version 1.19, 2008/09/18 03:02:50 |
version 1.25, 2009/06/11 21:41:31 |
|
|
#!/usr/bin/perl -T |
#!/usr/bin/perl -T |
# $RedRiver: keyring.t,v 1.18 2008/09/18 01:53:27 andrew Exp $ |
# $RedRiver: keyring.t,v 1.24 2008/09/19 05:53:08 andrew Exp $ |
use strict; |
use strict; |
use warnings; |
use warnings; |
|
|
use Test::More tests => 52; |
use Test::More tests => 321; |
use Data::Dumper; |
use Data::Dumper; |
|
|
BEGIN { |
BEGIN { |
|
|
}, |
}, |
}; |
}; |
|
|
|
my %unchanging_date = %{ $acct->{3}->{data} }; |
|
|
|
my $bad_version = 999; |
|
|
|
my $bad_cipher = 999; |
|
my %crypt_1_details = ( |
|
'default_iter' => 1000, |
|
'keylen' => 24, |
|
'blocksize' => 8, |
|
'name' => 'DES_EDE3', |
|
'alias' => 'DES-EDE3', |
|
'DES_odd_parity' => 1 |
|
); |
|
|
|
my $bad_label = 999; |
|
my $bad_label_name = 'not_a_label_name'; |
|
my %label_1_details = ( |
|
id => 1, |
|
name => 'account', |
|
); |
|
my %label_not_found_details = ( |
|
id => $bad_label, |
|
name => undef, |
|
); |
|
|
|
# Crypts |
|
is_deeply( Palm::Keyring::crypts(1), \%crypt_1_details, 'Got crypt 1' ); |
|
is_deeply( Palm::Keyring::crypts('DES-EDE3'), |
|
\%crypt_1_details, 'Got crypt DES-EDE3' ); |
|
is( Palm::Keyring::crypts(), undef, "Didn't get crypt empty cipher" ); |
|
is( Palm::Keyring::crypts($bad_cipher), |
|
undef, "Didn't get crypt $bad_cipher" ); |
|
|
|
# Bad Cipher |
|
eval { Palm::Keyring->new( { version => 5, cipher => $bad_cipher } ) }; |
|
like( |
|
$@, |
|
qr/^Unknown \s cipher \s $bad_cipher/xms, |
|
"Failed to create keyring with cipher $bad_cipher" |
|
); |
|
|
|
# Labels |
|
is_deeply( Palm::Keyring::labels(1), \%label_1_details, 'Got label 1' ); |
|
is_deeply( Palm::Keyring::labels('account'), |
|
\%label_1_details, 'Got label account' ); |
|
is( Palm::Keyring::labels(), undef, "Didn't get label empty label" ); |
|
is_deeply( Palm::Keyring::labels($bad_label), |
|
\%label_not_found_details, "Got default label for $bad_label" ); |
|
is( Palm::Keyring::labels($bad_label_name), undef, "Didn't get label for $bad_label_name" |
|
); |
|
|
|
# encrypt/decrypt (v4) |
|
my %acctv4 = ( |
|
account => 'account name', |
|
password => $password, |
|
notes => 'these are notes', |
|
lastchange => undef, |
|
); |
|
|
|
my $digestv4; |
|
ok( $digestv4 = Palm::Keyring::_calc_keys( $password ), '_calc_keys' ); |
|
|
|
my $encryptedv4; |
|
ok( $encryptedv4 = Palm::Keyring::_encrypt_v4( \%acctv4, {}, $digestv4 ), |
|
'_encrypt_v4'); |
|
|
|
my $plaintextv4; |
|
ok( $plaintextv4 = Palm::Keyring::_decrypt_v4( $encryptedv4, $digestv4 ), |
|
'_decrypt_v4'); |
|
|
|
$plaintextv4->{lastchange} = undef; |
|
is_deeply( $plaintextv4, \%acctv4, 'Is what we got back, what we sent in?' ); |
|
|
|
my $NULL = chr(0); |
|
$plaintextv4 = join $NULL, $acctv4{account}, $acctv4{password}, $acctv4{notes}; |
|
|
|
ok( $encryptedv4 = Palm::Keyring::_crypt3des( $plaintextv4, $digestv4, 1 ), |
|
'encrypt without date' ); # 1 is encrypt |
|
|
|
ok( $plaintextv4 = Palm::Keyring::_decrypt_v4( $encryptedv4, $digestv4 ), |
|
'_decrypt_v4'); |
|
|
|
$plaintextv4->{'lastchange'} = undef; |
|
is_deeply( $plaintextv4, \%acctv4, 'Is what we got back, what we sent in?' ); |
|
|
|
# Password |
|
|
|
eval{ Palm::Keyring::_password_verify_v4() }; |
|
like( |
|
$@, |
|
qr/^No \s password \s specified!/xms, |
|
'_password_verify_v4 with no password' |
|
); |
|
|
|
eval{ Palm::Keyring::_password_verify_v4($password) }; |
|
like( |
|
$@, |
|
qr/^No \s encrypted \s password!/xms, |
|
'_password_verify_v4 with no password' |
|
); |
|
|
|
my $pdb; |
|
|
|
eval { $pdb = new Palm::Keyring( -file => 't/Keys-invalid_version.pdb' ) }; |
|
like( |
|
$@, |
|
qr/^Unsupported \s Version \s $bad_version/xms, |
|
'Couldn\'t load pdb with invalid version' |
|
); |
|
|
|
eval { $pdb = new Palm::Keyring( -file => 't/Keys-invalid_cipher.pdb' ) }; |
|
like( |
|
$@, |
|
qr/^Unknown \s cipher \s $bad_version/xms, |
|
'Couldn\'t load pdb with Unknown Cipher' |
|
); |
|
|
|
eval { $pdb = new Palm::Keyring( -file => 't/Keys-invalid_appinfo.pdb' ) }; |
|
like( |
|
$@, |
|
qr/^Corrupt \s appinfo\? \s no \s {other}/xms, |
|
'Couldn\'t load pdb with invalid appinfo' |
|
); |
|
|
|
eval{ $pdb = new Palm::Keyring( -file => 't/Keys-no_data.pdb', -password => |
|
$new_password ) }; |
|
like( |
|
$@, |
|
qr/^Invalid \s Password/xms, |
|
'Couldn\'t load Palm::Keyring file with no data and wrong password' |
|
); |
|
|
|
ok( $pdb = new Palm::Keyring( -file => 't/Keys-no_data.pdb' ), |
|
'Loaded Palm::Keyring file with no data' ); |
|
|
|
my $record; |
|
ok( $record = $pdb->append_Record(), 'Append Record' ); |
|
my $ivec = pack("C*", 1..8); |
|
ok( $pdb->Encrypt( $record, $password, $acct, $ivec), |
|
'Encrypt account into record (with custom ivec)' ); |
|
|
|
$acct->{254} = { |
|
label => 'misc', |
|
label_id => 254, |
|
data => 'This doesn\'t even really exist', |
|
font => 0, |
|
}; |
|
ok( $pdb->Encrypt( $record, $password, $acct ), |
|
'Encrypt account into record (with custom field)' ); |
|
|
|
delete $acct->{254}; |
|
|
|
|
|
delete $record->{plaintext}; |
|
|
|
ok( $pdb->PackRecord($record), 'Pack Proper Record'); |
|
ok( $record = $pdb->ParseRecord(%{ $record }), 'Parse Proper Packed'); |
|
|
|
my $record2; |
|
ok( $record2 = $pdb->append_Record(), 'Append Record' ); |
|
eval{ $pdb->PackRecord($record2) }; |
|
like( |
|
$@, |
|
qr/^No \s encrypted \s data \s in \s record/xms, |
|
'Pack Empty Record' |
|
); |
|
|
|
$pdb->{appinfo}->{cipher} = 'TESTING'; |
|
|
|
eval{ $pdb->Decrypt( $record ) }; |
|
like( |
|
$@, |
|
qr/^Unsupported \s Crypt \s Testing \s in \s decrypt/xms, |
|
'Couldn\'t Decrypt with unsupported Crypt' |
|
); |
|
|
|
my $encrypted = delete $record->{encrypted}; |
|
eval{ $pdb->Encrypt( $record ) }; |
|
like( |
|
$@, |
|
qr/^Unsupported \s Crypt \s Testing \s in \s encrypt/xms, |
|
'Couldn\'t Encrypt with unsupported Crypt' |
|
); |
|
$record->{encrypted} = $encrypted; |
|
|
|
$pdb->{appinfo}->{cipher} = $bad_cipher; |
|
eval{ $pdb->Decrypt( $record ) }; |
|
like( |
|
$@, |
|
qr/^Unknown \s cipher \s $bad_cipher \s in \s decrypt/xms, |
|
'Couldn\'t Decrypt with unsupported cipher' |
|
); |
|
|
|
$encrypted = delete $record->{encrypted}; |
|
eval{ $pdb->Encrypt( $record ) }; |
|
like( |
|
$@, |
|
qr/^Unknown \s cipher \s $bad_cipher \s in \s encrypt/xms, |
|
'Couldn\'t Encrypt with unsupported cipher' |
|
); |
|
$record->{encrypted} = $encrypted; |
|
|
|
|
|
$record2->{encrypted} = {}; |
|
delete $record2->{ivec}; |
|
eval{ $pdb->PackRecord($record2) }; |
|
like( |
|
$@, |
|
qr/^No \s ivec/xms, |
|
'Pack Empty Record with encrypted, but no ivec' |
|
); |
|
|
|
|
|
|
|
$pdb->{version} = 4; |
|
delete $record2->{encrypted}; |
|
delete $record2->{data}; |
|
eval{ $pdb->PackRecord($record2) }; |
|
like( |
|
$@, |
|
qr/^No \s data \s to \s PackRecord/xms, |
|
'Pack Empty Record with no data' |
|
); |
|
|
|
|
|
$pdb->{version} = $bad_version; |
|
eval{ $pdb->Decrypt( $record ) }; |
|
like( |
|
$@, |
|
qr/^Unsupported \s version \s $bad_version \s in \s Decrypt/xms, |
|
'Couldn\'t Decrypt with unsupported version' |
|
); |
|
|
|
delete $record->{encrypted}; |
|
eval{ $pdb->Encrypt( $record, undef, $acct ) }; |
|
like( |
|
$@, |
|
qr/^Unsupported \s version \s $bad_version \s in \s Encrypt/xms, |
|
'Couldn\'t Encrypt with unsupported version' |
|
); |
|
|
|
|
|
eval { $pdb->Write($file) }; |
|
like( |
|
$@, |
|
qr/^Unsupported \s Version \s $bad_version/xms, |
|
'Couldn\'t Write file with unsupported version' |
|
); |
|
|
|
eval{ $pdb->PackRecord($record) }; |
|
like( $@, |
|
qr/^Unsupported \s Version \s $bad_version/xms, |
|
'Couldn\'t PackRecord with Invalid Version' |
|
); |
|
|
|
$record2->{data} = q{nothing}; |
|
eval{ $pdb->ParseRecord(%{ $record2 }) }; |
|
like( $@, |
|
qr/^Unsupported \s Version \s $bad_version/xms, |
|
'Couldn\'t ParseRecord with Invalid Version' |
|
); |
|
|
|
eval{ $pdb->Password( $password ) }; |
|
like( $@, |
|
qr/^Unsupported \s Version \s $bad_version/xms, |
|
'Couldn\'t Password with Invalid Version' |
|
); |
|
|
|
|
|
$pdb = undef; |
|
$record = undef; |
|
$record2 = undef; |
|
|
|
unlink $file; |
|
|
foreach my $options (@o) { |
foreach my $options (@o) { |
my $pdb; |
foreach my $config_type ( 'hashref', 'cgi-style', 'list' ) { |
my $record; |
|
my $decrypted; |
|
|
|
my $Num_Tests_Left = 25; |
my $pdb; |
SKIP: { |
my $record; |
if ( defined $options->{cipher} && $options->{cipher} > 0 ) { |
my $decrypted; |
my $crypt = Palm::Keyring::crypts( $options->{cipher} ); |
%{ $acct->{3}->{data} } = %unchanging_date; |
skip 'Crypt::CBC not installed', $Num_Tests_Left |
|
unless eval "require Crypt::CBC"; |
|
skip 'Crypt::' . $crypt->{name} . ' not installed', |
|
$Num_Tests_Left |
|
unless eval "require Crypt::$crypt->{name}"; |
|
} |
|
|
|
if ( $options->{version} == 4 ) { |
my $Num_Tests_Left = 25; |
skip 'Crypt::DES not installed', $Num_Tests_Left |
SKIP: { |
unless eval "require Crypt::DES "; |
if ( defined $options->{cipher} && $options->{cipher} > 0 ) { |
skip 'Digest::MD5 not installed', $Num_Tests_Left |
my $crypt = Palm::Keyring::crypts( $options->{cipher} ); |
unless eval "require Digest::MD5 "; |
skip 'Crypt::CBC not installed', $Num_Tests_Left |
} |
unless eval "require Crypt::CBC"; |
elsif ( $options->{version} == 5 ) { |
if ($crypt) { |
skip 'Digest::HMAC_SHA1 not installed', $Num_Tests_Left |
skip 'Crypt::' . $crypt->{name} . ' not installed', |
unless eval "require Digest::HMAC_SHA1 "; |
$Num_Tests_Left |
} |
unless eval "require Crypt::$crypt->{name}"; |
|
} |
|
else { |
|
skip 'Unknown Crypt: ' . $options->{cipher}, |
|
$Num_Tests_Left; |
|
} |
|
} |
|
|
ok( $pdb = new Palm::Keyring($options), |
if ( $options->{version} == 4 ) { |
'new Palm::Keyring v' . $options->{version} |
skip 'Crypt::DES not installed', $Num_Tests_Left |
); |
unless eval "require Crypt::DES "; |
|
skip 'Digest::MD5 not installed', $Num_Tests_Left |
|
unless eval "require Digest::MD5 "; |
|
} |
|
elsif ( $options->{version} == 5 ) { |
|
skip 'Digest::HMAC_SHA1 not installed', $Num_Tests_Left |
|
unless eval "require Digest::HMAC_SHA1 "; |
|
} |
|
|
ok( $record = $pdb->append_Record(), 'Append Record' ); |
my @options = ($options); |
|
if ( $config_type eq 'cgi-style' ) { |
|
@options = ( |
|
'-version' => $options->{version}, |
|
'-password' => $options->{password}, |
|
); |
|
if ( $options->{cipher} ) { |
|
push @options, '-cipher', $options->{cipher}; |
|
} |
|
} |
|
elsif ( $config_type eq 'list' ) { |
|
@options = ( $options->{password}, $options->{version} ); |
|
if ( $options->{cipher} ) { |
|
push @options, $options->{cipher}; |
|
} |
|
} |
|
|
ok( $pdb->Encrypt( $record, $password, $acct ), |
ok( $pdb = new Palm::Keyring(@options), |
'Encrypt account into record' ); |
'new Palm::Keyring v' . $options->{version} |
|
); |
|
|
ok( $pdb->Write($file), 'Write file' ); |
ok( $pdb->Write($file), 'Write "empty" file' ); |
|
#exit if $pdb->{version} == 5; |
|
|
$pdb = undef; |
ok( $record = $pdb->append_Record(), 'Append Record' ); |
|
|
|
ok( $pdb->Password(), 'Clear Password' ); |
|
|
ok( $pdb = new Palm::Keyring(), 'new Palm::Keyring' ); |
eval{ $pdb->Encrypt() }; |
|
like( |
|
$@, |
|
qr/^Needed \s parameter \s \[record\] \s not \s passed!/xms, |
|
'Encrypt account into record without record' |
|
); |
|
eval{ $pdb->Encrypt( $record ) }; |
|
like( |
|
$@, |
|
qr/^Password \s not \s set!/xms, |
|
'Encrypt account into record without password' |
|
); |
|
eval{ $pdb->Encrypt( $record, $password ) }; |
|
like( |
|
$@, |
|
qr/^Needed \s parameter \s \[plaintext\] \s not \s passed!/xms, |
|
'Encrypt account into record without account' |
|
); |
|
eval{ $pdb->Encrypt( $record, $new_password, $acct ) }; |
|
like( |
|
$@, |
|
qr/^Invalid \s Password/xms, |
|
'Encrypt account into record with wrong password' |
|
); |
|
|
ok( $pdb->Load($file), 'Load File' ); |
ok( $pdb->Encrypt( $record, $password, $acct ), |
|
'Encrypt account into record' ); |
|
|
ok( $pdb->Password($password), 'Verify Password' ); |
ok( $pdb->Encrypt( $record, $password, $acct ), |
|
'Encrypt account into record (with no changes)'); |
|
|
my $rec_num = 0; |
ok( $pdb->Write($file), 'Write file' ); |
ok( $decrypted = $pdb->Decrypt( $pdb->{records}->[$rec_num] ), |
#print Dumper $pdb, $acct, $record; |
'Decrypt record' ); |
|
|
|
is( $decrypted->{2}->{data}, $password, 'Got password' ); |
$pdb = undef; |
|
|
is_deeply( $decrypted, $acct, 'Account Matches' ); |
ok( $pdb = new Palm::Keyring(), 'new Palm::Keyring' ); |
|
|
my $old_date = $decrypted->{3}->{data}; |
ok( $pdb->Load($file), 'Load File' ); |
|
|
ok( $pdb->Password( $password, $new_password ), |
my $rec_num = 0; |
'Change PDB Password' ); |
|
|
|
ok( $decrypted = $pdb->Decrypt( $pdb->{'records'}->[$rec_num] ), |
eval{ $pdb->Decrypt( ) }; |
'Decrypt with new password' ); |
like( |
|
$@, |
|
qr/^Needed \s parameter \s \[record\] \s not \s passed!/xms, |
|
'Decrypt with no record' |
|
); |
|
|
my $new_date = $decrypted->{3}->{data}; |
eval{ $pdb->Decrypt( $pdb->{records}->[$rec_num] ) }; |
|
like( |
|
$@, |
|
qr/^Password \s not \s set!/xms, |
|
'Decrypt with no password set' |
|
); |
|
|
is_deeply( $old_date, $new_date, 'Date didn\'t change' ); |
eval{ $pdb->Decrypt( $pdb->{records}->[$rec_num], $new_password ) }; |
|
like( |
|
$@, |
|
qr/^Invalid \s Password/xms, |
|
'Decypt with invalid password' |
|
); |
|
|
$decrypted->{2}->{data} = $new_password; |
ok( $pdb->Password($password), 'Verify Password' ); |
|
|
$pdb->{records}->[$rec_num]->{plaintext} = $decrypted; |
eval{ $pdb->Password($new_password) }; |
|
like( |
|
$@, |
|
qr/^Invalid \s Password/xms, |
|
'Verify Incorrect Password' |
|
); |
|
|
ok( $pdb->Encrypt( $pdb->{'records'}->[$rec_num] ), 'Change record' ); |
eval{ $pdb->Decrypt( {} ) }; |
|
like( |
|
$@, |
|
qr/^No \s encrypted \s content!/xms, |
|
'Decrypt with empty record' |
|
); |
|
|
ok( $decrypted = $pdb->Decrypt( $pdb->{'records'}->[$rec_num] ), |
ok( $decrypted = $pdb->Decrypt( $pdb->{records}->[$rec_num] ), |
'Decrypt new record' ); |
'Decrypt record' ); |
|
|
$new_date = $decrypted->{3}->{data}; |
is( $decrypted->{2}->{data}, $password, 'Got password' ); |
|
|
my $od = join '/', map { $old_date->{$_} } sort keys %{$old_date}; |
is_deeply( $decrypted, $acct, 'Account Matches' ); |
my $nd = join '/', map { $new_date->{$_} } sort keys %{$new_date}; |
|
|
|
isnt( $od, $nd, 'Date changed' ); |
my $old_date = $decrypted->{3}->{data}; |
|
|
is( $decrypted->{2}->{data}, $new_password, 'Got new password' ); |
ok( $pdb->Password( $password, $new_password ), |
|
'Change PDB Password' ); |
|
|
my $last_decrypted = $decrypted; |
ok( $decrypted = $pdb->Decrypt( $pdb->{'records'}->[$rec_num] ), |
|
'Decrypt with new password' ); |
|
|
$decrypted = {}; |
my $new_date = $decrypted->{3}->{data}; |
ok( $pdb->Password(), 'Forget password' ); |
|
|
|
eval { $decrypted = $pdb->Decrypt( $pdb->{'records'}->[$rec_num] ) }; |
is_deeply( $old_date, $new_date, 'Date didn\'t change' ); |
ok( $@, 'Don\'t decrypt' ); |
|
|
|
isnt( $decrypted->{password}, |
$decrypted->{2}->{data} = $new_password; |
$new_password, 'Didn\'t get new password' ); |
|
|
|
ok( $pdb->Unlock($new_password), 'Unlock' ); |
$pdb->{records}->[$rec_num]->{plaintext} = $decrypted; |
|
|
my @plaintext = map { $_->{plaintext} } @{ $pdb->{records} }; |
ok( $pdb->Encrypt( $pdb->{'records'}->[$rec_num] ), |
|
'Encrypt record (new password)' ); |
|
|
is_deeply( $plaintext[0], $last_decrypted, 'Account Matches' ); |
ok( $decrypted = $pdb->Decrypt( $pdb->{'records'}->[$rec_num] ), |
|
'Decrypt new record' ); |
|
|
ok( $pdb->Lock(), 'Lock' ); |
is( $decrypted->{2}->{data}, $new_password, 'Got new password' ); |
|
|
my $cleared_decrypted = {}; |
$new_date = $decrypted->{3}->{data}; |
$cleared_decrypted->{0} = $last_decrypted->{0}; |
|
@plaintext = map { $_->{plaintext} } @{ $pdb->{records} }; |
|
|
|
is_deeply( $plaintext[0], $cleared_decrypted, 'Cleared records' ); |
my $od = join '/', map { $old_date->{$_} } sort keys %{$old_date}; |
|
my $nd = join '/', map { $new_date->{$_} } sort keys %{$new_date}; |
|
|
ok( unlink($file), 'Remove test pdb v' . $options->{version} ); |
isnt( $od, $nd, 'Date changed' ); |
|
|
|
%{ $new_date } = %unchanging_date; |
|
$new_date->{year} = 1999; |
|
$decrypted->{3}->{data} = $new_date; |
|
|
|
ok( $pdb->Encrypt( $pdb->{'records'}->[$rec_num], undef, $decrypted ), |
|
'Encrypt record (new date)' ); |
|
|
|
ok( $decrypted = $pdb->Decrypt( $pdb->{'records'}->[$rec_num] ), |
|
'Decrypt new record' ); |
|
|
|
$new_date = $decrypted->{3}->{data}; |
|
|
|
$od = $nd; |
|
$nd = join '/', map { $new_date->{$_} } sort keys %{$new_date}; |
|
my $ud = join '/', map { $unchanging_date{$_} } sort keys %unchanging_date; |
|
|
|
isnt( $od, $nd, 'Date changed (from what it used to be)' ); |
|
is( $ud, $nd, 'Date changed (to what we set)' ); |
|
|
|
delete $decrypted->{3}; |
|
ok( $pdb->Encrypt( $pdb->{'records'}->[$rec_num], undef, $decrypted ), |
|
'Encrypt record (no date)' ); |
|
|
|
ok( $decrypted = $pdb->Decrypt( $pdb->{'records'}->[$rec_num] ), |
|
'Decrypt new record' ); |
|
|
|
$new_date = $decrypted->{3}->{data}; |
|
|
|
is( ref $new_date, 'HASH', 'Got a hashref date' ); |
|
|
|
my $last_decrypted = $decrypted; |
|
|
|
$decrypted = {}; |
|
ok( $pdb->Password(), 'Forget password' ); |
|
|
|
eval { |
|
$decrypted = $pdb->Decrypt( $pdb->{'records'}->[$rec_num] ); |
|
}; |
|
ok( $@, 'Don\'t decrypt' ); |
|
|
|
isnt( $decrypted->{password}, |
|
$new_password, 'Didn\'t get new password' ); |
|
|
|
ok( $pdb->Unlock($new_password), 'Unlock' ); |
|
|
|
my @plaintext = map { $_->{plaintext} } @{ $pdb->{records} }; |
|
|
|
is_deeply( $plaintext[0], $last_decrypted, 'Account Matches' ); |
|
|
|
ok( $pdb->Lock(), 'Lock' ); |
|
|
|
my $cleared_decrypted = {}; |
|
$cleared_decrypted->{0} = $last_decrypted->{0}; |
|
@plaintext = map { $_->{plaintext} } @{ $pdb->{records} }; |
|
|
|
is_deeply( $plaintext[0], $cleared_decrypted, 'Cleared records' ); |
|
|
|
$pdb->{records}->[0]->{data} = undef; |
|
ok( $pdb->Write($file), 'Write file without data' ); |
|
ok( $pdb->Load($file), 'Load File without data' ); |
|
|
|
ok( unlink($file), 'Remove test pdb v' . $options->{version} ); |
|
|
|
} |
} |
} |
} |
} |
|
|