=================================================================== RCS file: /cvs/palm/Palm-Keyring/t/keyring.t,v retrieving revision 1.7 retrieving revision 1.17 diff -u -r1.7 -r1.17 --- palm/Palm-Keyring/t/keyring.t 2007/02/18 16:19:12 1.7 +++ palm/Palm-Keyring/t/keyring.t 2007/09/13 16:41:36 1.17 @@ -1,87 +1,176 @@ -#!/usr/bin/perl -# $RedRiver: keyring4.t,v 1.2 2007/02/18 05:39:32 andrew Exp $ +#!/usr/bin/perl -T +# $RedRiver: keyring.t,v 1.16 2007/09/13 00:02:52 andrew Exp $ use strict; use warnings; -use Test::More tests => 22; +use Test::More tests => 52; +use Data::Dumper; -BEGIN { use_ok( 'Palm::PDB' ); } -BEGIN { use_ok( 'Palm::Keyring' ); } +BEGIN { + use_ok( 'Palm::PDB' ); + use_ok( 'Palm::Keyring' ); +} -my $file = 'Keys-test-v4.pdb'; +my $file = 'Keys-test.pdb'; my $password = '12345'; my $new_password = '54321'; -my $acct = { - name => 'test3', - account => 'atestaccount', - password => $password, - notes => 'now that really roxorZ!', - lastchange => { - day => 2, - month => 2, - year => 99, + +my @o = ( + { + version => 4, + password => $password, }, -}; + { + version => 5, + password => $password, + cipher => 1, + }, +); -my $pdb; -my $record; -my $decrypted; +foreach my $options (@o) { + my $pdb; + my $record; + my $decrypted; -ok( $pdb = new Palm::Keyring($password), 'New Palm::Keyring'); + my $acct = { + 0 => { + label => 'name', + label_id => 0, + data => 'test3', + font => 0, + }, + 1 => { + label => 'account', + label_id => 1, + data => 'atestaccount', + font => 0, + }, + 2 => { + label => 'password', + label_id => 2, + data => $password, + font => 0, + }, + 3 => { + label => 'lastchange', + label_id => 3, + data => { + day => 2, + month => 2, + year => 99, + }, + font => 0, + }, + 255 => { + label => 'notes', + label_id => 255, + data => 'now that really roxorZ!', + font => 0, + }, + }; -ok( $record = $pdb->append_Record(), 'Append Record' ); + my $Num_Tests_Left = 25; + SKIP: { + if (defined $options->{cipher} && $options->{cipher} > 0) { + my $crypt = Palm::Keyring::crypts($options->{cipher}); + skip 'Crypt::CBC not installed', $Num_Tests_Left + unless eval "require Crypt::CBC"; + skip 'Crypt::' . $crypt->{name} . ' not installed', $Num_Tests_Left + unless eval "require Crypt::$crypt->{name}"; + } -ok( $pdb->Encrypt($record, $acct, $password), 'Encrypt account into record' ); + if ($options->{version} == 4) { + skip 'Crypt::DES not installed', $Num_Tests_Left + unless eval "require Crypt::DES "; + skip 'Digest::MD5 not installed', $Num_Tests_Left + unless eval "require Digest::MD5 "; + } elsif ($options->{version} == 5) { + skip 'Digest::HMAC_SHA1 not installed', $Num_Tests_Left + unless eval "require Digest::HMAC_SHA1 "; + } -ok( $pdb->Write($file), 'Write file' ); + ok( $pdb = new Palm::Keyring($options), + 'new Palm::Keyring v' . $options->{version}); -$pdb = undef; + ok( $record = $pdb->append_Record(), 'Append Record' ); -ok( $pdb = new Palm::PDB(), 'New Palm::PDB' ); + ok( $pdb->Encrypt($record, $password, $acct), + 'Encrypt account into record' ); -ok( $pdb->Load($file), 'Load File' ); + ok( $pdb->Write($file), 'Write file' ); -ok( $pdb->Password($password), 'Verify Password' ); + $pdb = undef; -ok( $decrypted = $pdb->Decrypt($pdb->{'records'}->[1]), 'Decrypt record' ); + ok( $pdb = new Palm::PDB(), 'new Palm::Keyring' ); -is( $decrypted->{password}, $password, 'Got password' ); + ok( $pdb->Load($file), 'Load File' ); -is_deeply( $decrypted, $acct, 'Account Matches' ); + ok( $pdb->Password($password), 'Verify Password' ); -my $old_date = $decrypted->{'lastchange'}; + my $rec_num = 0; + ok( $decrypted = $pdb->Decrypt($pdb->{records}->[$rec_num]), + 'Decrypt record' ); -ok( $pdb->Password($password, $new_password), 'Change PDB Password' ); + is( $decrypted->{2}->{data}, $password, 'Got password' ); -ok( $decrypted = $pdb->Decrypt($pdb->{'records'}->[1]), 'Decrypt with new password' ); + is_deeply( $decrypted, $acct, 'Account Matches' ); -my $new_date = $decrypted->{'lastchange'}; + my $old_date = $decrypted->{3}->{data}; -is_deeply( $old_date, $new_date, 'Date didn\'t change' ); + ok( $pdb->Password($password, $new_password), 'Change PDB Password' ); -$acct->{'password'} = $new_password; + ok( $decrypted = $pdb->Decrypt($pdb->{'records'}->[$rec_num]), + 'Decrypt with new password' ); -ok( $pdb->Encrypt($pdb->{'records'}->[1], $acct), 'Change record' ); + my $new_date = $decrypted->{3}->{data}; -ok( $decrypted = $pdb->Decrypt($pdb->{'records'}->[1]), 'Decrypt new record' ); + is_deeply( $old_date, $new_date, 'Date didn\'t change' ); -$new_date = $decrypted->{'lastchange'}; + $acct->{2}->{data} = $new_password; -my $od = join '/', map { $old_date->{$_} } sort keys %{ $old_date }; -my $nd = join '/', map { $new_date->{$_} } sort keys %{ $new_date }; + $pdb->{records}->[$rec_num]->{plaintext} = $acct; -isnt( $od, $nd, 'Date changed'); + ok( $pdb->Encrypt($pdb->{'records'}->[$rec_num]), 'Change record' ); -is( $decrypted->{password}, $new_password, 'Got new password' ); + ok( $decrypted = $pdb->Decrypt($pdb->{'records'}->[$rec_num]), + 'Decrypt new record' ); -$decrypted = {}; -ok( $pdb->Password(), 'Forget password' ); + $new_date = $decrypted->{3}->{data}; -eval{ $decrypted = $pdb->Decrypt($pdb->{'records'}->[1]) }; -ok( $@, 'Don\'t decrypt' ); + my $od = join '/', map { $old_date->{$_} } sort keys %{ $old_date }; + my $nd = join '/', map { $new_date->{$_} } sort keys %{ $new_date }; -isnt( $decrypted->{password}, $new_password, 'Didn\'t get new password' ); + isnt( $od, $nd, 'Date changed'); -unlink($file); + is( $decrypted->{2}->{data}, $new_password, 'Got new password' ); + + my $last_decrypted = $decrypted; + + $decrypted = {}; + ok( $pdb->Password(), 'Forget password' ); + + eval{ $decrypted = $pdb->Decrypt($pdb->{'records'}->[$rec_num]) }; + ok( $@, 'Don\'t decrypt' ); + + isnt( $decrypted->{password}, $new_password, 'Didn\'t get new password' ); + + ok( $pdb->Unlock($new_password), 'Unlock' ); + + my @plaintext = map { $_->{plaintext} } @{ $pdb->{records} }; + + is_deeply( $plaintext[0], $last_decrypted, 'Account Matches' ); + + ok( $pdb->Lock(), 'Lock' ); + + my $cleared_decrypted = {}; + $cleared_decrypted->{0}= $last_decrypted->{0}; + @plaintext = map { $_->{plaintext} } @{ $pdb->{records} }; + + is_deeply( $plaintext[0], $cleared_decrypted, 'Cleared records' ); + + ok( unlink($file), 'Remove test pdb v' . $options->{version} ); + + } +} 1;