From 9cc128c2951b2523dd12f7d36acd15ba0dcd7da6 Mon Sep 17 00:00:00 2001 From: Dennis Potman Date: Thu, 5 Mar 2020 11:12:40 +0100 Subject: [PATCH] Remove setting the tracing verbosity in tests and make configs in security core tests more consistent Signed-off-by: Dennis Potman --- src/security/core/tests/authentication.c | 1 - src/security/core/tests/config.c | 239 +++++++++++++---------- src/security/core/tests/handshake.c | 1 - src/security/core/tests/plugin_loading.c | 138 ++++++++----- 4 files changed, 226 insertions(+), 153 deletions(-) diff --git a/src/security/core/tests/authentication.c b/src/security/core/tests/authentication.c index 2d13079..afab49b 100644 --- a/src/security/core/tests/authentication.c +++ b/src/security/core/tests/authentication.c @@ -42,7 +42,6 @@ static const char *config = " 0" " \\${CYCLONEDDS_PID}" " " - " config" " " " " " " diff --git a/src/security/core/tests/config.c b/src/security/core/tests/config.c index 6bfc918..6cb404d 100644 --- a/src/security/core/tests/config.c +++ b/src/security/core/tests/config.c @@ -50,6 +50,15 @@ "file:Permissions_CA.pem", "file:Governance.p7s", "file:Permissions.p7s", \ pre_str, post_str, binprops) +static const char *default_config = + "" + " " + " ${CYCLONEDDS_PID}" + " " + " finest" + ""; + + /* * The 'found' variable will contain flags related to the expected log * messages that were received. @@ -96,8 +105,17 @@ CU_Test(ddssec_config, empty, .init = ddsrt_init, .fini = ddsrt_fini) NULL }; + const char *sec_config = + "" + " " + " ${CYCLONEDDS_PID}" + " " + " config" + " " + ""; + set_logger_exp(log_expected); - domain = dds_create_domain(0, ""); + domain = dds_create_domain(0, sec_config); CU_ASSERT_EQUAL_FATAL(domain, DDS_RETCODE_ERROR); reset_logger(); @@ -116,7 +134,7 @@ CU_Test(ddssec_config, non, .init = ddsrt_init, .fini = ddsrt_fini) }; set_logger_exp(log_expected); - domain = dds_create_domain(0, "finest"); + domain = dds_create_domain(0, default_config); CU_ASSERT_FATAL(domain > 0); dds_delete(domain); reset_logger(); @@ -139,6 +157,9 @@ CU_Test(ddssec_config, missing, .init = ddsrt_init, .fini = ddsrt_fini) /* IdentityCertificate, IdentityCA and PrivateKey values or elements are missing. */ const char *sec_config = "" + " " + " ${CYCLONEDDS_PID}" + " " " finest" " " " " @@ -190,30 +211,31 @@ CU_Test(ddssec_config, all, .init = ddsrt_init, .fini = ddsrt_fini) }; const char *sec_config = - "<"DDS_PROJECT_NAME">" - " " - " finest" - " " - " " - " " - " "TEST_IDENTITY_CERTIFICATE_DUMMY"" - " "TEST_IDENTITY_CA_CERTIFICATE_DUMMY"" - " "TEST_IDENTITY_PRIVATE_KEY_DUMMY"" - " testtext_Password_testtext" - " testtext_Dir_testtext" - " " - " " - " " - " " - " " - " " - " file:Governance.p7s" - " file:Permissions_CA.pem" - " file:Permissions.p7s" - " " - " " - " " - ""; + "" + " " + " ${CYCLONEDDS_PID}" + " " + " finest" + " " + " " + " " + " "TEST_IDENTITY_CERTIFICATE_DUMMY"" + " "TEST_IDENTITY_CA_CERTIFICATE_DUMMY"" + " "TEST_IDENTITY_PRIVATE_KEY_DUMMY"" + " testtext_Password_testtext" + " testtext_Dir_testtext" + " " + " " + " " + " " + " " + " " + " file:Governance.p7s" + " file:Permissions_CA.pem" + " file:Permissions.p7s" + " " + " " + ""; set_logger_exp(log_expected); domain = dds_create_domain(0, sec_config); @@ -261,6 +283,10 @@ CU_Test(ddssec_config, security, .init = ddsrt_init, .fini = ddsrt_fini) const char *sec_config = "" + " " + " ${CYCLONEDDS_PID}" + " " + " finest" " " " " " " @@ -278,7 +304,6 @@ CU_Test(ddssec_config, security, .init = ddsrt_init, .fini = ddsrt_fini) " file:Permissions.p7s" " " " " - " finest" ""; set_logger_exp(log_expected); @@ -325,30 +350,31 @@ CU_Test(ddssec_config, deprecated, .init = ddsrt_init, .fini = ddsrt_fini) }; const char *sec_config = - "<"DDS_PROJECT_NAME">" - " " - " " - " " - " " - " "TEST_IDENTITY_CERTIFICATE_DUMMY"" - " "TEST_IDENTITY_CA_CERTIFICATE_DUMMY"" - " "TEST_IDENTITY_PRIVATE_KEY_DUMMY"" - " testtext_Password_testtext" - " testtext_Dir_testtext" - " " - " " - " " - " " - " " - " " - " file:Governance.p7s" - " file:Permissions_CA.pem" - " file:Permissions.p7s" - " " - " " - " finest" - " " - ""; + "" + " " + " ${CYCLONEDDS_PID}" + " " + " finest" + " " + " " + " " + " "TEST_IDENTITY_CERTIFICATE_DUMMY"" + " "TEST_IDENTITY_CA_CERTIFICATE_DUMMY"" + " "TEST_IDENTITY_PRIVATE_KEY_DUMMY"" + " testtext_Password_testtext" + " testtext_Dir_testtext" + " " + " " + " " + " " + " " + " " + " file:Governance.p7s" + " file:Permissions_CA.pem" + " file:Permissions.p7s" + " " + " " + ""; set_logger_exp(log_expected); domain = dds_create_domain(0, sec_config); @@ -395,7 +421,7 @@ CU_Test(ddssec_config, qos, .init = ddsrt_init, .fini = ddsrt_fini) dds_qset_prop(qos, "dds.sec.auth.trusted_ca_dir", "file:/test/dir"); set_logger_exp(log_expected); - domain = dds_create_domain(0, "finest"); + domain = dds_create_domain(0, default_config); CU_ASSERT_FATAL(domain > 0); participant = dds_create_participant(0, qos, NULL); CU_ASSERT_FATAL(participant > 0); @@ -445,7 +471,7 @@ CU_Test(ddssec_config, qos_props, .init = ddsrt_init, .fini = ddsrt_fini) dds_qset_bprop(qos, "test.bprop1", bvalue, 3); set_logger_exp(log_expected); - domain = dds_create_domain(0, "finest"); + domain = dds_create_domain(0, default_config); CU_ASSERT_FATAL(domain > 0); participant = dds_create_participant(0, qos, NULL); CU_ASSERT_FATAL(participant > 0); @@ -475,19 +501,24 @@ CU_Test(ddssec_config, config_qos, .init = ddsrt_init, .fini = ddsrt_fini) }; const char *sec_config = - "finest" - "" - " " - " "TEST_IDENTITY_CERTIFICATE_DUMMY"" - " "TEST_IDENTITY_CA_CERTIFICATE_DUMMY"" - " "TEST_IDENTITY_PRIVATE_KEY_DUMMY"" - " " - " " - " file:Governance.p7s" - " file:Permissions_CA.pem" - " file:Permissions.p7s" - " " - ""; + "" + " " + " ${CYCLONEDDS_PID}" + " " + " finest" + " " + " " + " "TEST_IDENTITY_CERTIFICATE_DUMMY"" + " "TEST_IDENTITY_CA_CERTIFICATE_DUMMY"" + " "TEST_IDENTITY_PRIVATE_KEY_DUMMY"" + " " + " " + " file:Governance.p7s" + " file:Permissions_CA.pem" + " file:Permissions.p7s" + " " + " " + ""; CU_ASSERT_FATAL((qos = dds_create_qos()) != NULL); dds_qset_prop(qos, DDS_SEC_PROP_AUTH_LIBRARY_PATH, WRAPPERLIB_PATH("dds_security_authentication_wrapper")); @@ -533,26 +564,31 @@ CU_Test(ddssec_config, other_prop, .init = ddsrt_init, .fini = ddsrt_fini) }; const char *sec_config = - "finest" - "" - " " - " " - " "TEST_IDENTITY_CERTIFICATE_DUMMY"" - " "TEST_IDENTITY_CA_CERTIFICATE_DUMMY"" - " "TEST_IDENTITY_PRIVATE_KEY_DUMMY"" - " testtext_Password_testtext" - " testtext_Dir_testtext" - " " - " " - " " - " " - " " - " " - " file:Governance.p7s" - " file:Permissions_CA.pem" - " file:Permissions.p7s" - " " - ""; + "" + " " + " ${CYCLONEDDS_PID}" + " " + " finest" + " " + " " + " " + " "TEST_IDENTITY_CERTIFICATE_DUMMY"" + " "TEST_IDENTITY_CA_CERTIFICATE_DUMMY"" + " "TEST_IDENTITY_PRIVATE_KEY_DUMMY"" + " testtext_Password_testtext" + " testtext_Dir_testtext" + " " + " " + " " + " " + " " + " " + " file:Governance.p7s" + " file:Permissions_CA.pem" + " file:Permissions.p7s" + " " + " " + ""; CU_ASSERT_FATAL((qos = dds_create_qos()) != NULL); dds_qset_prop(qos, "test.dds.sec.prop1", "testtext_value1_testtext"); @@ -598,19 +634,24 @@ CU_Test(ddssec_config, qos_invalid, .init = ddsrt_init, .fini = ddsrt_fini) }; const char *sec_config = - "finest" - "" - " " - " "TEST_IDENTITY_CERTIFICATE_DUMMY"" - " "TEST_IDENTITY_CA_CERTIFICATE_DUMMY"" - " "TEST_IDENTITY_PRIVATE_KEY_DUMMY"" - " " - " " - " file:Governance.p7s" - " file:Permissions_CA.pem" - " file:Permissions.p7s" - " " - ""; + "" + " " + " ${CYCLONEDDS_PID}" + " " + " finest" + " " + " " + " "TEST_IDENTITY_CERTIFICATE_DUMMY"" + " "TEST_IDENTITY_CA_CERTIFICATE_DUMMY"" + " "TEST_IDENTITY_PRIVATE_KEY_DUMMY"" + " " + " " + " file:Governance.p7s" + " file:Permissions_CA.pem" + " file:Permissions.p7s" + " " + " " + ""; set_logger_exp(log_expected); diff --git a/src/security/core/tests/handshake.c b/src/security/core/tests/handshake.c index 0408bb9..5534434 100644 --- a/src/security/core/tests/handshake.c +++ b/src/security/core/tests/handshake.c @@ -40,7 +40,6 @@ static const char *config = " 0" " \\${CYCLONEDDS_PID}" " " - " config" " " " " " " diff --git a/src/security/core/tests/plugin_loading.c b/src/security/core/tests/plugin_loading.c index f6aa141..8e09cc5 100644 --- a/src/security/core/tests/plugin_loading.c +++ b/src/security/core/tests/plugin_loading.c @@ -24,6 +24,14 @@ static uint32_t found; +static const char *default_config = + "" + " " + " ${CYCLONEDDS_PID}" + " " + " finest" + ""; + static void logger(void *ptr, const dds_log_data_t *data) { char **expected = (char **)ptr; @@ -60,6 +68,9 @@ CU_Test(ddssec_security_plugin_loading, all_ok, .init = ddsrt_init, .fini = ddsr const char *sec_config = "" + " " + " ${CYCLONEDDS_PID}" + " " " finest" " " " " @@ -75,9 +86,9 @@ CU_Test(ddssec_security_plugin_loading, all_ok, .init = ddsrt_init, .fini = ddsr " " " " " " - " file:Governance.p7s" - " file:Permissions_CA.pem" - " file:Permissions.p7s" + " " + " " + " " " " " " ""; @@ -104,7 +115,10 @@ CU_Test(ddssec_security_plugin_loading, missing_finalize, .init = ddsrt_init, .f const char *sec_config = "" - " finest" + " " + " ${CYCLONEDDS_PID}" + " " + " warning" " " " " " " @@ -119,9 +133,9 @@ CU_Test(ddssec_security_plugin_loading, missing_finalize, .init = ddsrt_init, .f " " " " " " - " file:Governance.p7s" - " file:Permissions_CA.pem" - " file:Permissions.p7s" + " " + " " + " " " " " " ""; @@ -147,7 +161,10 @@ CU_Test(ddssec_security_plugin_loading, authentication_missing_function, .init = const char *sec_config = "" - " finest" + " " + " ${CYCLONEDDS_PID}" + " " + " warning" " " " " " " @@ -162,9 +179,9 @@ CU_Test(ddssec_security_plugin_loading, authentication_missing_function, .init = " " " " " " - " file:Governance.p7s" - " file:Permissions_CA.pem" - " file:Permissions.p7s" + " " + " " + " " " " " " ""; @@ -190,7 +207,10 @@ CU_Test(ddssec_security_plugin_loading, access_control_missing_function, .init = const char *sec_config = "" - " finest" + " " + " ${CYCLONEDDS_PID}" + " " + " warning" " " " " " " @@ -205,9 +225,9 @@ CU_Test(ddssec_security_plugin_loading, access_control_missing_function, .init = " " " " " " - " file:Governance.p7s" - " file:Permissions_CA.pem" - " file:Permissions.p7s" + " " + " " + " " " " " " ""; @@ -233,7 +253,10 @@ CU_Test(ddssec_security_plugin_loading, cryptography_missing_function, .init = d const char *sec_config = "" - " finest" + " " + " ${CYCLONEDDS_PID}" + " " + " warning" " " " " " " @@ -248,9 +271,9 @@ CU_Test(ddssec_security_plugin_loading, cryptography_missing_function, .init = d " " " " " " - " file:Governance.p7s" - " file:Permissions_CA.pem" - " file:Permissions.p7s" + " " + " " + " " " " " " ""; @@ -279,7 +302,10 @@ CU_Test(ddssec_security_plugin_loading, no_library_in_path, .init = ddsrt_init, const char *sec_config = "" - " finest" + " " + " ${CYCLONEDDS_PID}" + " " + " warning" " " " " " " @@ -294,9 +320,9 @@ CU_Test(ddssec_security_plugin_loading, no_library_in_path, .init = ddsrt_init, " " " " " " - " file:Governance.p7s" - " file:Permissions_CA.pem" - " file:Permissions.p7s" + " " + " " + " " " " " " ""; @@ -323,7 +349,10 @@ CU_Test(ddssec_security_plugin_loading, init_error, .init = ddsrt_init, .fini = const char *sec_config = "" - " finest" + " " + " ${CYCLONEDDS_PID}" + " " + " warning" " " " " " " @@ -338,9 +367,9 @@ CU_Test(ddssec_security_plugin_loading, init_error, .init = ddsrt_init, .fini = " " " " " " - " file:Governance.p7s" - " file:Permissions_CA.pem" - " file:Permissions.p7s" + " " + " " + " " " " " " ""; @@ -370,9 +399,9 @@ CU_Test(ddssec_security_plugin_loading, all_ok_with_props, .init = ddsrt_init, . dds_qset_prop(qos, DDS_SEC_PROP_AUTH_IDENTITY_CA, "testtext_IdentityCA_testtext"); dds_qset_prop(qos, DDS_SEC_PROP_AUTH_PRIV_KEY, "testtext_PrivateKey_testtext"); dds_qset_prop(qos, DDS_SEC_PROP_AUTH_IDENTITY_CERT, "testtext_IdentityCertificate_testtext"); - dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_PERMISSIONS_CA, "file:Permissions_CA.pem"); - dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_GOVERNANCE, "file:Governance.p7s"); - dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_PERMISSIONS, "file:Permissions.p7s"); + dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_PERMISSIONS_CA, "file:"); + dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_GOVERNANCE, "file:"); + dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_PERMISSIONS, "file:"); dds_qset_prop(qos, DDS_SEC_PROP_AUTH_PASSWORD, "testtext_Password_testtext"); dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_TRUSTED_CA_DIR, "file:/test/dir"); @@ -391,7 +420,7 @@ CU_Test(ddssec_security_plugin_loading, all_ok_with_props, .init = ddsrt_init, . dds_qset_bprop(qos, "test.bprop1", bvalue, 3); set_logger_exp(log_expected); - domain = dds_create_domain(0, "finest"); + domain = dds_create_domain(0, default_config); CU_ASSERT_FATAL(domain > 0); participant = dds_create_participant(0, qos, NULL); CU_ASSERT_FATAL(participant > 0); @@ -418,9 +447,9 @@ CU_Test(ddssec_security_plugin_loading, missing_plugin_property_with_props, .ini dds_qset_prop(qos, DDS_SEC_PROP_AUTH_IDENTITY_CA, "testtext_IdentityCA_testtext"); dds_qset_prop(qos, DDS_SEC_PROP_AUTH_PRIV_KEY, "testtext_PrivateKey_testtext"); dds_qset_prop(qos, DDS_SEC_PROP_AUTH_IDENTITY_CERT, "testtext_IdentityCertificate_testtext"); - dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_PERMISSIONS_CA, "file:Permissions_CA.pem"); - dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_GOVERNANCE, "file:Governance.p7s"); - dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_PERMISSIONS, "file:Permissions.p7s"); + dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_PERMISSIONS_CA, "file:"); + dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_GOVERNANCE, "file:"); + dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_PERMISSIONS, "file:"); dds_qset_prop(qos, DDS_SEC_PROP_AUTH_PASSWORD, "testtext_Password_testtext"); dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_TRUSTED_CA_DIR, "file:/test/dir"); @@ -439,7 +468,7 @@ CU_Test(ddssec_security_plugin_loading, missing_plugin_property_with_props, .ini dds_qset_bprop(qos, "test.bprop1", bvalue, 3); set_logger_exp(log_expected); - domain = dds_create_domain(0, "finest"); + domain = dds_create_domain(0, default_config); CU_ASSERT_FATAL(domain > 0); participant = dds_create_participant(0, qos, NULL); CU_ASSERT_EQUAL_FATAL(participant, DDS_RETCODE_ERROR); @@ -466,8 +495,8 @@ CU_Test(ddssec_security_plugin_loading, empty_plugin_property_with_props, .init dds_qset_prop(qos, DDS_SEC_PROP_AUTH_PRIV_KEY, "testtext_PrivateKey_testtext"); dds_qset_prop(qos, DDS_SEC_PROP_AUTH_IDENTITY_CERT, "testtext_IdentityCertificate_testtext"); dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_PERMISSIONS_CA, "file:Permissions_CA.pem"); - dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_GOVERNANCE, "file:Governance.p7s"); - dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_PERMISSIONS, "file:Permissions.p7s"); + dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_GOVERNANCE, "file:"); + dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_PERMISSIONS, "file:"); dds_qset_prop(qos, DDS_SEC_PROP_AUTH_PASSWORD, "testtext_Password_testtext"); dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_TRUSTED_CA_DIR, "file:/test/dir"); @@ -486,7 +515,7 @@ CU_Test(ddssec_security_plugin_loading, empty_plugin_property_with_props, .init dds_qset_bprop(qos, "test.bprop1", bvalue, 3); set_logger_exp(log_expected); - domain = dds_create_domain(0, "finest"); + domain = dds_create_domain(0, default_config); CU_ASSERT_FATAL(domain > 0); participant = dds_create_participant(DDS_DOMAIN_DEFAULT, qos, NULL); CU_ASSERT_EQUAL_FATAL(participant, DDS_RETCODE_ERROR); @@ -512,10 +541,9 @@ CU_Test(ddssec_security_plugin_loading, missing_security_property_with_props, .i dds_qset_prop(qos, DDS_SEC_PROP_AUTH_IDENTITY_CA, "testtext_IdentityCA_testtext"); dds_qset_prop(qos, DDS_SEC_PROP_AUTH_PRIV_KEY, "testtext_PrivateKey_testtext"); dds_qset_prop(qos, DDS_SEC_PROP_AUTH_IDENTITY_CERT, "testtext_IdentityCertificate_testtext"); - dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_PERMISSIONS_CA, "file:Permissions_CA.pem"); - dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_GOVERNANCE, "file:Governance.p7s"); - /* we ignore permissions for testing - //dds_qset_prop (qos, DDS_SEC_PROP_ACCESS_PERMISSIONS, "file:Permissions.p7s"); */ + dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_PERMISSIONS_CA, "file:"); + dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_GOVERNANCE, "file:"); + //dds_qset_prop (qos, DDS_SEC_PROP_ACCESS_PERMISSIONS, "file:"); dds_qset_prop(qos, DDS_SEC_PROP_AUTH_PASSWORD, "testtext_Password_testtext"); dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_TRUSTED_CA_DIR, "file:/test/dir"); @@ -534,7 +562,7 @@ CU_Test(ddssec_security_plugin_loading, missing_security_property_with_props, .i dds_qset_bprop(qos, "test.bprop1", bvalue, 3); set_logger_exp(log_expected); - domain = dds_create_domain(0, "finest"); + domain = dds_create_domain(0, default_config); CU_ASSERT_FATAL(domain > 0); participant = dds_create_participant(DDS_DOMAIN_DEFAULT, qos, NULL); CU_ASSERT_EQUAL_FATAL(participant, DDS_RETCODE_ERROR); @@ -558,6 +586,9 @@ CU_Test(ddssec_security_plugin_loading, multiple_domains_different_config, .init const char *sec_config = "" + " " + " ${CYCLONEDDS_PID}" + " " " finest" " " " " @@ -573,14 +604,17 @@ CU_Test(ddssec_security_plugin_loading, multiple_domains_different_config, .init " " " " " " - " file:Governance.p7s" - " file:Permissions_CA.pem" - " file:Permissions.p7s" + " " + " " + " " " " " " "" "" " finest" + " " + " ${CYCLONEDDS_PID}" + " " " " " " " " @@ -595,9 +629,9 @@ CU_Test(ddssec_security_plugin_loading, multiple_domains_different_config, .init " " " " " " - " file:Governance.p7s" - " file:Permissions_CA.pem" - " file:Permissions.p7s" + " " + " " + " " " " " " ""; @@ -614,9 +648,9 @@ CU_Test(ddssec_security_plugin_loading, multiple_domains_different_config, .init dds_qset_prop(qos, DDS_SEC_PROP_AUTH_IDENTITY_CA, "testtext_IdentityCA_testtext"); dds_qset_prop(qos, DDS_SEC_PROP_AUTH_PRIV_KEY, "testtext_PrivateKey_testtext"); dds_qset_prop(qos, DDS_SEC_PROP_AUTH_IDENTITY_CERT, "testtext_IdentityCertificate_testtext"); - dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_PERMISSIONS_CA, "file:Permissions_CA.pem"); - dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_GOVERNANCE, "file:Governance.p7s"); - dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_PERMISSIONS, "file:Permissions.p7s"); + dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_PERMISSIONS_CA, "file:"); + dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_GOVERNANCE, "file:"); + dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_PERMISSIONS, "file:"); dds_qset_prop(qos, DDS_SEC_PROP_AUTH_PASSWORD, "testtext_Password_testtext"); dds_qset_prop(qos, DDS_SEC_PROP_ACCESS_TRUSTED_CA_DIR, "file:/test/dir");