/* * Copyright (c) 2022 Huawei Device Co., Ltd. * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include "UTTest_pin_auth.h" #include #include #include "accesstoken_kit.h" #include "dm_constants.h" #include "dm_log.h" #include "nlohmann/json.hpp" #include "device_manager_service_listener.h" #include "nativetoken_kit.h" #include "token_setproc.h" using namespace OHOS::Security::AccessToken; namespace OHOS { namespace DistributedHardware { void PinAuthTest::SetUp() { const int32_t PERMS_NUM = 3; const int32_t PEAMS_INDEX_TWO = 2; uint64_t tokenId; const char *perms[PERMS_NUM]; perms[0] = OHOS_PERMISSION_DISTRIBUTED_SOFTBUS_CENTER; perms[1] = OHOS_PERMISSION_DISTRIBUTED_DATASYNC; perms[PEAMS_INDEX_TWO] = "ohos.permission.GET_BUNDLE_INFO_PRIVILEGED"; NativeTokenInfoParams infoInstance = { .dcapsNum = 0, .permsNum = PERMS_NUM, .aclsNum = 0, .dcaps = NULL, .perms = perms, .acls = NULL, .processName = "device_manager", .aplStr = "system_basic", }; tokenId = GetAccessTokenId(&infoInstance); SetSelfTokenID(tokenId); OHOS::Security::AccessToken::AccessTokenKit::ReloadNativeTokenInfo(); } void PinAuthTest::TearDown() { } void PinAuthTest::SetUpTestCase() { } void PinAuthTest::TearDownTestCase() { } namespace { std::shared_ptr softbusConnector = std::make_shared(); std::shared_ptr listener = std::make_shared(); std::shared_ptr hiChainConnector = std::make_shared(); std::shared_ptr authManager = std::make_shared(softbusConnector, listener, hiChainConnector); /** * @tc.name: DmAuthManager::ShowAuthInfo_001 * @tc.desc: Call unauthenticateddevice to check whether the return value is ERR_DM_FAILED * @tc.type: FUNC * @tc.require: AR000GHSJK */ HWTEST_F(PinAuthTest, ShowAuthInfo_001, testing::ext::TestSize.Level0) { std::shared_ptr pinAuth = std::make_shared(); std::string authToken = "123456"; int32_t ret = pinAuth->ShowAuthInfo(authToken, authManager); ASSERT_EQ(ret, ERR_DM_FAILED); } /** * @tc.name: DmAuthManager::ShowAuthInfo_002 * @tc.desc: Call unauthenticateddevice to check whether the return value is ERR_DM_FAILED * @tc.type: FUNC * @tc.require: AR000GHSJK */ HWTEST_F(PinAuthTest, ShowAuthInfo_002, testing::ext::TestSize.Level0) { std::shared_ptr pinAuth = std::make_shared(); nlohmann::json jsonObject; jsonObject[PIN_TOKEN] = 123456; std::string authToken = jsonObject.dump(); int32_t ret = pinAuth->ShowAuthInfo(authToken, authManager); ASSERT_EQ(ret, ERR_DM_FAILED); } /** * @tc.name: DmAuthManager::ShowAuthInfo_003 * @tc.desc: Call unauthenticateddevice to check whether the return value is ERR_DM_FAILED * @tc.type: FUNC * @tc.require: AR000GHSJK */ HWTEST_F(PinAuthTest, ShowAuthInfo_003, testing::ext::TestSize.Level0) { std::shared_ptr pinAuth = std::make_shared(); nlohmann::json jsonObject; jsonObject[PIN_CODE_KEY] = 123456; std::string authToken = jsonObject.dump(); int32_t ret = pinAuth->ShowAuthInfo(authToken, nullptr); ASSERT_EQ(ret, ERR_DM_FAILED); } /** * @tc.name: DmAuthManager::ShowAuthInfo_004 * @tc.desc: Call unauthenticateddevice to check whether the return value is DM_OK * @tc.type: FUNC * @tc.require: AR000GHSJK */ HWTEST_F(PinAuthTest, ShowAuthInfo_004, testing::ext::TestSize.Level0) { std::shared_ptr pinAuth = std::make_shared(); nlohmann::json jsonObject; jsonObject[PIN_CODE_KEY] = 123456; std::string authToken = jsonObject.dump(); int32_t ret = pinAuth->ShowAuthInfo(authToken, authManager); ASSERT_EQ(ret, DM_OK); } /** * @tc.name: DmAuthManager::StartAuth_001 * @tc.desc: Call unauthenticateddevice to check whether the return value is ERR_DM_FAILED * @tc.type: FUNC * @tc.require: AR000GHSJK */ HWTEST_F(PinAuthTest, StartAuth_001, testing::ext::TestSize.Level0) { std::shared_ptr pinAuth = std::make_shared(); std::string authToken = ""; int32_t ret = pinAuth->StartAuth(authToken, nullptr); ASSERT_EQ(ret, ERR_DM_FAILED); } /** * @tc.name: DmAuthManager::StartAuth_002 * @tc.desc: Call unauthenticateddevice to check whether the return value is DM_OK * @tc.type: FUNC * @tc.require: AR000GHSJK */ HWTEST_F(PinAuthTest, StartAuth_002, testing::ext::TestSize.Level0) { std::shared_ptr pinAuth = std::make_shared(); std::string authToken = ""; int32_t ret = pinAuth->StartAuth(authToken, authManager); ASSERT_EQ(ret, DM_OK); } /** * @tc.name: DmAuthManager::VerifyAuthentication_001 * @tc.desc: Call unauthenticateddevice to check whether the return value is ERR_DM_FAILED * @tc.type: FUNC * @tc.require: AR000GHSJK */ HWTEST_F(PinAuthTest, VerifyAuthentication_001, testing::ext::TestSize.Level0) { std::shared_ptr pinAuth = std::make_shared(); std::string authToken; std::string authParam = "1"; int32_t ret = pinAuth->VerifyAuthentication(authToken, authParam); ASSERT_EQ(ret, ERR_DM_FAILED); } /** * @tc.name: DmAuthManager::VerifyAuthentication_001 * @tc.desc: Call unauthenticateddevice to check whether the return value is DM_OK * @tc.type: FUNC * @tc.require: AR000GHSJK */ HWTEST_F(PinAuthTest, VerifyAuthentication_002, testing::ext::TestSize.Level0) { std::shared_ptr pinAuth = std::make_shared(); std::string authToken; std::string authParam = "0"; int32_t ret = pinAuth->VerifyAuthentication(authToken, authParam); ASSERT_EQ(ret, DM_OK); } /** * @tc.name: DmAuthManager::VerifyAuthentication_003 * @tc.desc: Call unauthenticateddevice to check whether the return value is DM_OK * @tc.type: FUNC * @tc.require: AR000GHSJK */ HWTEST_F(PinAuthTest, VerifyAuthentication_003, testing::ext::TestSize.Level0) { std::shared_ptr pinAuth = std::make_shared(); nlohmann::json authParamJson; authParamJson[PIN_CODE_KEY] = 123; authParamJson[PIN_TOKEN] = "456"; nlohmann::json authTokenJson; authTokenJson[PIN_CODE_KEY] = 123; authTokenJson[PIN_TOKEN] = "456"; std::string authToken = authTokenJson.dump(); std::string authParam = authParamJson.dump(); int32_t ret = pinAuth->VerifyAuthentication(authToken, authParam); ASSERT_EQ(ret, DM_OK); } /** * @tc.name: DmAuthManager::VerifyAuthentication_004 * @tc.desc: Call unauthenticateddevice to check whether the return value is ERR_DM_INPUT_PARA_INVALID * @tc.type: FUNC * @tc.require: AR000GHSJK */ HWTEST_F(PinAuthTest, VerifyAuthentication_004, testing::ext::TestSize.Level0) { std::shared_ptr pinAuth = std::make_shared(); nlohmann::json authParamJson; authParamJson[PIN_CODE_KEY] = 12345; authParamJson[PIN_TOKEN] = "123456"; nlohmann::json authTokenJson; authTokenJson[PIN_CODE_KEY] = 123456; authTokenJson[PIN_TOKEN] = "123456"; std::string authToken = authTokenJson.dump(); std::string authParam = authParamJson.dump(); int32_t ret = pinAuth->VerifyAuthentication(authToken, authParam); ASSERT_EQ(ret, ERR_DM_INPUT_PARA_INVALID); } /** * @tc.name: DmAuthManager::VerifyAuthentication_005 * @tc.desc: Call unauthenticateddevice to check whether the return value is ERR_DM_FAILED * @tc.type: FUNC * @tc.require: AR000GHSJK */ HWTEST_F(PinAuthTest, VerifyAuthentication_005, testing::ext::TestSize.Level0) { std::shared_ptr pinAuth = std::make_shared(); nlohmann::json authParamJson; authParamJson[PIN_CODE_KEY] = 12345; authParamJson[PIN_TOKEN] = "123456"; nlohmann::json authTokenJson; authTokenJson[PIN_CODE_KEY] = 123456; authTokenJson[PIN_TOKEN] = "123456"; std::string authToken = authTokenJson.dump(); std::string authParam = authParamJson.dump(); pinAuth->VerifyAuthentication(authToken, authParam); pinAuth->VerifyAuthentication(authToken, authParam); int32_t ret = pinAuth->VerifyAuthentication(authToken, authParam); ASSERT_EQ(ret, ERR_DM_FAILED); } } } // namespace DistributedHardware } // namespace OHOS