-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathpassword_provider_test.cc
94 lines (76 loc) · 2.97 KB
/
password_provider_test.cc
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
// Copyright 2017 The ChromiumOS Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <unistd.h>
#include <keyutils.h>
#include <memory>
#include <string>
#include <gtest/gtest.h>
#include "base/logging.h"
#include "libpasswordprovider/password.h"
#include "libpasswordprovider/password_provider.h"
#include "libpasswordprovider/password_provider_test_utils.h"
namespace password_provider {
// Tests for the PasswordProvider class.
class PasswordProviderTest : public testing::Test {
protected:
void SetUp() override {
// Before running a test, check if keyrings are supported in the kernel.
keyrings_supported_ =
!(keyctl_clear(KEY_SPEC_PROCESS_KEYRING) == -1 && errno == ENOSYS);
}
PasswordProvider password_provider_;
bool keyrings_supported_ = true;
};
// Saving and retrieving password should succeed.
TEST_F(PasswordProviderTest, SaveAndGetPassword) {
if (!keyrings_supported_) {
LOG(WARNING)
<< "Skipping test because keyrings are not supported by the kernel.";
return;
}
const std::string kPasswordStr("thepassword");
auto password = test::CreatePassword(kPasswordStr);
EXPECT_TRUE(password_provider_.SavePassword(*password.get()));
std::unique_ptr<Password> retrieved_password =
password_provider_.GetPassword();
ASSERT_TRUE(retrieved_password);
EXPECT_EQ(std::string(retrieved_password->GetRaw()), kPasswordStr);
EXPECT_EQ(retrieved_password->size(), kPasswordStr.size());
}
// Reading password should fail if password was already discarded.
TEST_F(PasswordProviderTest, DiscardAndGetPassword) {
if (!keyrings_supported_) {
LOG(WARNING)
<< "Skipping test because keyrings are not supported by the kernel.";
return;
}
const std::string kPasswordStr("thepassword");
auto password = test::CreatePassword(kPasswordStr);
EXPECT_TRUE(password_provider_.SavePassword(*password.get()));
EXPECT_TRUE(password_provider_.DiscardPassword());
std::unique_ptr<Password> retrieved_password =
password_provider_.GetPassword();
EXPECT_FALSE(retrieved_password);
}
// Retrieving a very long password should succeed.
TEST_F(PasswordProviderTest, GetLongPassword) {
if (!keyrings_supported_) {
LOG(WARNING)
<< "Skipping test because keyrings are not supported by the kernel.";
return;
}
// Create a very long password.
// (page size - 1) is the max size of the Password buffer.
size_t max_size = sysconf(_SC_PAGESIZE) - 1;
auto long_password = std::make_unique<char[]>(max_size);
memset(long_password.get(), 'a', max_size);
std::string password_str(long_password.get(), max_size);
auto password = test::CreatePassword(password_str);
EXPECT_TRUE(password_provider_.SavePassword(*password.get()));
std::unique_ptr<Password> retrieved_password =
password_provider_.GetPassword();
ASSERT_TRUE(retrieved_password);
EXPECT_EQ(std::string(retrieved_password->GetRaw()), password_str);
}
} // namespace password_provider