javacommons/security/tsrc/javasrc/com/nokia/mj/impl/security/midp/authorization/InteractiveAccessControllerTests.java
branchRCL_3
changeset 71 d5e927d5853b
parent 66 2455ef1f5bbc
child 83 26b2b12093af
equal deleted inserted replaced
66:2455ef1f5bbc 71:d5e927d5853b
   624         permissionGranter.grantJadPermissions(appUID, null, securityAttributes.getPermissionAttributes(), credentials);
   624         permissionGranter.grantJadPermissions(appUID, null, securityAttributes.getPermissionAttributes(), credentials);
   625         allAttributes.clear();
   625         allAttributes.clear();
   626         allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2));
   626         allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2));
   627         allAttributes.put(com.nokia.mj.impl.security.midp.common.PermissionAttribute.MANDATORY_LEGACY_ATTRIBUTE_NAME, new Attribute("","javax.microedition.io.Connector.socket,javax.microedition.io.Connector.http"));
   627         allAttributes.put(com.nokia.mj.impl.security.midp.common.PermissionAttribute.MANDATORY_LEGACY_ATTRIBUTE_NAME, new Attribute("","javax.microedition.io.Connector.socket,javax.microedition.io.Connector.http"));
   628         securityAttributes.addManifestAttributes(allAttributes);
   628         securityAttributes.addManifestAttributes(allAttributes);
   629         authenticationModule.authenticateJar(session, appUID,null,TEST_DATA_DIR + "security_tmp" +  System.getProperty("file.separator") + "HelloWorld.jar", false);
   629         credentials = authenticationModule.authenticateJar(appUID,null,TEST_DATA_DIR + "security_tmp" +  System.getProperty("file.separator") + "HelloWorld.jar", false);
   630         permissionGranter.grantJarPermissions(session, appUID, null, securityAttributes.getPermissionAttributes());
   630         authenticationModule.addSecurityData(session, appUID, null);
       
   631         permissionGranter.grantJarPermissions( appUID, null, securityAttributes.getPermissionAttributes(), credentials);
       
   632         permissionGranter.addSecurityData(session, appUID, null);
   631         permissionGranter.getBlanketPermissions(appUID);
   633         permissionGranter.getBlanketPermissions(appUID);
   632         ac.checkPermission(new HttpProtocolPermissionImpl("http://", "\n(choose ALLOW)"));
   634         ac.checkPermission(new HttpProtocolPermissionImpl("http://", "\n(choose ALLOW)"));
   633         ac.checkPermission(new HttpProtocolPermissionImpl("http://", "\n(IF YOU SEE THIS PROMPT THE TEST FAILED)"));
   635         ac.checkPermission(new HttpProtocolPermissionImpl("http://", "\n(IF YOU SEE THIS PROMPT THE TEST FAILED)"));
   634         boolean blanketPromptShown = storage.readUserSecuritySettingsPromptFlag(appUID, "Net Access");
   636         boolean blanketPromptShown = storage.readUserSecuritySettingsPromptFlag(appUID, "Net Access");
   635         assertTrue(blanketPromptShown);
   637         assertTrue(blanketPromptShown);
   657         permissionGranter.grantJadPermissions(appUID, null, securityAttributes.getPermissionAttributes(), credentials);
   659         permissionGranter.grantJadPermissions(appUID, null, securityAttributes.getPermissionAttributes(), credentials);
   658         allAttributes.clear();
   660         allAttributes.clear();
   659         allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2));
   661         allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2));
   660         allAttributes.put(com.nokia.mj.impl.security.midp.common.PermissionAttribute.MANDATORY_LEGACY_ATTRIBUTE_NAME, new Attribute("","javax.microedition.io.Connector.socket,javax.microedition.io.Connector.http"));
   662         allAttributes.put(com.nokia.mj.impl.security.midp.common.PermissionAttribute.MANDATORY_LEGACY_ATTRIBUTE_NAME, new Attribute("","javax.microedition.io.Connector.socket,javax.microedition.io.Connector.http"));
   661         securityAttributes.addManifestAttributes(allAttributes);
   663         securityAttributes.addManifestAttributes(allAttributes);
   662         authenticationModule.authenticateJar(session, appUID,appUID,TEST_DATA_DIR + "security_tmp" +  System.getProperty("file.separator") + "HelloWorld.jar", false);
   664         credentials = authenticationModule.authenticateJar(appUID,appUID,TEST_DATA_DIR + "security_tmp" +  System.getProperty("file.separator") + "HelloWorld.jar", false);
   663         permissionGranter.grantJarPermissions(session, appUID, appUID, securityAttributes.getPermissionAttributes());
   665         authenticationModule.addSecurityData(session, appUID, appUID);
       
   666         permissionGranter.grantJarPermissions( appUID, appUID, securityAttributes.getPermissionAttributes(), credentials);
       
   667         permissionGranter.addSecurityData(session, appUID, appUID);
   664         blanketPromptShown = storage.readUserSecuritySettingsPromptFlag(appUID, "Net Access");
   668         blanketPromptShown = storage.readUserSecuritySettingsPromptFlag(appUID, "Net Access");
   665         ac.checkPermission(new HttpProtocolPermissionImpl("http://", "\n(IF YOU SEE THIS PROMPT THE TEST FAILED)"));
   669         ac.checkPermission(new HttpProtocolPermissionImpl("http://", "\n(IF YOU SEE THIS PROMPT THE TEST FAILED)"));
   666         storage.removeAuthenticationStorageData(appUID);
   670         storage.removeAuthenticationStorageData(appUID);
   667         permissionGranter.removeSecurityData(session,appUID);
   671         permissionGranter.removeSecurityData(session,appUID);
   668         PermissionResolver.testClearCache();
   672         PermissionResolver.testClearCache();
   685         permissionGranter.grantJadPermissions(appUID, null, securityAttributes.getPermissionAttributes(), credentials);
   689         permissionGranter.grantJadPermissions(appUID, null, securityAttributes.getPermissionAttributes(), credentials);
   686         allAttributes.clear();
   690         allAttributes.clear();
   687         allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2));
   691         allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2));
   688         allAttributes.put(com.nokia.mj.impl.security.midp.common.PermissionAttribute.MANDATORY_LEGACY_ATTRIBUTE_NAME, new Attribute("","javax.microedition.io.Connector.socket,javax.microedition.io.Connector.http"));
   692         allAttributes.put(com.nokia.mj.impl.security.midp.common.PermissionAttribute.MANDATORY_LEGACY_ATTRIBUTE_NAME, new Attribute("","javax.microedition.io.Connector.socket,javax.microedition.io.Connector.http"));
   689         securityAttributes.addManifestAttributes(allAttributes);
   693         securityAttributes.addManifestAttributes(allAttributes);
   690         authenticationModule.authenticateJar(session, appUID,null,TEST_DATA_DIR + "security_tmp" + System.getProperty("file.separator") + "HelloWorld.jar", false);
   694         credentials = authenticationModule.authenticateJar(appUID,null,TEST_DATA_DIR + "security_tmp" + System.getProperty("file.separator") + "HelloWorld.jar", false);
   691         permissionGranter.grantJarPermissions(session, appUID, null, securityAttributes.getPermissionAttributes());
   695         authenticationModule.addSecurityData(session, appUID, null);
       
   696         permissionGranter.grantJarPermissions( appUID, null, securityAttributes.getPermissionAttributes(), credentials);
       
   697         permissionGranter.addSecurityData(session, appUID, null);
   692         signingCerts = authenticationModule.getCertificatesDetails(session, appUID);
   698         signingCerts = authenticationModule.getCertificatesDetails(session, appUID);
   693         assertTrue(signingCerts != null
   699         assertTrue(signingCerts != null
   694                    && signingCerts.length == 1
   700                    && signingCerts.length == 1
   695                    && signingCerts[0].getIssuer() != null
   701                    && signingCerts[0].getIssuer() != null
   696                    && signingCerts[0].getDateNotAfter() != null
   702                    && signingCerts[0].getDateNotAfter() != null
   723         credentials = authenticationModule.authenticateJad(appUID,null,securityAttributes.getAuthenticationAttributes());
   729         credentials = authenticationModule.authenticateJad(appUID,null,securityAttributes.getAuthenticationAttributes());
   724         permissionGranter.grantJadPermissions(appUID, null, securityAttributes.getPermissionAttributes(), credentials);
   730         permissionGranter.grantJadPermissions(appUID, null, securityAttributes.getPermissionAttributes(), credentials);
   725         allAttributes.clear();
   731         allAttributes.clear();
   726         allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2));
   732         allAttributes.put(MIDP_PROFILE_ATTRIBUTE_NAME,new Attribute("",MIDP2));
   727         securityAttributes.addManifestAttributes(allAttributes);
   733         securityAttributes.addManifestAttributes(allAttributes);
   728         authenticationModule.authenticateJar(session, appUID,null,TEST_DATA_DIR + "security_tmp" + System.getProperty("file.separator") + "HelloWorld.jar", false);
   734         credentials = authenticationModule.authenticateJar(appUID,null,TEST_DATA_DIR + "security_tmp" + System.getProperty("file.separator") + "HelloWorld.jar", false);
   729         permissionGranter.grantJarPermissions(session, appUID, null, securityAttributes.getPermissionAttributes());
   735         authenticationModule.addSecurityData(session, appUID, null);
       
   736         permissionGranter.grantJarPermissions( appUID, null, securityAttributes.getPermissionAttributes(), credentials);
       
   737         permissionGranter.addSecurityData(session, appUID, null);
   730         signingCerts = authenticationModule.getCertificatesDetails(session, appUID);
   738         signingCerts = authenticationModule.getCertificatesDetails(session, appUID);
   731         assertTrue(signingCerts == null);
   739         assertTrue(signingCerts == null);
   732         ac.checkPermission(new HttpProtocolPermissionImpl("http://url", "\n(choose ALLOW)"));
   740         ac.checkPermission(new HttpProtocolPermissionImpl("http://url", "\n(choose ALLOW)"));
   733         ac.checkPermission(new HttpsProtocolPermissionImpl("https://url1", "\n(IF YOU SEE THIS PROMPT THE TEST FAILED"));
   741         ac.checkPermission(new HttpsProtocolPermissionImpl("https://url1", "\n(IF YOU SEE THIS PROMPT THE TEST FAILED"));
   734         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE);
   742         GeneralSecuritySettings.setSecurityWarningsMode(session, appUID, GeneralSecuritySettings.USER_SECURITY_MODE);