1 | #!./perl -w
|
---|
2 |
|
---|
3 | BEGIN {
|
---|
4 | chdir 't' if -d 't';
|
---|
5 | @INC = qw(. ../lib);
|
---|
6 | }
|
---|
7 |
|
---|
8 | BEGIN {
|
---|
9 | use Config;
|
---|
10 |
|
---|
11 | require "test.pl";
|
---|
12 |
|
---|
13 | if( !$Config{d_crypt} ) {
|
---|
14 | skip_all("crypt unimplemented");
|
---|
15 | }
|
---|
16 | else {
|
---|
17 | plan(tests => 4);
|
---|
18 | }
|
---|
19 | }
|
---|
20 |
|
---|
21 | # Can't assume too much about the string returned by crypt(),
|
---|
22 | # and about how many bytes of the encrypted (really, hashed)
|
---|
23 | # string matter.
|
---|
24 | #
|
---|
25 | # HISTORICALLY the results started with the first two bytes of the salt,
|
---|
26 | # followed by 11 bytes from the set [./0-9A-Za-z], and only the first
|
---|
27 | # eight characters mattered, but those are probably no more safe
|
---|
28 | # bets, given alternative encryption/hashing schemes like MD5,
|
---|
29 | # C2 (or higher) security schemes, and non-UNIX platforms.
|
---|
30 |
|
---|
31 | SKIP: {
|
---|
32 | skip ("VOS crypt ignores salt.", 1) if ($^O eq 'vos');
|
---|
33 | ok(substr(crypt("ab", "cd"), 2) ne substr(crypt("ab", "ce"), 2), "salt makes a difference");
|
---|
34 | }
|
---|
35 |
|
---|
36 | $a = "a\xFF\x{100}";
|
---|
37 |
|
---|
38 | eval {$b = crypt($a, "cd")};
|
---|
39 | like($@, qr/Wide character in crypt/, "wide characters ungood");
|
---|
40 |
|
---|
41 | chop $a; # throw away the wide character
|
---|
42 |
|
---|
43 | eval {$b = crypt($a, "cd")};
|
---|
44 | is($@, '', "downgrade to eight bit characters");
|
---|
45 | is($b, crypt("a\xFF", "cd"), "downgrade results agree");
|
---|
46 |
|
---|