auth_passwd_free_policy(policy);
}
+RUNNER_TEST(T00205_pattern)
+{
+ policy_h *policy = nullptr;
+
+ const char* pattern = "[0-9]+";
+ const char* allowed_passwd = "Tizen123";
+ const char* not_allowed_passwd = "Tizen";
+
+ int ret = auth_passwd_new_policy(&policy);
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS && policy != nullptr,
+ "Failed to make new policy. ret: " << ret);
+
+ ret = auth_passwd_set_user(policy, getuid());
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+ "Failed to auth_passwd_set_user. ret: " << ret);
+
+ ret = auth_passwd_set_history_size(policy, 0);
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+ "Failed to set history size to policy handle. ret: " << ret);
+
+ ret = auth_passwd_set_quality(policy, AUTH_PWD_QUALITY_UNSPECIFIED);
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+ "Failed to set quality to policy handle. ret: " << ret);
+
+ // set pattern
+ ret = auth_passwd_set_pattern(policy, pattern);
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+ "Failed to auth_passwd_set_pattern. ret: " << ret);
+
+ ret = auth_passwd_set_policy(policy);
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+ "Failed to set policy. ret: " << ret);
+
+ sleep(1);
+ ret = auth_passwd_reset_passwd(AUTH_PWD_NORMAL, getuid(), default_pass);
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+ "Failed to reset passwd of user: " << getuid() << " with ret: " << ret);
+ sleep(1);
+ ret = auth_passwd_set_passwd(AUTH_PWD_NORMAL, default_pass, not_allowed_passwd);
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_ERROR_INVALID_PATTERN,
+ "Failed to set passwd of user: " << getuid() << " with ret: " << ret);
+ sleep(1);
+ ret = auth_passwd_set_passwd(AUTH_PWD_NORMAL, default_pass, allowed_passwd);
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+ "Failed to set passwd of user: " << getuid() << " with ret: " << ret);
+
+ // restore original setting
+ ret = auth_passwd_set_pattern(policy, NULL);
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+ "Failed to auth_passwd_set_pattern. ret: " << ret);
+
+ ret = auth_passwd_set_policy(policy);
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+ "Failed to set policy. ret: " << ret);
+
+ auth_passwd_free_policy(policy);
+}
RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
"Failed to auth_passwd_set_passwd for rollback. ret: " << ret);
}
+
+RUNNER_TEST(T00125_check_passwd_available)
+{
+ policy_h *policy = nullptr;
+ const char* not_usable_passwd = "123456";
+ const char* usable_passwd = "tizen";
+
+ // prepare test
+ int ret = auth_passwd_new_policy(&policy);
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS && policy != nullptr,
+ "Failed to make new policy. ret: " << ret);
+
+ ret = auth_passwd_set_user(policy, getuid());
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+ "Failed to auth_passwd_set_user. ret: " << ret);
+
+ ret = auth_passwd_set_quality(policy, AUTH_PWD_QUALITY_ALPHABETIC);
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+ "Failed to set quality to policy handle. ret: " << ret);
+ ret = auth_passwd_set_policy(policy);
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+ "Failed to set policy. ret: " << ret);
+
+ // test
+ sleep_for_retry_timeout();
+
+ ret = auth_passwd_check_passwd_available(AUTH_PWD_NORMAL, not_usable_passwd);
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_ERROR_INVALID_QUALITY_TYPE,
+ "Failed to check_passwd_available: " << getuid() << " with ret: " << ret);
+
+ ret = auth_passwd_check_passwd_available(AUTH_PWD_NORMAL, usable_passwd);
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+ "Failed to check_passwd_available: " << getuid() << " with ret: " << ret);
+
+ // restore original setting
+ ret = auth_passwd_set_quality(policy, AUTH_PWD_QUALITY_UNSPECIFIED);
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+ "Failed to set quality to policy handle. ret: " << ret);
+ ret = auth_passwd_set_policy(policy);
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+ "Failed to set policy. ret: " << ret);
+
+ auth_passwd_free_policy(policy);
+}
+
+RUNNER_TEST(T00126_set_password_recovery)
+{
+ int ret = AUTH_PASSWD_API_SUCCESS;
+
+ const char* recovery_passwd = "recovery_password";
+ const char* new_passwd = "new_test_password";
+
+ ret = auth_passwd_reset_passwd(AUTH_PWD_NORMAL, getuid(), default_pass);
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+ "Failed to reset passwd of user: " << getuid() << " with ret: " << ret);
+
+ ret = auth_passwd_reset_passwd(AUTH_PWD_RECOVERY, getuid(), recovery_passwd);
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+ "Failed to reset passwd of user: " << getuid() << " with ret: " << ret);
+
+ ret = auth_passwd_set_passwd_recovery(recovery_passwd, new_passwd);
+ RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+ "Failed to auth_passwd_set_passwd_recovery of user: " << getuid() << " with ret: " << ret);
+}
+