1 /*
2 * Copyright (C) 2023 Huawei Device Co., Ltd.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16 #include <cinttypes>
17 #include <unistd.h>
18 #include <gtest/gtest.h>
19
20 #include "common_defs.h"
21 #include "device_auth.h"
22 #include "device_auth_defines.h"
23 #include "hc_log.h"
24 #include "json_utils.h"
25 #include "securec.h"
26 #include "../../../../../services/legacy/authenticators/src/account_related/creds_manager/asy_token_manager.c"
27
28 using namespace std;
29 using namespace testing::ext;
30
31 namespace {
32 class AsyTokenManagerTest : public testing::Test {
33 public:
34 static void SetUpTestCase();
35 static void TearDownTestCase();
36 void SetUp();
37 void TearDown();
38 };
39
SetUpTestCase()40 void AsyTokenManagerTest::SetUpTestCase() {}
41
TearDownTestCase()42 void AsyTokenManagerTest::TearDownTestCase() {}
43
SetUp()44 void AsyTokenManagerTest::SetUp()
45 {
46 int ret = InitDeviceAuthService();
47 EXPECT_EQ(ret, HC_SUCCESS);
48 }
49
TearDown()50 void AsyTokenManagerTest::TearDown()
51 {
52 DestroyDeviceAuthService();
53 }
54
55 HWTEST_F(AsyTokenManagerTest, AsyTokenManagerTest001, TestSize.Level0)
56 {
57 InitTokenManager();
58 int32_t ret = GetAccountAuthTokenManager()->addToken(DEFAULT_OS_ACCOUNT, OP_BIND, nullptr);
59 EXPECT_NE(ret, HC_SUCCESS);
60
61 CJson *in = CreateJson();
62 do {
63 if (in == nullptr) {
64 break;
65 }
66 ret = GetAccountAuthTokenManager()->addToken(DEFAULT_OS_ACCOUNT, OP_BIND, in);
67 EXPECT_NE(ret, HC_SUCCESS);
68
69 ret = GetAccountAuthTokenManager()->addToken(DEFAULT_OS_ACCOUNT, OP_BIND, in);
70 EXPECT_NE(ret, HC_SUCCESS);
71
72 if (AddStringToJson(in, FIELD_USER_ID, "test_id") != HC_SUCCESS) { // For unit test.
73 break;
74 }
75 ret = GetAccountAuthTokenManager()->addToken(DEFAULT_OS_ACCOUNT, OP_BIND, in);
76 EXPECT_NE(ret, HC_SUCCESS);
77 } while (0);
78 FreeJson(in);
79 }
80
81 HWTEST_F(AsyTokenManagerTest, AsyTokenManagerTest002, TestSize.Level0)
82 {
83 InitTokenManager();
84 int32_t ret;
85 AccountToken accountToken;
86 do {
87 ret = GetAccountAuthTokenManager()->getToken(DEFAULT_OS_ACCOUNT, nullptr, nullptr, nullptr);
88 EXPECT_NE(ret, HC_SUCCESS);
89
90 ret = GetAccountAuthTokenManager()->getToken(DEFAULT_OS_ACCOUNT, &accountToken, nullptr, nullptr);
91 EXPECT_NE(ret, HC_SUCCESS);
92
93 ret = GetAccountAuthTokenManager()->getToken(DEFAULT_OS_ACCOUNT, &accountToken, "userId", nullptr);
94 EXPECT_NE(ret, HC_SUCCESS);
95 } while (0);
96 }
97
98 HWTEST_F(AsyTokenManagerTest, AsyTokenManagerTest003, TestSize.Level0)
99 {
100 InitTokenManager();
101 int32_t ret;
102
103 do {
104 ret = GetAccountAuthTokenManager()->deleteToken(DEFAULT_OS_ACCOUNT, nullptr, nullptr);
105 EXPECT_NE(ret, HC_SUCCESS);
106
107 ret = GetAccountAuthTokenManager()->deleteToken(DEFAULT_OS_ACCOUNT, "userId", nullptr); // For unit test.
108 EXPECT_NE(ret, HC_SUCCESS);
109
110 ret = GetAccountAuthTokenManager()->deleteToken(DEFAULT_OS_ACCOUNT, "userId", "deviceId"); // For unit test.
111 EXPECT_NE(ret, HC_SUCCESS);
112 } while (0);
113 }
114
115 HWTEST_F(AsyTokenManagerTest, AsyTokenManagerTest004, TestSize.Level0)
116 {
117 InitTokenManager();
118 int32_t ret;
119
120 do {
121 ret = GetAccountAuthTokenManager()->getAlgVersion(DEFAULT_OS_ACCOUNT, nullptr, nullptr);
122 EXPECT_NE(ret, HC_SUCCESS);
123
124 ret = GetAccountAuthTokenManager()->getAlgVersion(DEFAULT_OS_ACCOUNT, "userId", nullptr); // For unit test.
125 EXPECT_NE(ret, HC_SUCCESS);
126
127 ret = GetAccountAuthTokenManager()->getAlgVersion(DEFAULT_OS_ACCOUNT, "userId", "deviceId"); // For unit test.
128 EXPECT_NE(ret, HC_SUCCESS);
129 } while (0);
130 }
131
132 HWTEST_F(AsyTokenManagerTest, AsyTokenManagerTest005, TestSize.Level0)
133 {
134 InitTokenManager();
135 int32_t ret;
136
137 CJson *in = CreateJson();
138 do {
139 if (in == nullptr) {
140 break;
141 }
142 ret = GetAccountAuthTokenManager()->getRegisterProof(nullptr, nullptr);
143 EXPECT_NE(ret, HC_SUCCESS);
144
145 ret = GetAccountAuthTokenManager()->getRegisterProof(in, nullptr);
146 EXPECT_NE(ret, HC_SUCCESS);
147
148 if (AddStringToJson(in, FIELD_USER_ID, "userId")) { // For unit test.
149 break;
150 }
151 ret = GetAccountAuthTokenManager()->getRegisterProof(in, nullptr);
152 EXPECT_NE(ret, HC_SUCCESS);
153
154 if (AddStringToJson(in, FIELD_VERSION, "version")) { // For unit test.
155 break;
156 }
157 ret = GetAccountAuthTokenManager()->getRegisterProof(in, nullptr);
158 EXPECT_NE(ret, HC_SUCCESS);
159 } while (0);
160 FreeJson(in);
161 }
162
163 HWTEST_F(AsyTokenManagerTest, AsyTokenManagerTest006, TestSize.Level0)
164 {
165 int32_t ret;
166 AccountTokenVec vec = CreateAccountTokenVec();
167 CJson *in = CreateJson();
168 AccountToken accountToken;
169 (void)memset_s(&accountToken, sizeof(accountToken), 0, sizeof(accountToken));
170 do {
171 if (in == nullptr) {
172 break;
173 }
174 char tokenPath[MAX_DB_PATH_LEN] = { 0 };
175 (void)GetTokenPathDe(DEFAULT_OS_ACCOUNT, tokenPath, MAX_DB_PATH_LEN);
176 ret = GenerateTokenFromJson(nullptr, &accountToken);
177 ret = CreateTokensFromJson(nullptr, nullptr);
178 ret = ReadTokensFromFile(nullptr, tokenPath);
179 ret = ReadTokensFromFile(&vec, tokenPath);
180 ret = WriteTokensJsonToFile(nullptr, tokenPath);
181 ret = WriteTokensJsonToFile(in, tokenPath);
182 ret = GenerateJsonFromToken(&accountToken, nullptr);
183 ret = GenerateServerPkAlias(nullptr, nullptr);
184 if (AddStringToJson(in, FIELD_USER_ID, "user_id_test") != HC_SUCCESS) { // For unit test.
185 break;
186 }
187 ret = GenerateServerPkAlias(in, nullptr);
188
189 EXPECT_NE(ret, HC_SUCCESS);
190 } while (0);
191 ClearAccountTokenVec(&vec);
192 FreeJson(in);
193 }
194
195 HWTEST_F(AsyTokenManagerTest, AsyTokenManagerTest007, TestSize.Level0)
196 {
197 int32_t ret = HC_SUCCESS;
198 CJson *in = CreateJson();
199 CJson *obj = CreateJson();
200 AccountTokenVec vec = CreateAccountTokenVec();
201 do {
202 if (in == nullptr || obj == nullptr) {
203 break;
204 }
205 (void)ImportServerPk(nullptr, nullptr, nullptr, P256);
206 (void)VerifyPkInfoSignature(nullptr, in, nullptr, nullptr, P256);
207 (void)DoImportServerPkAndVerify(nullptr, nullptr, nullptr, nullptr);
208 (void)VerifySignature(nullptr);
209 (void)SaveOsAccountTokenDb(DEFAULT_OS_ACCOUNT);
210 (void)QueryTokenPtrIfMatch(&vec, nullptr, nullptr);
211 (void)QueryTokenPtrIfMatch(&vec, "userId", nullptr); // For unit test.
212 (void)QueryTokenPtrIfMatch(&vec, "userId", "deviceId"); // For unit test.
213 (void)GetAccountToken(DEFAULT_OS_ACCOUNT, "userId", "deviceId"); // For unit test.
214 (void)DeleteTokenInner(DEFAULT_OS_ACCOUNT, "userId", "deviceId", &vec); // For unit test.
215 } while (0);
216 FreeJson(obj);
217 FreeJson(in);
218 ClearAccountTokenVec(&vec);
219 EXPECT_EQ(ret, HC_SUCCESS);
220 }
221
222 HWTEST_F(AsyTokenManagerTest, AsyTokenManagerTest0071, TestSize.Level0)
223 {
224 int32_t ret = HC_SUCCESS;
225 CJson *in = CreateJson();
226 CJson *obj = CreateJson();
227 AccountTokenVec vec = CreateAccountTokenVec();
228 AccountToken accountToken;
229 do {
230 if (in == nullptr || obj == nullptr) {
231 break;
232 }
233 (void)AddTokenInner(DEFAULT_OS_ACCOUNT, &accountToken);
234 (void)DoExportPkAndCompare(nullptr, nullptr, nullptr, nullptr);
235 (void)CheckDevicePk(nullptr);
236 if (AddObjToJson(in, FIELD_PK_INFO, obj) != HC_SUCCESS) {
237 break;
238 }
239 (void)CheckDevicePk(in);
240 (void)CheckUserId(nullptr, nullptr);
241 (void)CheckUserId(nullptr, in);
242 (void)CheckCredValidity(IMPORT_SELF_CREDENTIAL, nullptr);
243 if (AddStringToJson(in, FIELD_USER_ID, "userId") != HC_SUCCESS) { // For unit test.
244 break;
245 }
246 (void)CheckCredValidity(IMPORT_SELF_CREDENTIAL, in);
247 } while (0);
248 FreeJson(obj);
249 FreeJson(in);
250 ClearAccountTokenVec(&vec);
251 EXPECT_EQ(ret, HC_SUCCESS);
252 }
253
254 HWTEST_F(AsyTokenManagerTest, AsyTokenManagerTest008, TestSize.Level0)
255 {
256 int32_t ret = HC_SUCCESS;
257 CJson *in = CreateJson();
258 do {
259 if (in == nullptr) {
260 break;
261 }
262 (void)DoGenerateAndExportPk(nullptr, nullptr, nullptr, nullptr);
263 (void)GetRegisterProof(nullptr, nullptr);
264 if (AddStringToJson(in, FIELD_USER_ID, "userId") != HC_SUCCESS) { // For unit test.
265 break;
266 }
267 (void)GetRegisterProof(nullptr, in);
268 if (AddStringToJson(in, FIELD_VERSION, "version") != HC_SUCCESS) { // For unit test.
269 break;
270 }
271 (void)GetRegisterProof(nullptr, in);
272 EXPECT_EQ(ret, HC_SUCCESS);
273 } while (0);
274 FreeJson(in);
275 }
276
277 HWTEST_F(AsyTokenManagerTest, AsyTokenManagerTest009, TestSize.Level0)
278 {
279 int32_t ret = HC_SUCCESS;
280
281 do {
282 (void)LoadOsAccountTokenDb(DEFAULT_OS_ACCOUNT);
283 (void)DestroyAccountToken(nullptr);
284 } while (0);
285
286 EXPECT_EQ(ret, HC_SUCCESS);
287 }
288 }