extern crate seckey;
#[cfg(unix)] extern crate nix;
use std::slice;
use seckey::SecKey;
#[cfg(all(unix, not(any(target_os = "macos", target_os = "ios"))))]
#[should_panic]
#[test]
fn protect_seckey_test() {
use nix::sys::signal;
extern fn sigsegv(_: i32) { panic!() }
let sigaction = signal::SigAction::new(
signal::SigHandler::Handler(sigsegv),
signal::SA_SIGINFO,
signal::SigSet::empty(),
);
unsafe { signal::sigaction(signal::SIGSEGV, &sigaction).ok() };
let mut secpass = SecKey::new(&[1; 8]).unwrap();
let mut wpass = secpass.write();
let (bs_ptr, bs_len) = (wpass.as_mut_ptr(), wpass.len()); let bs_bytes = unsafe { slice::from_raw_parts_mut(bs_ptr, bs_len) };
drop(wpass);
bs_bytes[0] = 0; }
#[test]
fn seckey_read_then_read() {
let secpass = SecKey::new(&1).unwrap();
let rpass1 = secpass.read();
let rpass2 = secpass.read();
assert_eq!(1, *rpass1);
assert_eq!(1, *rpass2);
drop(rpass1);
assert_eq!(1, *rpass2);
}