version 1.1, 2007/02/19 00:28:28 |
version 1.8, 2007/09/12 03:44:36 |
|
|
#!/usr/bin/perl |
#!/usr/bin/perl -T |
# $RedRiver: keyring.t,v 1.9 2007/02/19 00:22:42 andrew Exp $ |
# $RedRiver: keyring5.t,v 1.7 2007/08/10 04:13:31 andrew Exp $ |
use strict; |
use strict; |
use warnings; |
use warnings; |
|
|
use Test::More tests => 44; |
use Test::More tests => 138; |
use YAML; |
|
|
|
BEGIN { |
BEGIN { |
use_ok( 'Palm::PDB' ); |
use_ok( 'Palm::PDB' ); |
|
|
my $password = '12345'; |
my $password = '12345'; |
my $new_password = '54321'; |
my $new_password = '54321'; |
|
|
my @o = ( |
foreach my $cipher (0..3) { |
{ |
#next unless $cipher == 0; |
version => 4, |
|
password => $password, |
|
}, |
|
{ |
|
version => 5, |
|
password => $password, |
|
cipher => 1, |
|
v4compatible => 1, |
|
}, |
|
); |
|
|
|
foreach my $options (@o) { |
|
my $pdb; |
my $pdb; |
|
my @recs; |
my $record; |
my $record; |
my $decrypted; |
my $decrypted; |
|
|
my $acct = { |
my $crypt = Palm::Keyring::crypts($cipher); |
name => 'test3', |
|
account => 'atestaccount', |
my $options = { |
password => $password, |
version => 5, |
notes => 'now that really roxorZ!', |
password => $password, |
lastchange => { |
cipher => $cipher, |
day => 2, |
|
month => 2, |
|
year => 99, |
|
}, |
|
}; |
}; |
|
|
ok( $pdb = new Palm::Keyring($options), 'New Palm::Keyring v' . $options->{version} ); |
my $original_accts = [ |
|
{ |
|
0 => { |
|
'label_id' => 0, |
|
'data' => '', |
|
'label' => 'name', |
|
'font' => 0, |
|
}, |
|
2 => { |
|
'label_id' => 2, |
|
'data' => 'only password is set', |
|
'label' => 'password', |
|
'font' => 0, |
|
}, |
|
3 => { |
|
'label_id' => 3, |
|
'data' => { |
|
'month' => 1, |
|
'day' => 1, |
|
'year' => 107 |
|
}, |
|
'label' => 'lastchange', |
|
'font' => 0, |
|
} |
|
}, |
|
{ |
|
0 => { |
|
'label_id' => 0, |
|
'data' => 'test', |
|
'label' => 'name', |
|
'font' => 0, |
|
}, |
|
2 => { |
|
'label_id' => 2, |
|
'data' => 'abcd1234', |
|
'label' => 'password', |
|
'font' => 0, |
|
}, |
|
3 => { |
|
'label_id' => 3, |
|
'data' => { |
|
'month' => 1, |
|
'day' => 11, |
|
'year' => 107 |
|
}, |
|
'label' => 'lastchange', |
|
'font' => 0, |
|
}, |
|
255 => { |
|
'label_id' => 255, |
|
'data' => 'This is a short note.', |
|
'label' => 'notes', |
|
'font' => 0, |
|
} |
|
}, |
|
{ |
|
0 => { |
|
'label_id' => 0, |
|
'data' => '', |
|
'label' => 'name', |
|
'font' => 0, |
|
}, |
|
2 => { |
|
'label_id' => 2, |
|
'data' => 'password (date is 2/2/07)', |
|
'label' => 'password', |
|
'font' => 0, |
|
}, |
|
3 => { |
|
'label_id' => 3, |
|
'data' => { |
|
'month' => 1, |
|
'day' => 2, |
|
'year' => 107 |
|
}, |
|
'label' => 'lastchange', |
|
'font' => 0, |
|
} |
|
} |
|
]; |
|
|
ok( $record = $pdb->append_Record(), 'Append Record' ); |
SKIP: { |
|
if ($cipher > 0) { |
|
skip 'Crypt::CBC not installed', 34 unless |
|
eval "require Crypt::CBC"; |
|
skip 'Crypt::' . $crypt->{name} . ' not installed', 34 unless |
|
eval "require Crypt::$crypt->{name}"; |
|
} |
|
skip 'Digest::HMAC_SHA1 not installed', 34 unless |
|
eval " require Digest::HMAC_SHA1 "; |
|
|
ok( $pdb->Encrypt($record, $acct, $password), 'Encrypt account into record' ); |
ok( $pdb = new Palm::Keyring($options), 'New Palm::Keyring v' |
|
. $options->{version} |
|
. ' Cipher ' |
|
. $options->{cipher} |
|
); |
|
|
ok( $pdb->Write($file), 'Write file' ); |
foreach my $acct (@{ $original_accts} ) { |
|
ok( $record = $pdb->append_Record(), 'Append Record' ); |
|
ok( $pdb->Encrypt($record, $password, $acct), |
|
'Encrypt account into record' ); |
|
} |
|
|
$pdb = undef; |
ok( $pdb->Write($file), 'Write file' ); |
|
|
|
$pdb = undef; |
|
|
my $rec_num = 1; |
|
if ($options->{version} == 4) { |
|
ok( $pdb = new Palm::PDB(), 'New Palm::PDB' ); |
ok( $pdb = new Palm::PDB(), 'New Palm::PDB' ); |
} else { |
|
ok( $pdb = new Palm::Keyring(-v4compatible => 1), 'New Palm::Keyring' ); |
|
$rec_num = 0; |
|
} |
|
|
|
ok( $pdb->Load($file), 'Load File' ); |
ok( $pdb->Load($file), 'Load File' ); |
|
|
ok( $pdb->Password($password), 'Verify Password' ); |
ok( $pdb->Password($password), 'Verify Password' ); |
|
|
ok( $decrypted = $pdb->Decrypt($pdb->{records}->[$rec_num]), 'Decrypt record' ); |
my $rec_id = 0; |
|
foreach my $rec (@{ $pdb->{records} }) { |
|
ok( $decrypted = $pdb->Decrypt($rec), 'Decrypt record' ); |
|
if ($rec_id == 1) { |
|
is( $decrypted->{0}->{data}, $original_accts->[1]->{0}->{data}, |
|
'Checking record name' ); |
|
} |
|
push @recs, $decrypted; |
|
$rec_id++; |
|
} |
|
|
is( $decrypted->{password}, $password, 'Got password' ); |
is_deeply( \@recs, $original_accts, 'Account Matches' ); |
|
|
is_deeply( $decrypted, $acct, 'Account Matches' ); |
@recs = (); |
|
my $rec_num = 1; |
|
|
my $old_date = $decrypted->{'lastchange'}; |
ok( $pdb->Password($password, $new_password), 'Change PDB Password' ); |
|
|
ok( $pdb->Password($password, $new_password), 'Change PDB Password' ); |
foreach my $rec (@{ $pdb->{records} }) { |
|
ok( $decrypted = $pdb->Decrypt($rec), 'Decrypt record' ); |
|
push @recs, $decrypted; |
|
} |
|
|
ok( $decrypted = $pdb->Decrypt($pdb->{'records'}->[$rec_num]), 'Decrypt with new password' ); |
is_deeply( \@recs, $original_accts, 'Account Matches' ); |
|
|
my $new_date = $decrypted->{'lastchange'}; |
my $acct; |
|
ok( $acct = $pdb->Decrypt( $pdb->{records}->[$rec_num]), 'decrypt record ' . $rec_num); |
|
|
is_deeply( $old_date, $new_date, 'Date didn\'t change' ); |
ok($acct->{2}->{data} = $new_password, 'Change password'); |
|
|
$acct->{'password'} = $new_password; |
$pdb->{records}->[$rec_num]->{plaintext} = $acct; |
|
$recs[$rec_num] = $acct; |
|
|
ok( $pdb->Encrypt($pdb->{'records'}->[$rec_num], $acct), 'Change record' ); |
ok( $pdb->Encrypt($pdb->{'records'}->[$rec_num]), 'Change record'); |
|
|
ok( $decrypted = $pdb->Decrypt($pdb->{'records'}->[$rec_num]), 'Decrypt new record' ); |
ok( $decrypted = $pdb->Decrypt($pdb->{'records'}->[$rec_num]), |
|
'Decrypt changed record' ); |
|
|
$new_date = $decrypted->{'lastchange'}; |
is_deeply($acct, $decrypted, 'Compare changed record'); |
|
|
my $od = join '/', map { $old_date->{$_} } sort keys %{ $old_date }; |
my $last_decrypted = $decrypted; |
my $nd = join '/', map { $new_date->{$_} } sort keys %{ $new_date }; |
$decrypted = {}; |
|
ok( $pdb->Password(), 'Forget password' ); |
|
|
isnt( $od, $nd, 'Date changed'); |
eval{ $decrypted = $pdb->Decrypt($pdb->{'records'}->[$rec_num]) }; |
|
ok($@, 'Don\'t decrypt'); |
|
|
is( $decrypted->{password}, $new_password, 'Got new password' ); |
my $got_password = 'Got nothing'; |
|
if ($decrypted) { |
|
$got_password = $decrypted->{2}->{data}; |
|
} |
|
|
$decrypted = {}; |
isnt( $got_password, $new_password, 'Didn\'t get new password' ); |
ok( $pdb->Password(), 'Forget password' ); |
|
|
|
eval{ $decrypted = $pdb->Decrypt($pdb->{'records'}->[1]) }; |
ok( $pdb->Unlock($new_password), 'Unlock' ); |
ok( $@, 'Don\'t decrypt' ); |
|
|
|
isnt( $decrypted->{password}, $new_password, 'Didn\'t get new password' ); |
my @plaintext = map { $_->{plaintext} } @{ $pdb->{records} }; |
|
|
ok( unlink($file), 'Remove test pdb v' . $options->{version} ); |
is_deeply( \@plaintext, \@recs, 'Account Matches' ); |
|
|
|
ok( $pdb->Lock(), 'Lock' ); |
|
|
|
my @cleared = map { { 0 => $_->{0} } } @recs; |
|
@plaintext = map { $_->{plaintext} } @{ $pdb->{records} }; |
|
|
|
is_deeply( \@plaintext, \@cleared, 'Cleared records' ); |
|
|
|
ok( unlink($file), 'Remove test pdb v' . $options->{version} ); |
|
} |
} |
} |
|
|
1; |
1; |