| version 1.2, 2007/02/19 01:37:10 | version 1.10, 2008/09/18 02:47:37 | 
|  |  | 
| #!/usr/bin/perl | #!/usr/bin/perl -T | 
| # $RedRiver: keyring5.t,v 1.1 2007/02/19 00:28:28 andrew Exp $ | # $RedRiver: keyring5.t,v 1.9 2007/09/13 15:44:39 andrew Exp $ | 
| use strict; | use strict; | 
| use warnings; | use warnings; | 
|  |  | 
| use Test::More tests => 118; | use Test::More tests => 138; | 
| use YAML; |  | 
|  |  | 
| BEGIN { | BEGIN { | 
| use_ok( 'Palm::PDB' ); | use_ok('Palm::PDB'); | 
| use_ok( 'Palm::Keyring' ); | use_ok('Palm::Keyring'); | 
| } | } | 
|  |  | 
| my $file = 'Keys-test.pdb'; | my $file         = 'Keys-test.pdb'; | 
| my $password = '12345'; | my $password     = '12345'; | 
| my $new_password = '54321'; | my $new_password = '54321'; | 
|  |  | 
| foreach my $cipher (0..3) { | foreach my $cipher ( 0 .. 3 ) { | 
|  |  | 
|  | #next unless $cipher == 0; | 
| my $pdb; | my $pdb; | 
| my @recs; | my @recs; | 
| my $record; | my $record; | 
| my $decrypted; | my $decrypted; | 
|  |  | 
|  | my $crypt = Palm::Keyring::crypts($cipher); | 
|  |  | 
| my $options = { | my $options = { | 
| version  => 5, | version  => 5, | 
| password => $password, | password => $password, | 
|  |  | 
| }; | }; | 
|  |  | 
| my $original_accts = [ | my $original_accts = [ | 
| [ | {   0 => { | 
| { | 'label_id' => 0, | 
| 'label_id' => 2, | 'data'     => '', | 
| 'data' => 'only password is set', | 'label'    => 'name', | 
| 'label' => 'password', | 'font'     => 0, | 
| 'font' => 0 | }, | 
| }, | 2 => { | 
| { | 'label_id' => 2, | 
| 'label_id' => 3, | 'data'     => 'only password is set', | 
| 'data' => { | 'label'    => 'password', | 
| 'month' => 1, | 'font'     => 0, | 
| 'day' => 1, | }, | 
| 'year' => 107 | 3 => { | 
|  | 'label_id' => 3, | 
|  | 'data'     => { | 
|  | 'month' => 1, | 
|  | 'day'   => 1, | 
|  | 'year'  => 107 | 
|  | }, | 
|  | 'label' => 'lastchange', | 
|  | 'font'  => 0, | 
|  | } | 
| }, | }, | 
| 'label' => 'lastchange', | {   0 => { | 
| 'font' => 0 | 'label_id' => 0, | 
| } | 'data'     => 'test', | 
| ], | 'label'    => 'name', | 
| [ | 'font'     => 0, | 
| { | }, | 
| 'label_id' => 1, | 2 => { | 
| 'data' => 'test', | 'label_id' => 2, | 
| 'label' => 'account', | 'data'     => 'abcd1234', | 
| 'font' => 0 | 'label'    => 'password', | 
| }, | 'font'     => 0, | 
| { | }, | 
| 'label_id' => 2, | 3 => { | 
| 'data' => 'abcd1234', | 'label_id' => 3, | 
| 'label' => 'password', | 'data'     => { | 
| 'font' => 0 | 'month' => 1, | 
| }, | 'day'   => 11, | 
| { | 'year'  => 107 | 
| 'label_id' => 3, | }, | 
| 'data' => { | 'label' => 'lastchange', | 
| 'month' => 1, | 'font'  => 0, | 
| 'day' => 11, | }, | 
| 'year' => 107 | 255 => { | 
|  | 'label_id' => 255, | 
|  | 'data'     => 'This is a short note.', | 
|  | 'label'    => 'notes', | 
|  | 'font'     => 0, | 
|  | } | 
| }, | }, | 
| 'label' => 'lastchange', | {   0 => { | 
| 'font' => 0 | 'label_id' => 0, | 
| }, | 'data'     => '', | 
| { | 'label'    => 'name', | 
| 'label_id' => 255, | 'font'     => 0, | 
| 'data' => 'This is a short note.', | }, | 
| 'label' => 'notes', | 2 => { | 
| 'font' => 0 | 'label_id' => 2, | 
| } | 'data'     => 'password (date is 2/2/07)', | 
| ], | 'label'    => 'password', | 
| [ | 'font'     => 0, | 
| { | }, | 
| 'label_id' => 2, | 3 => { | 
| 'data' => 'password (date is 2/2/07)', | 'label_id' => 3, | 
| 'label' => 'password', | 'data'     => { | 
| 'font' => 0 | 'month' => 1, | 
| }, | 'day'   => 2, | 
| { | 'year'  => 107 | 
| 'label_id' => 3, | }, | 
| 'data' => { | 'label' => 'lastchange', | 
| 'month' => 1, | 'font'  => 0, | 
| 'day' => 2, | } | 
| 'year' => 107 | } | 
| }, |  | 
| 'label' => 'lastchange', |  | 
| 'font' => 0 |  | 
| } |  | 
| ] |  | 
| ]; | ]; | 
|  |  | 
| ok( $pdb = new Palm::Keyring($options), 'New Palm::Keyring v' | my $Num_Tests_Left = 34; | 
| . $options->{version} | SKIP: { | 
| . ' Cipher ' | if ( $cipher > 0 ) { | 
| . $options->{cipher} | skip 'Crypt::CBC not installed', $Num_Tests_Left | 
| ); | unless eval "require Crypt::CBC"; | 
|  | skip 'Crypt::' . $crypt->{name} . ' not installed', | 
|  | $Num_Tests_Left | 
|  | unless eval "require Crypt::$crypt->{name}"; | 
|  | } | 
|  | skip 'Digest::HMAC_SHA1 not installed', $Num_Tests_Left | 
|  | unless eval "require Digest::HMAC_SHA1"; | 
|  |  | 
| foreach my $acct (@{ $original_accts} ) { | ok( $pdb = new Palm::Keyring($options), | 
| ok( $record = $pdb->append_Record(), 'Append Record' ); | 'New Palm::Keyring v' | 
| ok( $pdb->Encrypt($record, $acct, $password), 'Encrypt account into record' ); | . $options->{version} | 
| } | . ' Cipher ' | 
|  | . $options->{cipher} | 
|  | ); | 
|  |  | 
| ok( $pdb->Write($file), 'Write file' ); | foreach my $acct ( @{$original_accts} ) { | 
|  | ok( $record = $pdb->append_Record(), 'Append Record' ); | 
|  | ok( $pdb->Encrypt( $record, $password, $acct ), | 
|  | 'Encrypt account into record' ); | 
|  | } | 
|  |  | 
| $pdb = undef; | ok( $pdb->Write($file), 'Write file' ); | 
|  |  | 
| ok( $pdb = new Palm::PDB(), 'New Palm::PDB' ); | $pdb = undef; | 
|  |  | 
| ok( $pdb->Load($file), 'Load File' ); | ok( $pdb = new Palm::PDB(), 'New Palm::PDB' ); | 
|  |  | 
| ok( $pdb->Password($password), 'Verify Password' ); | ok( $pdb->Load($file), 'Load File' ); | 
|  |  | 
| foreach my $rec (@{ $pdb->{records} }) { | ok( $pdb->Password($password), 'Verify Password' ); | 
| ok( $decrypted = $pdb->Decrypt($rec), 'Decrypt record' ); |  | 
| push @recs, $decrypted; |  | 
| } |  | 
|  |  | 
| is_deeply( $original_accts, \@recs, 'Account Matches' ); | my $rec_id = 0; | 
|  | foreach my $rec ( @{ $pdb->{records} } ) { | 
|  | ok( $decrypted = $pdb->Decrypt($rec), 'Decrypt record' ); | 
|  | if ( $rec_id == 1 ) { | 
|  | is( $decrypted->{0}->{data}, | 
|  | $original_accts->[1]->{0}->{data}, | 
|  | 'Checking record name' | 
|  | ); | 
|  | } | 
|  | push @recs, $decrypted; | 
|  | $rec_id++; | 
|  | } | 
|  |  | 
| @recs = (); | is_deeply( \@recs, $original_accts, 'Account Matches' ); | 
| my $rec_num = 1; |  | 
|  |  | 
| ok( $pdb->Password($password, $new_password), 'Change PDB Password' ); | @recs = (); | 
|  | my $rec_num = 1; | 
|  |  | 
| foreach my $rec (@{ $pdb->{records} }) { | ok( $pdb->Password( $password, $new_password ), | 
| ok( $decrypted = $pdb->Decrypt($rec), 'Decrypt record' ); | 'Change PDB Password' ); | 
| push @recs, $decrypted; |  | 
| } |  | 
|  |  | 
| is_deeply( $original_accts, \@recs, 'Account Matches' ); | foreach my $rec ( @{ $pdb->{records} } ) { | 
|  | ok( $decrypted = $pdb->Decrypt($rec), 'Decrypt record' ); | 
|  | push @recs, $decrypted; | 
|  | } | 
|  |  | 
| my $acct; | is_deeply( \@recs, $original_accts, 'Account Matches' ); | 
| ok( $acct = $pdb->Decrypt( $pdb->{records}->[$rec_num]), 'decrypt record ' . $rec_num); |  | 
|  |  | 
| foreach my $field (@{ $acct }) { | my $acct; | 
| next unless $field->{label} eq 'password'; | ok( $acct = $pdb->Decrypt( $pdb->{records}->[$rec_num] ), | 
| ok($field->{data} = $new_password, 'Change password'); | 'decrypt record ' . $rec_num ); | 
| } |  | 
|  |  | 
| ok(  $pdb->Encrypt($pdb->{'records'}->[$rec_num], $acct), 'Change record' ); | ok( $acct->{2}->{data} = $new_password, 'Change password' ); | 
|  |  | 
| ok( $decrypted = $pdb->Decrypt($pdb->{'records'}->[$rec_num]), 'Decrypt changed record' ); | $pdb->{records}->[$rec_num]->{plaintext} = $acct; | 
|  | $recs[$rec_num] = $acct; | 
|  |  | 
| is_deeply($acct, $decrypted, 'Compare changed record'); | ok( $pdb->Encrypt( $pdb->{'records'}->[$rec_num] ), 'Change record' ); | 
|  |  | 
| $decrypted = []; | ok( $decrypted = $pdb->Decrypt( $pdb->{'records'}->[$rec_num] ), | 
| ok( $pdb->Password(), 'Forget password' ); | 'Decrypt changed record' ); | 
|  |  | 
| eval{ $decrypted = $pdb->Decrypt($pdb->{'records'}->[$rec_num]) }; | is_deeply( $acct, $decrypted, 'Compare changed record' ); | 
| ok($@, 'Don\'t decrypt'); |  | 
|  |  | 
| my $got_password = 'Got nothing'; | my $last_decrypted = $decrypted; | 
| if ($decrypted) { | $decrypted = {}; | 
| foreach my $field (@{ $decrypted }) { | ok( $pdb->Password(), 'Forget password' ); | 
| next unless $field->{label} eq 'password'; |  | 
| $got_password = $field->{data}; | eval { $decrypted = $pdb->Decrypt( $pdb->{'records'}->[$rec_num] ) }; | 
|  | ok( $@, 'Don\'t decrypt' ); | 
|  |  | 
|  | my $got_password = 'Got nothing'; | 
|  | if ($decrypted) { | 
|  | $got_password = $decrypted->{2}->{data}; | 
| } | } | 
| } |  | 
|  |  | 
| isnt( $got_password, $new_password, 'Didn\'t get new password' ); | isnt( $got_password, $new_password, 'Didn\'t get new password' ); | 
|  |  | 
| ok( unlink($file), 'Remove test pdb v' . $options->{version} ); | ok( $pdb->Unlock($new_password), 'Unlock' ); | 
|  |  | 
|  | my @plaintext = map { $_->{plaintext} } @{ $pdb->{records} }; | 
|  |  | 
|  | is_deeply( \@plaintext, \@recs, 'Account Matches' ); | 
|  |  | 
|  | ok( $pdb->Lock(), 'Lock' ); | 
|  |  | 
|  | my @cleared = map { { 0 => $_->{0} } } @recs; | 
|  | @plaintext = map { $_->{plaintext} } @{ $pdb->{records} }; | 
|  |  | 
|  | is_deeply( \@plaintext, \@cleared, 'Cleared records' ); | 
|  |  | 
|  | ok( unlink($file), 'Remove test pdb v' . $options->{version} ); | 
|  | } | 
| } | } | 
|  |  | 
| 1; | 1; |