| Index: src/platform/pam_offline/authenticator_unittest.cc
|
| diff --git a/src/platform/pam_offline/authenticator_unittest.cc b/src/platform/pam_offline/authenticator_unittest.cc
|
| deleted file mode 100644
|
| index 600814cdd9ad255d8fd616af00b0d24228b11a38..0000000000000000000000000000000000000000
|
| --- a/src/platform/pam_offline/authenticator_unittest.cc
|
| +++ /dev/null
|
| @@ -1,73 +0,0 @@
|
| -// Copyright (c) 2009-2010 The Chromium OS Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -// Unit tests for UsernamePassword.
|
| -
|
| -#include "pam_offline/authenticator.h"
|
| -
|
| -#include <string.h> // For memset(), memcpy()
|
| -#include <stdlib.h>
|
| -
|
| -#include "gtest/gtest.h"
|
| -#include "pam_offline/authenticator.h"
|
| -#include "pam_offline/username_password.h"
|
| -#include "pam_offline/utils.h"
|
| -
|
| -namespace pam_offline {
|
| -
|
| -using std::string;
|
| -
|
| -const char kImageDir[] = "test_image_dir";
|
| -const char kFakeUser[] = "testuser@invalid.domain";
|
| -
|
| -class AuthenticatorTest : public ::testing::Test { };
|
| -
|
| -TEST(AuthenticatorTest, BadInitTest) {
|
| - // create an authenticator that points to an invalid shadow root
|
| - // and make sure it complains
|
| - Authenticator authn("/dev/null");
|
| - UsernamePassword up(kFakeUser, strlen(kFakeUser),
|
| - "zero", 4);
|
| -
|
| - EXPECT_EQ(false, authn.Init());
|
| - EXPECT_EQ(false, authn.TestAllMasterKeys(up));
|
| -}
|
| -
|
| -TEST(AuthenticatorTest, GoodDecryptTest0) {
|
| - Authenticator authn(kImageDir);
|
| - UsernamePassword up(kFakeUser, strlen(kFakeUser),
|
| - "zero", 4);
|
| -
|
| - EXPECT_EQ(true, authn.Init());
|
| - EXPECT_EQ(true, authn.TestAllMasterKeys(up));
|
| -}
|
| -
|
| -TEST(AuthenticatorTest, GoodDecryptTest1) {
|
| - Authenticator authn(kImageDir);
|
| - UsernamePassword up(kFakeUser, strlen(kFakeUser),
|
| - "one", 3);
|
| -
|
| - EXPECT_EQ(true, authn.Init());
|
| - EXPECT_EQ(true, authn.TestAllMasterKeys(up));
|
| -}
|
| -
|
| -TEST(AuthenticatorTest, GoodDecryptTest2) {
|
| - Authenticator authn(kImageDir);
|
| - UsernamePassword up(kFakeUser, strlen(kFakeUser),
|
| - "two", 3);
|
| -
|
| - EXPECT_EQ(true, authn.Init());
|
| - EXPECT_EQ(true, authn.TestAllMasterKeys(up));
|
| -}
|
| -
|
| -TEST(AuthenticatorTest, BadDecryptTest) {
|
| - Authenticator authn(kImageDir);
|
| - UsernamePassword up(kFakeUser, strlen(kFakeUser),
|
| - "bogus", 5);
|
| -
|
| - EXPECT_EQ(true, authn.Init());
|
| - EXPECT_EQ(false, authn.TestAllMasterKeys(up));
|
| -}
|
| -
|
| -} // namespace pam_offline
|
|
|