summaryrefslogtreecommitdiffstats
path: root/source/tests
diff options
context:
space:
mode:
authorDavid O'Neill <dmo@samba.org>2001-01-12 00:10:24 +0000
committerDavid O'Neill <dmo@samba.org>2001-01-12 00:10:24 +0000
commit5358f8abc1e1dea591446e926c00821fadfe0d84 (patch)
tree87ff984dc68c6fa32e5b8161398aaedd54a79c91 /source/tests
parent793153ebde08db217a18882c5eec945b7b14de69 (diff)
downloadsamba-5358f8abc1e1dea591446e926c00821fadfe0d84.tar.gz
samba-5358f8abc1e1dea591446e926c00821fadfe0d84.tar.xz
samba-5358f8abc1e1dea591446e926c00821fadfe0d84.zip
Changes from APPLIANCE_HEAD:
source/tests/crypttest.c - another one missed from a while ago: Add back tests/crypttest.c so that we can check for truncated crypt on those systems that it is relevant for and we avoid setting if for those systems that it is not true for. (Originally from SAMBA_2_2, Nov 13th 2000)
Diffstat (limited to 'source/tests')
-rw-r--r--source/tests/crypttest.c74
1 files changed, 74 insertions, 0 deletions
diff --git a/source/tests/crypttest.c b/source/tests/crypttest.c
new file mode 100644
index 00000000000..c9133f40bee
--- /dev/null
+++ b/source/tests/crypttest.c
@@ -0,0 +1,74 @@
+#if defined(HAVE_UNISTD_H)
+#include <unistd.h>
+#endif
+
+#include <sys/types.h>
+
+#ifdef HAVE_STRING_H
+#include <string.h>
+#endif
+
+#ifdef HAVE_STRINGS_H
+#include <strings.h>
+#endif
+
+main()
+{
+ char passwd[9];
+ char salt[9];
+ char c_out1[256];
+ char c_out2[256];
+
+ char expected_out[14];
+
+ strcpy(expected_out, "12yJ.Of/NQ.Pk");
+ strcpy(passwd, "12345678");
+ strcpy(salt, "12345678");
+
+ strcpy(c_out1, crypt(passwd, salt));
+ salt[2] = '\0';
+ strcpy(c_out2, crypt(passwd, salt));
+
+ /*
+ * If the non-trucated salt fails but the
+ * truncated salt succeeds then exit 1.
+ */
+
+ if((strcmp(c_out1, expected_out) != 0) &&
+ (strcmp(c_out2, expected_out) == 0))
+ exit(1);
+
+#ifdef HAVE_BIGCRYPT
+ /*
+ * Try the same with bigcrypt...
+ */
+
+ {
+ char big_passwd[17];
+ char big_salt[17];
+ char big_c_out1[256];
+ char big_c_out2[256];
+ char big_expected_out[27];
+
+ strcpy(big_passwd, "1234567812345678");
+ strcpy(big_salt, "1234567812345678");
+ strcpy(big_expected_out, "12yJ.Of/NQ.PklfyCuHi/rwM");
+
+ strcpy(big_c_out1, bigcrypt(big_passwd, big_salt));
+ big_salt[2] = '\0';
+ strcpy(big_c_out2, bigcrypt(big_passwd, big_salt));
+
+ /*
+ * If the non-trucated salt fails but the
+ * truncated salt succeeds then exit 1.
+ */
+
+ if((strcmp(big_c_out1, big_expected_out) != 0) &&
+ (strcmp(big_c_out2, big_expected_out) == 0))
+ exit(1);
+
+ }
+#endif
+
+ exit(0);
+}