketPromptShown);
   674         // Add check user permission with prompt shown in blanket interaction mode -> no user prompts
   681         // Add check user permission with prompt shown in blanket interaction mode -> no user prompts
   675         // legacy signed MIDlet, some permissions requested -> checkPermission for the granted perms succeeds and checkPermission for not granted perms fails
   682         // legacy signed MIDlet, some permissions requested -> checkPermission for the granted perms succeeds and checkPermission for not granted perms fails
   676         AccessControllerFactoryImpl.destroyAccessController(appUID);
   683         AccessControllerFactoryImpl.destroyAccessController(appUID);
   677         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   684         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   678         storage.removeAuthenticationStorageData(appUID);
   685         storage.removeAuthenticationStorageData(appUID);
   679         storage.removeGrantedPermissions(appUID);
   686         storage.removeGrantedPermissions(appUID);
   680         PermissionResolver.testClearCache();
   687         PermissionResolver.cleanup();
   681         allAttributes.clear();
   688         allAttributes.clear();
   682         allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2));
   689         allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2));
   683         allAttributes.put(AuthenticationAttribute.MAIN_ATTRIBUTE_PREFIX + "1-1", new Attribute("",        "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"));
   690         allAttributes.put(AuthenticationAttribute.MAIN_ATTRIBUTE_PREFIX + "1-1", new Attribute("",        "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"));
   684         allAttributes.put(AuthenticationAttribute.SECOND_LEGACY_ATTRIBUTE_NAME ,new Attribute("", "IcANmLKiOJQF8ABCNDj1PNNH/O8v9jfCVuiGBVm8enXDkM/gLwPjrC65sDKpOCHPqssUlHzjmVN5b9g8aRs4jxUOXNt2b732J7NSIPh97vw/WrP/KHdiooi/1KFUyklMyokK9ZrIv+GW1ttLCfKbuFupT9zmPAmWJQpnuD7J6sE="));
   691         allAttributes.put(AuthenticationAttribute.SECOND_LEGACY_ATTRIBUTE_NAME ,new Attribute("", "IcANmLKiOJQF8ABCNDj1PNNH/O8v9jfCVuiGBVm8enXDkM/gLwPjrC65sDKpOCHPqssUlHzjmVN5b9g8aRs4jxUOXNt2b732J7NSIPh97vw/WrP/KHdiooi/1KFUyklMyokK9ZrIv+GW1ttLCfKbuFupT9zmPAmWJQpnuD7J6sE="));
   685         allAttributes.put(com.nokia.mj.impl.security.midp.common.PermissionAttribute.MANDATORY_LEGACY_ATTRIBUTE_NAME, new Attribute("","javax.microedition.io.Connector.socket,javax.microedition.io.Connector.http"));
   692         allAttributes.put(com.nokia.mj.impl.security.midp.common.PermissionAttribute.MANDATORY_LEGACY_ATTRIBUTE_NAME, new Attribute("","javax.microedition.io.Connector.socket,javax.microedition.io.Connector.http"));
   719         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE);
   726         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE);
   720         AccessControllerFactoryImpl.destroyAccessController(appUID);
   727         AccessControllerFactoryImpl.destroyAccessController(appUID);
   721         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   728         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   722         storage.removeAuthenticationStorageData(appUID);
   729         storage.removeAuthenticationStorageData(appUID);
   723         storage.removeGrantedPermissions(appUID);
   730         storage.removeGrantedPermissions(appUID);
   724         PermissionResolver.testClearCache();
   731         PermissionResolver.cleanup();
   725         allAttributes.clear();
   732         allAttributes.clear();
   726         allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2));
   733         allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2));
   727         securityAttributes = new SecurityAttributes();
   734         securityAttributes = new SecurityAttributes();
   728         securityAttributes.addDescriptorAttributes(allAttributes);
   735         securityAttributes.addDescriptorAttributes(allAttributes);
   729         credentials = authenticationModule.authenticateJad(appUID,null,securityAttributes.getAuthenticationAttributes());
   736         credentials = authenticationModule.authenticateJad(appUID,null,securityAttributes.getAuthenticationAttributes());
   757         /* Uncomment if the mutual exclusive rules are to be applied in runtime security prompts
   764         /* Uncomment if the mutual exclusive rules are to be applied in runtime security prompts
   758                 // 2 check mutual exclusive rules: auto invocation is already set to blanket, then Net Access is set to Blanket -> check that auto invocation is changed to max allowed (exclusing blanket)
   765                 // 2 check mutual exclusive rules: auto invocation is already set to blanket, then Net Access is set to Blanket -> check that auto invocation is changed to max allowed (exclusing blanket)
   759                 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE);
   766                 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE);
   760                 AccessControllerFactoryImpl.destroyAccessController(appUID);
   767                 AccessControllerFactoryImpl.destroyAccessController(appUID);
   761                 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   768                 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   762                 PermissionResolver.testClearCache();
   769                 PermissionResolver.cleanup();
   763                 grantedPermissions = new Vector();
   770                 grantedPermissions = new Vector();
   764                 grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   771                 grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   765                     "something",
   772                     "something",
   766                     "*",
   773                     "*",
   767                     "autoinvocation",
   774                     "autoinvocation",
   800                 assertTrue(success);*/
   807                 assertTrue(success);*/
   801         // test parralel instances of the ui: show a security prompt, show an error, destroy the ui for error, destroy the ui for the security prompt
   808         // test parralel instances of the ui: show a security prompt, show an error, destroy the ui for error, destroy the ui for the security prompt
   802         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE);
   809         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE);
   803         AccessControllerFactoryImpl.destroyAccessController(appUID);
   810         AccessControllerFactoryImpl.destroyAccessController(appUID);
   804         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   811         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   805         PermissionResolver.testClearCache();
   812         PermissionResolver.cleanup();
   806         grantedPermissions = new Vector();
   813         grantedPermissions = new Vector();
   807         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   814         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   808                                           "com.nokia.mj.impl.security.midp.authorization.CommProtocolPermissionImpl",
   815                                           "com.nokia.mj.impl.security.midp.authorization.CommProtocolPermissionImpl",
   809                                           "comm://",
   816                                           "comm://",
   810                                           null,
   817                                           null,
   828         ui.destroy();
   835         ui.destroy();
   829         // check prompt for blanket
   836         // check prompt for blanket
   830         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE);
   837         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE);
   831         AccessControllerFactoryImpl.destroyAccessController(appUID);
   838         AccessControllerFactoryImpl.destroyAccessController(appUID);
   832         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   839         ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   833         PermissionResolver.testClearCache();
   840         PermissionResolver.cleanup();
   834         grantedPermissions = new Vector();
   841         grantedPermissions = new Vector();
   835         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   842         grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   836                                           "com.nokia.mj.impl.security.midp.authorization.FileProtocolPermissionImpl",
   843                                           "com.nokia.mj.impl.security.midp.authorization.FileProtocolPermissionImpl",
   837                                           "file://*",
   844                                           "file://*",
   838                                           "read",
   845                                           "read",
   862                     SecurityDetailedErrorMessage.CERT_DISABLED,
   869                     SecurityDetailedErrorMessage.CERT_DISABLED,
   863                     null);
   870                     null);
   864                 ui.error("myMIDlet", exc);
   871                 ui.error("myMIDlet", exc);
   865                 ui.destroy();
   872                 ui.destroy();
   866                 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   873                 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName);
   867                 PermissionResolver.testClearCache();
   874                 PermissionResolver.cleanup();
   868                 grantedPermissions = new Vector();
   875                 grantedPermissions = new Vector();
   869                 grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   876                 grantedPermissions.addElement(new PolicyBasedPermissionImpl(
   870                     "com.nokia.mj.impl.security.midp.authorization.FileProtocolPermissionImpl",
   877                     "com.nokia.mj.impl.security.midp.authorization.FileProtocolPermissionImpl",
   871                     "file://*",
   878                     "file://*",
   872                     "read",
   879                     "read",