diff options
Diffstat (limited to 'test')
-rw-r--r-- | test/.gitignore | 2 | ||||
-rw-r--r-- | test/crypt/Makefile.in | 7 | ||||
-rw-r--r-- | test/crypt/sha256c-test.c | 62 | ||||
-rw-r--r-- | test/crypt/sha512c-test.c | 63 |
4 files changed, 134 insertions, 0 deletions
diff --git a/test/.gitignore b/test/.gitignore index e3b896ffb..c89281624 100644 --- a/test/.gitignore +++ b/test/.gitignore @@ -18,6 +18,8 @@ args/arg_test assert/assert crypt/crypt crypt/md5c-test +crypt/sha256c-test +crypt/sha512c-test ctype/ctype dlopen/dladdr dlopen/dlafk diff --git a/test/crypt/Makefile.in b/test/crypt/Makefile.in index 22c27e9e9..1798a3977 100644 --- a/test/crypt/Makefile.in +++ b/test/crypt/Makefile.in @@ -4,3 +4,10 @@ EXTRA_LDFLAGS := -lcrypt OPTS_crypt = < crypt.input + +ifneq ($(UCLIBC_HAS_SHA512_CRYPT_IMPL),y) +TESTS_DISABLED += sha512c-test +endif +ifneq ($(UCLIBC_HAS_SHA256_CRYPT_IMPL),y) +TESTS_DISABLED += sha256c-test +endif diff --git a/test/crypt/sha256c-test.c b/test/crypt/sha256c-test.c new file mode 100644 index 000000000..357f0d8b7 --- /dev/null +++ b/test/crypt/sha256c-test.c @@ -0,0 +1,62 @@ +#include <crypt.h> +#include <stdio.h> +#include <string.h> + +static const struct +{ + const char *salt; + const char *input; + const char *expected; +} tests[] = +{ + { "$5$saltstring", "Hello world!", + "$5$saltstring$5B8vYYiY.CVt1RlTTf8KbXBH3hsxY/GNooZaBBGWEc5" }, + { "$5$rounds=10000$saltstringsaltstring", "Hello world!", + "$5$rounds=10000$saltstringsaltst$3xv.VbSHBb41AL9AvLeujZkZRBAwqFMz2." + "opqey6IcA" }, + { "$5$rounds=5000$toolongsaltstring", "This is just a test", + "$5$rounds=5000$toolongsaltstrin$Un/5jzAHMgOGZ5.mWJpuVolil07guHPvOW8" + "mGRcvxa5" }, + { "$5$rounds=1400$anotherlongsaltstring", + "a very much longer text to encrypt. This one even stretches over more" + "than one line.", + "$5$rounds=1400$anotherlongsalts$Rx.j8H.h8HjEDGomFU8bDkXm3XIUnzyxf12" + "oP84Bnq1" }, + { "$5$rounds=77777$short", + "we have a short salt string but not a short password", + "$5$rounds=77777$short$JiO1O3ZpDAxGJeaDIuqCoEFysAe1mZNJRs3pw0KQRd/" }, + { "$5$rounds=123456$asaltof16chars..", "a short string", + "$5$rounds=123456$asaltof16chars..$gP3VQ/6X7UUEW3HkBn2w1/Ptq2jxPyzV/" + "cZKmF/wJvD" }, + { "$5$rounds=10$roundstoolow", "the minimum number is still observed", + "$5$rounds=1000$roundstoolow$yfvwcWrQ8l/K0DAWyuPMDNHpIVlTQebY9l/gL97" + "2bIC" }, +}; +#define ntests (sizeof (tests) / sizeof (tests[0])) + + + +static int +do_test (void) +{ + int result = 0; + int i; + + for (i = 0; i < ntests; ++i) + { + char *cp = crypt (tests[i].input, tests[i].salt); + + if (strcmp (cp, tests[i].expected) != 0) + { + printf ("test %d: expected \"%s\", got \"%s\"\n", + i, tests[i].expected, cp); + result = 1; + } + } + + return result; +} + +#define TIMEOUT 6 +#define TEST_FUNCTION do_test () +#include "../test-skeleton.c" diff --git a/test/crypt/sha512c-test.c b/test/crypt/sha512c-test.c new file mode 100644 index 000000000..c829242e2 --- /dev/null +++ b/test/crypt/sha512c-test.c @@ -0,0 +1,63 @@ +#include <crypt.h> +#include <stdio.h> +#include <string.h> + +static const struct +{ + const char *salt; + const char *input; + const char *expected; +} tests[] = +{ + { "$6$saltstring", "Hello world!", + "$6$saltstring$svn8UoSVapNtMuq1ukKS4tPQd8iKwSMHWjl/O817G3uBnIFNjnQJu" + "esI68u4OTLiBFdcbYEdFCoEOfaS35inz1" }, + { "$6$rounds=10000$saltstringsaltstring", "Hello world!", + "$6$rounds=10000$saltstringsaltst$OW1/O6BYHV6BcXZu8QVeXbDWra3Oeqh0sb" + "HbbMCVNSnCM/UrjmM0Dp8vOuZeHBy/YTBmSK6H9qs/y3RnOaw5v." }, + { "$6$rounds=5000$toolongsaltstring", "This is just a test", + "$6$rounds=5000$toolongsaltstrin$lQ8jolhgVRVhY4b5pZKaysCLi0QBxGoNeKQ" + "zQ3glMhwllF7oGDZxUhx1yxdYcz/e1JSbq3y6JMxxl8audkUEm0" }, + { "$6$rounds=1400$anotherlongsaltstring", + "a very much longer text to encrypt. This one even stretches over more" + "than one line.", + "$6$rounds=1400$anotherlongsalts$POfYwTEok97VWcjxIiSOjiykti.o/pQs.wP" + "vMxQ6Fm7I6IoYN3CmLs66x9t0oSwbtEW7o7UmJEiDwGqd8p4ur1" }, + { "$6$rounds=77777$short", + "we have a short salt string but not a short password", + "$6$rounds=77777$short$WuQyW2YR.hBNpjjRhpYD/ifIw05xdfeEyQoMxIXbkvr0g" + "ge1a1x3yRULJ5CCaUeOxFmtlcGZelFl5CxtgfiAc0" }, + { "$6$rounds=123456$asaltof16chars..", "a short string", + "$6$rounds=123456$asaltof16chars..$BtCwjqMJGx5hrJhZywWvt0RLE8uZ4oPwc" + "elCjmw2kSYu.Ec6ycULevoBK25fs2xXgMNrCzIMVcgEJAstJeonj1" }, + { "$6$rounds=10$roundstoolow", "the minimum number is still observed", + "$6$rounds=1000$roundstoolow$kUMsbe306n21p9R.FRkW3IGn.S9NPN0x50YhH1x" + "hLsPuWGsUSklZt58jaTfF4ZEQpyUNGc0dqbpBYYBaHHrsX." }, +}; +#define ntests (sizeof (tests) / sizeof (tests[0])) + + +static int +do_test (void) +{ + int result = 0; + int i; + + for (i = 0; i < ntests; ++i) + { + char *cp = crypt (tests[i].input, tests[i].salt); + + if (strcmp (cp, tests[i].expected) != 0) + { + printf ("test %d: expected \"%s\", got \"%s\"\n", + i, tests[i].expected, cp); + result = 1; + } + } + + return result; +} + +#define TIMEOUT 6 +#define TEST_FUNCTION do_test () +#include "../test-skeleton.c" |