| 1 | #!./perl -w
|
|---|
| 2 |
|
|---|
| 3 | BEGIN {
|
|---|
| 4 | chdir 't' if -d 't';
|
|---|
| 5 | @INC = qw(. ../lib);
|
|---|
| 6 | }
|
|---|
| 7 |
|
|---|
| 8 | BEGIN {
|
|---|
| 9 | use Config;
|
|---|
| 10 |
|
|---|
| 11 | require "test.pl";
|
|---|
| 12 |
|
|---|
| 13 | if( !$Config{d_crypt} ) {
|
|---|
| 14 | skip_all("crypt unimplemented");
|
|---|
| 15 | }
|
|---|
| 16 | else {
|
|---|
| 17 | plan(tests => 4);
|
|---|
| 18 | }
|
|---|
| 19 | }
|
|---|
| 20 |
|
|---|
| 21 | # Can't assume too much about the string returned by crypt(),
|
|---|
| 22 | # and about how many bytes of the encrypted (really, hashed)
|
|---|
| 23 | # string matter.
|
|---|
| 24 | #
|
|---|
| 25 | # HISTORICALLY the results started with the first two bytes of the salt,
|
|---|
| 26 | # followed by 11 bytes from the set [./0-9A-Za-z], and only the first
|
|---|
| 27 | # eight characters mattered, but those are probably no more safe
|
|---|
| 28 | # bets, given alternative encryption/hashing schemes like MD5,
|
|---|
| 29 | # C2 (or higher) security schemes, and non-UNIX platforms.
|
|---|
| 30 |
|
|---|
| 31 | SKIP: {
|
|---|
| 32 | skip ("VOS crypt ignores salt.", 1) if ($^O eq 'vos');
|
|---|
| 33 | ok(substr(crypt("ab", "cd"), 2) ne substr(crypt("ab", "ce"), 2), "salt makes a difference");
|
|---|
| 34 | }
|
|---|
| 35 |
|
|---|
| 36 | $a = "a\xFF\x{100}";
|
|---|
| 37 |
|
|---|
| 38 | eval {$b = crypt($a, "cd")};
|
|---|
| 39 | like($@, qr/Wide character in crypt/, "wide characters ungood");
|
|---|
| 40 |
|
|---|
| 41 | chop $a; # throw away the wide character
|
|---|
| 42 |
|
|---|
| 43 | eval {$b = crypt($a, "cd")};
|
|---|
| 44 | is($@, '', "downgrade to eight bit characters");
|
|---|
| 45 | is($b, crypt("a\xFF", "cd"), "downgrade results agree");
|
|---|
| 46 |
|
|---|