107 // Begin j2meunit test framework setup |
107 // Begin j2meunit test framework setup |
108 public void installerMain(String[] args) |
108 public void installerMain(String[] args) |
109 { |
109 { |
110 TestSuite suite = new TestSuite(this.getClass().getName()); |
110 TestSuite suite = new TestSuite(this.getClass().getName()); |
111 |
111 |
112 suite.addTest(new InteractiveAccessControllerTests("testAVKONSecurityPrompts", new TestMethod() |
112 suite.addTest(new InteractiveAccessControllerTests("testSecurityPrompts", new TestMethod() |
113 { |
113 { |
114 public void run(TestCase tc) |
114 public void run(TestCase tc) |
115 { |
115 { |
116 ((InteractiveAccessControllerTests)tc).testAVKONSecurityPrompts(); |
116 ((InteractiveAccessControllerTests)tc).testSecurityPrompts(); |
117 } |
117 } |
118 })); |
118 })); |
119 |
119 |
120 com.nokia.mj.impl.utils.OmjTestRunner.run(suite); |
120 com.nokia.mj.impl.utils.OmjTestRunner.run(suite); |
121 } |
121 } |
144 |
144 |
145 protected void tearDown() |
145 protected void tearDown() |
146 { |
146 { |
147 } |
147 } |
148 |
148 |
149 private void testAVKONSecurityPrompts() |
149 private void testSecurityPrompts() |
150 { |
150 { |
151 System.setProperty("com.nokia.mj.impl.rt.ui", "com.nokia.mj.impl.rt.ui.avkon.RuntimeUiAvkon"); |
151 System.setProperty("com.nokia.mj.impl.rt.ui", "com.nokia.mj.impl.rt.ui.avkon.RuntimeUiAvkon"); |
152 testSecurityPrompts(); |
152 try |
|
153 { |
|
154 Class.forName("com.nokia.mj.impl.rt.ui.qt.RuntimeUiQt"); |
|
155 System.setProperty("com.nokia.mj.impl.rt.ui", "com.nokia.mj.impl.rt.ui.qt.RuntimeUiQt"); |
|
156 }catch(Throwable t) |
|
157 { |
|
158 } |
|
159 runTests(); |
153 } |
160 } |
154 |
161 |
155 private void testSecurityPrompts() |
162 private void runTests() |
156 { |
163 { |
157 // init the new mapping & policies |
164 // init the new mapping & policies |
158 //initMappingTable(); |
165 //initMappingTable(); |
159 IMPL_PERMISSION_MAPPING_TABLE = PermissionMappingTable.setMappingTable(TestPermissionMappingTable.getMappingTable()); |
166 IMPL_PERMISSION_MAPPING_TABLE = PermissionMappingTable.setMappingTable(TestPermissionMappingTable.getMappingTable()); |
160 SecurityPolicyModule.policiesDir = TEST_DATA_DIR; |
167 SecurityPolicyModule.policiesDir = TEST_DATA_DIR; |
180 StorageNames.SECURITY_WARNINGS, |
187 StorageNames.SECURITY_WARNINGS, |
181 "" + GeneralSecuritySettings.DEFAULT_SECURITY_MODE)); |
188 "" + GeneralSecuritySettings.DEFAULT_SECURITY_MODE)); |
182 session.write(StorageNames.MIDP_PACKAGE_TABLE, entry); |
189 session.write(StorageNames.MIDP_PACKAGE_TABLE, entry); |
183 // prompts for composite actions |
190 // prompts for composite actions |
184 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE); |
191 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE); |
185 PermissionResolver.testClearCache(); |
192 PermissionResolver.cleanup(); |
186 grantedPermissions = new Vector(); |
193 grantedPermissions = new Vector(); |
187 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
194 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
188 "com.nokia.mj.impl.security.midp.authorization.PermissionWithCompositeActionsImpl", |
195 "com.nokia.mj.impl.security.midp.authorization.PermissionWithCompositeActionsImpl", |
189 "uri://", |
196 "uri://", |
190 "action1", |
197 "action1", |
228 assertTrue(true); |
235 assertTrue(true); |
229 } |
236 } |
230 assertTrue(true); |
237 assertTrue(true); |
231 // for NORMAL security mode, in case of identical prompts, only show one (even though they are part of different function groups) |
238 // for NORMAL security mode, in case of identical prompts, only show one (even though they are part of different function groups) |
232 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE); |
239 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE); |
233 PermissionResolver.testClearCache(); |
240 PermissionResolver.cleanup(); |
234 grantedPermissions = new Vector(); |
241 grantedPermissions = new Vector(); |
235 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
242 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
236 "com.nokia.mj.impl.security.midp.authorization.CommProtocolPermissionImpl", |
243 "com.nokia.mj.impl.security.midp.authorization.CommProtocolPermissionImpl", |
237 "comm://", |
244 "comm://", |
238 null, |
245 null, |
260 ac.checkPermission(new CommProtocolPermissionImpl("comm://", "\n(choose ALLOW and make sure this text is shown only once)")); |
267 ac.checkPermission(new CommProtocolPermissionImpl("comm://", "\n(choose ALLOW and make sure this text is shown only once)")); |
261 // for USER security mode, in case of identical prompts, show them both |
268 // for USER security mode, in case of identical prompts, show them both |
262 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE); |
269 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE); |
263 AccessControllerFactoryImpl.destroyAccessController(appUID); |
270 AccessControllerFactoryImpl.destroyAccessController(appUID); |
264 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
271 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
265 PermissionResolver.testClearCache(); |
272 PermissionResolver.cleanup(); |
266 grantedPermissions = new Vector(); |
273 grantedPermissions = new Vector(); |
267 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
274 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
268 "com.nokia.mj.impl.security.midp.authorization.CommProtocolPermissionImpl", |
275 "com.nokia.mj.impl.security.midp.authorization.CommProtocolPermissionImpl", |
269 "comm://", |
276 "comm://", |
270 null, |
277 null, |
292 ac.checkPermission(new CommProtocolPermissionImpl("comm://", "\n(choose ALLOW and make sure this text is shown twice)")); |
299 ac.checkPermission(new CommProtocolPermissionImpl("comm://", "\n(choose ALLOW and make sure this text is shown twice)")); |
293 // check user permission with oneshot interaction mode -> multiple prompts and deny is oneshot deny |
300 // check user permission with oneshot interaction mode -> multiple prompts and deny is oneshot deny |
294 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE); |
301 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE); |
295 AccessControllerFactoryImpl.destroyAccessController(appUID); |
302 AccessControllerFactoryImpl.destroyAccessController(appUID); |
296 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
303 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
297 PermissionResolver.testClearCache(); |
304 PermissionResolver.cleanup(); |
298 grantedPermissions = new Vector(); |
305 grantedPermissions = new Vector(); |
299 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
306 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
300 "com.nokia.mj.impl.security.midp.authorization.CommProtocolPermissionImpl", |
307 "com.nokia.mj.impl.security.midp.authorization.CommProtocolPermissionImpl", |
301 "comm://", |
308 "comm://", |
302 null, |
309 null, |
333 AccessControllerFactoryImpl.destroyAccessController(appUID); |
340 AccessControllerFactoryImpl.destroyAccessController(appUID); |
334 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
341 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
335 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE); |
342 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE); |
336 AccessControllerFactoryImpl.destroyAccessController(appUID); |
343 AccessControllerFactoryImpl.destroyAccessController(appUID); |
337 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
344 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
338 PermissionResolver.testClearCache(); |
345 PermissionResolver.cleanup(); |
339 grantedPermissions = new Vector(); |
346 grantedPermissions = new Vector(); |
340 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
347 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
341 "com.nokia.mj.impl.security.midp.authorization.HttpProtocolPermissionImpl", |
348 "com.nokia.mj.impl.security.midp.authorization.HttpProtocolPermissionImpl", |
342 "http://", |
349 "http://", |
343 null, |
350 null, |
359 AccessControllerFactoryImpl.destroyAccessController(appUID); |
366 AccessControllerFactoryImpl.destroyAccessController(appUID); |
360 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
367 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
361 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE); |
368 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE); |
362 AccessControllerFactoryImpl.destroyAccessController(appUID); |
369 AccessControllerFactoryImpl.destroyAccessController(appUID); |
363 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
370 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
364 PermissionResolver.testClearCache(); |
371 PermissionResolver.cleanup(); |
365 grantedPermissions = new Vector(); |
372 grantedPermissions = new Vector(); |
366 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
373 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
367 "com.nokia.mj.impl.security.midp.authorization.HttpProtocolPermissionImpl", |
374 "com.nokia.mj.impl.security.midp.authorization.HttpProtocolPermissionImpl", |
368 "http://", |
375 "http://", |
369 null, |
376 null, |
401 assertTrue(true); |
408 assertTrue(true); |
402 // check user permission with session interaction mode, user says no -> second prompt is not shown in normal security mode |
409 // check user permission with session interaction mode, user says no -> second prompt is not shown in normal security mode |
403 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE); |
410 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE); |
404 AccessControllerFactoryImpl.destroyAccessController(appUID); |
411 AccessControllerFactoryImpl.destroyAccessController(appUID); |
405 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
412 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
406 PermissionResolver.testClearCache(); |
413 PermissionResolver.cleanup(); |
407 grantedPermissions = new Vector(); |
414 grantedPermissions = new Vector(); |
408 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
415 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
409 "com.nokia.mj.impl.security.midp.authorization.HttpProtocolPermissionImpl", |
416 "com.nokia.mj.impl.security.midp.authorization.HttpProtocolPermissionImpl", |
410 "http://", |
417 "http://", |
411 null, |
418 null, |
441 |
448 |
442 // check user permission with session interaction mode, user says no -> second prompt is not shown in user security mode |
449 // check user permission with session interaction mode, user says no -> second prompt is not shown in user security mode |
443 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE); |
450 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE); |
444 AccessControllerFactoryImpl.destroyAccessController(appUID); |
451 AccessControllerFactoryImpl.destroyAccessController(appUID); |
445 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
452 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
446 PermissionResolver.testClearCache(); |
453 PermissionResolver.cleanup(); |
447 grantedPermissions = new Vector(); |
454 grantedPermissions = new Vector(); |
448 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
455 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
449 "com.nokia.mj.impl.security.midp.authorization.HttpProtocolPermissionImpl", |
456 "com.nokia.mj.impl.security.midp.authorization.HttpProtocolPermissionImpl", |
450 "http://", |
457 "http://", |
451 null, |
458 null, |
480 assertTrue(true); |
487 assertTrue(true); |
481 // check user permission with blanket interaction mode, user says no -> second prompt is not shown |
488 // check user permission with blanket interaction mode, user says no -> second prompt is not shown |
482 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE); |
489 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE); |
483 AccessControllerFactoryImpl.destroyAccessController(appUID); |
490 AccessControllerFactoryImpl.destroyAccessController(appUID); |
484 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
491 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
485 PermissionResolver.testClearCache(); |
492 PermissionResolver.cleanup(); |
486 grantedPermissions = new Vector(); |
493 grantedPermissions = new Vector(); |
487 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
494 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
488 "com.nokia.mj.impl.security.midp.authorization.FileProtocolPermissionImpl", |
495 "com.nokia.mj.impl.security.midp.authorization.FileProtocolPermissionImpl", |
489 "file://*", |
496 "file://*", |
490 "read", |
497 "read", |
528 |
535 |
529 // check user permission with blanket interaction mode, user says no -> second prompt is not shown |
536 // check user permission with blanket interaction mode, user says no -> second prompt is not shown |
530 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE); |
537 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE); |
531 AccessControllerFactoryImpl.destroyAccessController(appUID); |
538 AccessControllerFactoryImpl.destroyAccessController(appUID); |
532 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
539 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
533 PermissionResolver.testClearCache(); |
540 PermissionResolver.cleanup(); |
534 grantedPermissions = new Vector(); |
541 grantedPermissions = new Vector(); |
535 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
542 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
536 "com.nokia.mj.impl.security.midp.authorization.FileProtocolPermissionImpl", |
543 "com.nokia.mj.impl.security.midp.authorization.FileProtocolPermissionImpl", |
537 "file://*", |
544 "file://*", |
538 "read", |
545 "read", |
577 AccessControllerFactoryImpl.destroyAccessController(appUID); |
584 AccessControllerFactoryImpl.destroyAccessController(appUID); |
578 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
585 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
579 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE); |
586 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE); |
580 AccessControllerFactoryImpl.destroyAccessController(appUID); |
587 AccessControllerFactoryImpl.destroyAccessController(appUID); |
581 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
588 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
582 PermissionResolver.testClearCache(); |
589 PermissionResolver.cleanup(); |
583 grantedPermissions = new Vector(); |
590 grantedPermissions = new Vector(); |
584 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
591 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
585 "com.nokia.mj.impl.security.midp.authorization.FileProtocolPermissionImpl", |
592 "com.nokia.mj.impl.security.midp.authorization.FileProtocolPermissionImpl", |
586 "file://*", |
593 "file://*", |
587 "read", |
594 "read", |
610 storage.removeGrantedPermissions(appUID); |
617 storage.removeGrantedPermissions(appUID); |
611 // user permission with blanket interaction mode, show prompt, do an update, check if the promtps is still shown |
618 // user permission with blanket interaction mode, show prompt, do an update, check if the promtps is still shown |
612 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE); |
619 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE); |
613 storage.removeAuthenticationStorageData(appUID); |
620 storage.removeAuthenticationStorageData(appUID); |
614 permissionGranter.removeSecurityData(session,appUID); |
621 permissionGranter.removeSecurityData(session,appUID); |
615 PermissionResolver.testClearCache(); |
622 PermissionResolver.cleanup(); |
616 allAttributes.clear(); |
623 allAttributes.clear(); |
617 allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2)); |
624 allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2)); |
618 allAttributes.put(AuthenticationAttribute.MAIN_ATTRIBUTE_PREFIX + "1-1", new Attribute("", "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")); |
625 allAttributes.put(AuthenticationAttribute.MAIN_ATTRIBUTE_PREFIX + "1-1", new Attribute("", "MIICWDCCAcECBEhQwOgwDQYJKoZIhvcNAQEEBQAwczELMAkGA1UEBhMCZmkxEjAQBgNVBAgTCVBpcmthbm1hYTEQMA4GA1UEBxMHVGFtcGVyZTEOMAwGA1UEChMFTm9raWExDTALBgNVBAsTBEphdmExHzAdBgNVBAMMFkpQX1RoaXJkX1BhcnR5X1RydXN0ZWQwHhcNMDgwNjEyMDYyMzM2WhcNMTgwNjEwMDYyMzM2WjBzMQswCQYDVQQGEwJmaTESMBAGA1UECBMJUGlya2FubWFhMRAwDgYDVQQHEwdUYW1wZXJlMQ4wDAYDVQQKEwVOb2tpYTENMAsGA1UECxMESmF2YTEfMB0GA1UEAwwWSlBfVGhpcmRfUGFydHlfVHJ1c3RlZDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEArAesh03rswICRUjexWMoIH9ZZqUtlx+tfhZhuzuYhiL6cLdhxNlU8yuIdw4f17XP3yxVIB8rz1EEagCMd0Y5ZleNFZ992ReLcf9VH13RxaZ88PRxBLLROm1jcwTknYSS6AxGMup77DMwwFSN8XPnOHWt4aLGUrecMeUyI2c5UbsCAwEAATANBgkqhkiG9w0BAQQFAAOBgQAylJ+3aSq6a7AAL7UM8V8JhGZlLneErF7A/BJGDi7Vmr5gmlGyf6RCJJIg4qCp+J3Tv3eCRNNuphQaSRdFpaulwCmtfCzSZNtvZg0VhMOVsZqTwQgmP6NzKoIbqqzlgm5U+yUJw8FmX17vgdeSEdJ/oL/WT4AKrWFJYl8MdQ9ZnQ==")); |
619 allAttributes.put(AuthenticationAttribute.SECOND_LEGACY_ATTRIBUTE_NAME ,new Attribute("", "F9/dB/WITCC1n886yppP9QTQBeQT6/8pV0UKwbTU9L8mP5qFuX2bjw7gPQZNxAC/4qNHYnmnMmwkfOPDjZzbOojdGJyEYXFyF0sBtLZKYYHylW8uXz4HDdtC1c2WHn8/Zl+a0Zoa8MjuxGRi5IVNY4XONlpPfzLxkOMVjna4KhA=")); |
626 allAttributes.put(AuthenticationAttribute.SECOND_LEGACY_ATTRIBUTE_NAME ,new Attribute("", "F9/dB/WITCC1n886yppP9QTQBeQT6/8pV0UKwbTU9L8mP5qFuX2bjw7gPQZNxAC/4qNHYnmnMmwkfOPDjZzbOojdGJyEYXFyF0sBtLZKYYHylW8uXz4HDdtC1c2WHn8/Zl+a0Zoa8MjuxGRi5IVNY4XONlpPfzLxkOMVjna4KhA=")); |
620 allAttributes.put(com.nokia.mj.impl.security.midp.common.PermissionAttribute.MANDATORY_LEGACY_ATTRIBUTE_NAME, new Attribute("","javax.microedition.io.Connector.socket,javax.microedition.io.Connector.http")); |
627 allAttributes.put(com.nokia.mj.impl.security.midp.common.PermissionAttribute.MANDATORY_LEGACY_ATTRIBUTE_NAME, new Attribute("","javax.microedition.io.Connector.socket,javax.microedition.io.Connector.http")); |
645 "MIDlet-Certificate-1-1")); |
652 "MIDlet-Certificate-1-1")); |
646 appPackageEntry.addAttribute(new StorageAttribute( |
653 appPackageEntry.addAttribute(new StorageAttribute( |
647 StorageNames.VALUE, |
654 StorageNames.VALUE, |
648 "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")); |
655 "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")); |
649 session.write(StorageNames.APPLICATION_PACKAGE_ATTRIBUTES_TABLE, appPackageEntry); |
656 session.write(StorageNames.APPLICATION_PACKAGE_ATTRIBUTES_TABLE, appPackageEntry); |
650 PermissionResolver.testClearCache(); |
657 PermissionResolver.cleanup(); |
651 allAttributes.clear(); |
658 allAttributes.clear(); |
652 allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2)); |
659 allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2)); |
653 allAttributes.put(AuthenticationAttribute.MAIN_ATTRIBUTE_PREFIX + "1-1", new Attribute("", "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")); |
660 allAttributes.put(AuthenticationAttribute.MAIN_ATTRIBUTE_PREFIX + "1-1", new Attribute("", "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")); |
654 allAttributes.put(AuthenticationAttribute.SECOND_LEGACY_ATTRIBUTE_NAME ,new Attribute("", "F9/dB/WITCC1n886yppP9QTQBeQT6/8pV0UKwbTU9L8mP5qFuX2bjw7gPQZNxAC/4qNHYnmnMmwkfOPDjZzbOojdGJyEYXFyF0sBtLZKYYHylW8uXz4HDdtC1c2WHn8/Zl+a0Zoa8MjuxGRi5IVNY4XONlpPfzLxkOMVjna4KhA=")); |
661 allAttributes.put(AuthenticationAttribute.SECOND_LEGACY_ATTRIBUTE_NAME ,new Attribute("", "F9/dB/WITCC1n886yppP9QTQBeQT6/8pV0UKwbTU9L8mP5qFuX2bjw7gPQZNxAC/4qNHYnmnMmwkfOPDjZzbOojdGJyEYXFyF0sBtLZKYYHylW8uXz4HDdtC1c2WHn8/Zl+a0Zoa8MjuxGRi5IVNY4XONlpPfzLxkOMVjna4KhA=")); |
655 allAttributes.put(com.nokia.mj.impl.security.midp.common.PermissionAttribute.MANDATORY_LEGACY_ATTRIBUTE_NAME, new Attribute("","javax.microedition.io.Connector.socket,javax.microedition.io.Connector.http")); |
662 allAttributes.put(com.nokia.mj.impl.security.midp.common.PermissionAttribute.MANDATORY_LEGACY_ATTRIBUTE_NAME, new Attribute("","javax.microedition.io.Connector.socket,javax.microedition.io.Connector.http")); |
667 permissionGranter.addSecurityData(session, appUID, appUID); |
674 permissionGranter.addSecurityData(session, appUID, appUID); |
668 blanketPromptShown = storage.readUserSecuritySettingsPromptFlag(appUID, "Net Access"); |
675 blanketPromptShown = storage.readUserSecuritySettingsPromptFlag(appUID, "Net Access"); |
669 ac.checkPermission(new HttpProtocolPermissionImpl("http://", "\n(IF YOU SEE THIS PROMPT THE TEST FAILED)")); |
676 ac.checkPermission(new HttpProtocolPermissionImpl("http://", "\n(IF YOU SEE THIS PROMPT THE TEST FAILED)")); |
670 storage.removeAuthenticationStorageData(appUID); |
677 storage.removeAuthenticationStorageData(appUID); |
671 permissionGranter.removeSecurityData(session,appUID); |
678 permissionGranter.removeSecurityData(session,appUID); |
672 PermissionResolver.testClearCache(); |
679 PermissionResolver.cleanup(); |
673 assertTrue(blanketPromptShown); |
680 assertTrue(blanketPromptShown); |
674 // Add check user permission with prompt shown in blanket interaction mode -> no user prompts |
681 // Add check user permission with prompt shown in blanket interaction mode -> no user prompts |
675 // legacy signed MIDlet, some permissions requested -> checkPermission for the granted perms succeeds and checkPermission for not granted perms fails |
682 // legacy signed MIDlet, some permissions requested -> checkPermission for the granted perms succeeds and checkPermission for not granted perms fails |
676 AccessControllerFactoryImpl.destroyAccessController(appUID); |
683 AccessControllerFactoryImpl.destroyAccessController(appUID); |
677 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
684 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
678 storage.removeAuthenticationStorageData(appUID); |
685 storage.removeAuthenticationStorageData(appUID); |
679 storage.removeGrantedPermissions(appUID); |
686 storage.removeGrantedPermissions(appUID); |
680 PermissionResolver.testClearCache(); |
687 PermissionResolver.cleanup(); |
681 allAttributes.clear(); |
688 allAttributes.clear(); |
682 allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2)); |
689 allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2)); |
683 allAttributes.put(AuthenticationAttribute.MAIN_ATTRIBUTE_PREFIX + "1-1", new Attribute("", "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")); |
690 allAttributes.put(AuthenticationAttribute.MAIN_ATTRIBUTE_PREFIX + "1-1", new Attribute("", "MIICWDCCAcECBEhQwA0wDQYJKoZIhvcNAQEEBQAwczELMAkGA1UEBhMCZmkxEjAQBgNVBAgTCVBpcmthbm1hYTEQMA4GA1UEBxMHVGFtcGVyZTEOMAwGA1UEChMFTm9raWExDTALBgNVBAsTBEphdmExHzAdBgNVBAMMFkpQX0RldmljZV9NYW51ZmFjdHVyZXIwHhcNMDgwNjEyMDYxOTU3WhcNMTgwNjEwMDYxOTU3WjBzMQswCQYDVQQGEwJmaTESMBAGA1UECBMJUGlya2FubWFhMRAwDgYDVQQHEwdUYW1wZXJlMQ4wDAYDVQQKEwVOb2tpYTENMAsGA1UECxMESmF2YTEfMB0GA1UEAwwWSlBfRGV2aWNlX01hbnVmYWN0dXJlcjCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEApi3ipIPj8O33/rZre1euh7Itd9d6ZVf2mvQ/tLpHEsFJe5XLOsVViMvFskhhKUzmDsRbP4J03L6827/vEDIi/1i8kJGLaoFqJYaLGFWI2Zmxlj6aJV8cfZyOjmQPWJn1IDEe1ZAWbvMSp8xibWRsCLNEGKIkxQvAr/QDK/6iS+kCAwEAATANBgkqhkiG9w0BAQQFAAOBgQCDXt6klAs6yKvdTab3D2wkdoi3Lu4YFsMgLexJOu5HhAUJ/9VYO+Q2+mjd95MRsTa5rWQ2Jjvhn57Z3z/KBOwfHbymmNtMk6Gl14H0vQRoHa31jh3mTuAy5KotDVthaDp30aOizk473NU68wY1WdP4gFk5ZhrpNea9q3st13BxIQ==")); |
684 allAttributes.put(AuthenticationAttribute.SECOND_LEGACY_ATTRIBUTE_NAME ,new Attribute("", "IcANmLKiOJQF8ABCNDj1PNNH/O8v9jfCVuiGBVm8enXDkM/gLwPjrC65sDKpOCHPqssUlHzjmVN5b9g8aRs4jxUOXNt2b732J7NSIPh97vw/WrP/KHdiooi/1KFUyklMyokK9ZrIv+GW1ttLCfKbuFupT9zmPAmWJQpnuD7J6sE=")); |
691 allAttributes.put(AuthenticationAttribute.SECOND_LEGACY_ATTRIBUTE_NAME ,new Attribute("", "IcANmLKiOJQF8ABCNDj1PNNH/O8v9jfCVuiGBVm8enXDkM/gLwPjrC65sDKpOCHPqssUlHzjmVN5b9g8aRs4jxUOXNt2b732J7NSIPh97vw/WrP/KHdiooi/1KFUyklMyokK9ZrIv+GW1ttLCfKbuFupT9zmPAmWJQpnuD7J6sE=")); |
685 allAttributes.put(com.nokia.mj.impl.security.midp.common.PermissionAttribute.MANDATORY_LEGACY_ATTRIBUTE_NAME, new Attribute("","javax.microedition.io.Connector.socket,javax.microedition.io.Connector.http")); |
692 allAttributes.put(com.nokia.mj.impl.security.midp.common.PermissionAttribute.MANDATORY_LEGACY_ATTRIBUTE_NAME, new Attribute("","javax.microedition.io.Connector.socket,javax.microedition.io.Connector.http")); |
719 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE); |
726 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE); |
720 AccessControllerFactoryImpl.destroyAccessController(appUID); |
727 AccessControllerFactoryImpl.destroyAccessController(appUID); |
721 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
728 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
722 storage.removeAuthenticationStorageData(appUID); |
729 storage.removeAuthenticationStorageData(appUID); |
723 storage.removeGrantedPermissions(appUID); |
730 storage.removeGrantedPermissions(appUID); |
724 PermissionResolver.testClearCache(); |
731 PermissionResolver.cleanup(); |
725 allAttributes.clear(); |
732 allAttributes.clear(); |
726 allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2)); |
733 allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2)); |
727 securityAttributes = new SecurityAttributes(); |
734 securityAttributes = new SecurityAttributes(); |
728 securityAttributes.addDescriptorAttributes(allAttributes); |
735 securityAttributes.addDescriptorAttributes(allAttributes); |
729 credentials = authenticationModule.authenticateJad(appUID,null,securityAttributes.getAuthenticationAttributes()); |
736 credentials = authenticationModule.authenticateJad(appUID,null,securityAttributes.getAuthenticationAttributes()); |
757 /* Uncomment if the mutual exclusive rules are to be applied in runtime security prompts |
764 /* Uncomment if the mutual exclusive rules are to be applied in runtime security prompts |
758 // 2 check mutual exclusive rules: auto invocation is already set to blanket, then Net Access is set to Blanket -> check that auto invocation is changed to max allowed (exclusing blanket) |
765 // 2 check mutual exclusive rules: auto invocation is already set to blanket, then Net Access is set to Blanket -> check that auto invocation is changed to max allowed (exclusing blanket) |
759 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE); |
766 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE); |
760 AccessControllerFactoryImpl.destroyAccessController(appUID); |
767 AccessControllerFactoryImpl.destroyAccessController(appUID); |
761 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
768 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
762 PermissionResolver.testClearCache(); |
769 PermissionResolver.cleanup(); |
763 grantedPermissions = new Vector(); |
770 grantedPermissions = new Vector(); |
764 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
771 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
765 "something", |
772 "something", |
766 "*", |
773 "*", |
767 "autoinvocation", |
774 "autoinvocation", |
800 assertTrue(success);*/ |
807 assertTrue(success);*/ |
801 // test parralel instances of the ui: show a security prompt, show an error, destroy the ui for error, destroy the ui for the security prompt |
808 // test parralel instances of the ui: show a security prompt, show an error, destroy the ui for error, destroy the ui for the security prompt |
802 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE); |
809 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE); |
803 AccessControllerFactoryImpl.destroyAccessController(appUID); |
810 AccessControllerFactoryImpl.destroyAccessController(appUID); |
804 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
811 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
805 PermissionResolver.testClearCache(); |
812 PermissionResolver.cleanup(); |
806 grantedPermissions = new Vector(); |
813 grantedPermissions = new Vector(); |
807 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
814 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
808 "com.nokia.mj.impl.security.midp.authorization.CommProtocolPermissionImpl", |
815 "com.nokia.mj.impl.security.midp.authorization.CommProtocolPermissionImpl", |
809 "comm://", |
816 "comm://", |
810 null, |
817 null, |
828 ui.destroy(); |
835 ui.destroy(); |
829 // check prompt for blanket |
836 // check prompt for blanket |
830 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE); |
837 GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.DEFAULT_SECURITY_MODE); |
831 AccessControllerFactoryImpl.destroyAccessController(appUID); |
838 AccessControllerFactoryImpl.destroyAccessController(appUID); |
832 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
839 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
833 PermissionResolver.testClearCache(); |
840 PermissionResolver.cleanup(); |
834 grantedPermissions = new Vector(); |
841 grantedPermissions = new Vector(); |
835 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
842 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
836 "com.nokia.mj.impl.security.midp.authorization.FileProtocolPermissionImpl", |
843 "com.nokia.mj.impl.security.midp.authorization.FileProtocolPermissionImpl", |
837 "file://*", |
844 "file://*", |
838 "read", |
845 "read", |
862 SecurityDetailedErrorMessage.CERT_DISABLED, |
869 SecurityDetailedErrorMessage.CERT_DISABLED, |
863 null); |
870 null); |
864 ui.error("myMIDlet", exc); |
871 ui.error("myMIDlet", exc); |
865 ui.destroy(); |
872 ui.destroy(); |
866 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
873 ac = AccessControllerFactoryImpl.getAccessController(appUID, appName); |
867 PermissionResolver.testClearCache(); |
874 PermissionResolver.cleanup(); |
868 grantedPermissions = new Vector(); |
875 grantedPermissions = new Vector(); |
869 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
876 grantedPermissions.addElement(new PolicyBasedPermissionImpl( |
870 "com.nokia.mj.impl.security.midp.authorization.FileProtocolPermissionImpl", |
877 "com.nokia.mj.impl.security.midp.authorization.FileProtocolPermissionImpl", |
871 "file://*", |
878 "file://*", |
872 "read", |
879 "read", |