summaryrefslogtreecommitdiffstats
path: root/testsuites/libtests/crypt01/init.c
diff options
context:
space:
mode:
Diffstat (limited to 'testsuites/libtests/crypt01/init.c')
-rw-r--r--testsuites/libtests/crypt01/init.c260
1 files changed, 260 insertions, 0 deletions
diff --git a/testsuites/libtests/crypt01/init.c b/testsuites/libtests/crypt01/init.c
new file mode 100644
index 0000000000..487aa2c19f
--- /dev/null
+++ b/testsuites/libtests/crypt01/init.c
@@ -0,0 +1,260 @@
+/*
+ * Copyright (c) 2011 The FreeBSD Project. All rights reserved.
+ *
+ * Copyright (c) 2014 embedded brains GmbH. All rights reserved.
+ *
+ * embedded brains GmbH
+ * Dornierstr. 4
+ * 82178 Puchheim
+ * Germany
+ * <rtems@embedded-brains.de>
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+
+/* Based on:
+ * SHA256-based Unix crypt implementation. Released into the Public Domain by
+ * Ulrich Drepper <drepper@redhat.com>. */
+
+#ifdef HAVE_CONFIG_H
+ #include "config.h"
+#endif
+
+#include <crypt.h>
+#include <string.h>
+
+#include "tmacros.h"
+
+const char rtems_test_name[] = "CRYPT 1";
+
+typedef struct {
+ const char *salt;
+ const char *input;
+ const char *expected;
+} test_case;
+
+static void test_formats(void)
+{
+ struct crypt_data data;
+ char *s;
+
+ s = crypt_r("abc", "def", &data);
+ rtems_test_assert(strcmp(s, "abc") == 0);
+
+ crypt_add_format(&crypt_md5_format);
+ crypt_add_format(&crypt_sha256_format);
+ crypt_add_format(&crypt_sha512_format);
+}
+
+static void test_md5(void)
+{
+ const char key[] = "0.s0.l33t";
+ const char salt_0[] = "$1$deadbeef$0Huu6KHrKLVWfqa4WljDE0";
+ const char salt_1[] = "$1$cafebabe$0Huu6KHrKLVWfqa4WljDE0";
+ struct crypt_data data;
+ char *s;
+
+ printf("test crypt_md5_r()\n");
+
+ s = crypt_md5_r(&key[0], &salt_0[0], &data);
+ rtems_test_assert(strcmp(s, &salt_0[0]) == 0);
+
+ s = crypt_md5_r(&key[0], &salt_1[0], &data);
+ rtems_test_assert(strcmp(s, &salt_1[0]) != 0);
+}
+
+static const test_case test_cases_sha256[] = {
+ {
+ "$5$saltstring", "Hello world!",
+ "$5$saltstring$5B8vYYiY.CVt1RlTTf8KbXBH3hsxY/GNooZaBBGWEc5"
+ }, {
+ "$5$rounds=10000$saltstringsaltstring", "Hello world!",
+ "$5$rounds=10000$saltstringsaltst$3xv.VbSHBb41AL9AvLeujZkZRBAwqFMz2."
+ "opqey6IcA"
+ }, {
+ "$5$rounds=5000$toolongsaltstring", "This is just a test",
+ "$5$rounds=5000$toolongsaltstrin$Un/5jzAHMgOGZ5.mWJpuVolil07guHPvOW8"
+ "mGRcvxa5"
+ }, {
+ "$5$rounds=1400$anotherlongsaltstring",
+ "a very much longer text to encrypt. This one even stretches over more"
+ "than one line.",
+ "$5$rounds=1400$anotherlongsalts$Rx.j8H.h8HjEDGomFU8bDkXm3XIUnzyxf12"
+ "oP84Bnq1"
+ }, {
+ "$5$rounds=77777$short",
+ "we have a short salt string but not a short password",
+ "$5$rounds=77777$short$JiO1O3ZpDAxGJeaDIuqCoEFysAe1mZNJRs3pw0KQRd/"
+ }, {
+ "$5$rounds=123456$asaltof16chars..", "a short string",
+ "$5$rounds=123456$asaltof16chars..$gP3VQ/6X7UUEW3HkBn2w1/Ptq2jxPyzV/"
+ "cZKmF/wJvD"
+ }, {
+ "$5$rounds=10$roundstoolow", "the minimum number is still observed",
+ "$5$rounds=1000$roundstoolow$yfvwcWrQ8l/K0DAWyuPMDNHpIVlTQebY9l/gL97"
+ "2bIC"
+ }
+};
+
+static void print_test_case(const test_case *c, const char *s)
+{
+ printf(
+ "input: %s\nsalt: %s\nexpected: %s\nactual: %s\n",
+ c->input,
+ c->salt,
+ c->expected,
+ s
+ );
+}
+
+static void test_sha256(void)
+{
+ size_t i;
+
+ printf("test crypt_sha256_r()\n");
+
+ for (i = 0; i < RTEMS_ARRAY_SIZE(test_cases_sha256); ++i) {
+ const test_case *c = &test_cases_sha256[i];
+ struct crypt_data data;
+ char *s;
+
+ s = crypt_sha256_r(c->input, c->salt, &data);
+ print_test_case(c, s);
+ rtems_test_assert(strcmp(s, c->expected) == 0);
+ }
+}
+
+static const test_case test_cases_sha512[] = {
+ {
+ "$6$saltstring", "Hello world!",
+ "$6$saltstring$svn8UoSVapNtMuq1ukKS4tPQd8iKwSMHWjl/O817G3uBnIFNjnQJu"
+ "esI68u4OTLiBFdcbYEdFCoEOfaS35inz1"
+ }, {
+ "$6$rounds=10000$saltstringsaltstring", "Hello world!",
+ "$6$rounds=10000$saltstringsaltst$OW1/O6BYHV6BcXZu8QVeXbDWra3Oeqh0sb"
+ "HbbMCVNSnCM/UrjmM0Dp8vOuZeHBy/YTBmSK6H9qs/y3RnOaw5v."
+ }, {
+ "$6$rounds=5000$toolongsaltstring", "This is just a test",
+ "$6$rounds=5000$toolongsaltstrin$lQ8jolhgVRVhY4b5pZKaysCLi0QBxGoNeKQ"
+ "zQ3glMhwllF7oGDZxUhx1yxdYcz/e1JSbq3y6JMxxl8audkUEm0"
+ }, {
+ "$6$rounds=1400$anotherlongsaltstring",
+ "a very much longer text to encrypt. This one even stretches over more"
+ "than one line.",
+ "$6$rounds=1400$anotherlongsalts$POfYwTEok97VWcjxIiSOjiykti.o/pQs.wP"
+ "vMxQ6Fm7I6IoYN3CmLs66x9t0oSwbtEW7o7UmJEiDwGqd8p4ur1"
+ }, {
+ "$6$rounds=77777$short",
+ "we have a short salt string but not a short password",
+ "$6$rounds=77777$short$WuQyW2YR.hBNpjjRhpYD/ifIw05xdfeEyQoMxIXbkvr0g"
+ "ge1a1x3yRULJ5CCaUeOxFmtlcGZelFl5CxtgfiAc0"
+ }, {
+ "$6$rounds=123456$asaltof16chars..", "a short string",
+ "$6$rounds=123456$asaltof16chars..$BtCwjqMJGx5hrJhZywWvt0RLE8uZ4oPwc"
+ "elCjmw2kSYu.Ec6ycULevoBK25fs2xXgMNrCzIMVcgEJAstJeonj1"
+ }, {
+ "$6$rounds=10$roundstoolow", "the minimum number is still observed",
+ "$6$rounds=1000$roundstoolow$kUMsbe306n21p9R.FRkW3IGn.S9NPN0x50YhH1x"
+ "hLsPuWGsUSklZt58jaTfF4ZEQpyUNGc0dqbpBYYBaHHrsX."
+ }
+};
+
+static void test_sha512(void)
+{
+ size_t i;
+
+ printf("test crypt_sha512_r()\n");
+
+ for (i = 0; i < RTEMS_ARRAY_SIZE(test_cases_sha512); ++i) {
+ const test_case *c = &test_cases_sha512[i];
+ struct crypt_data data;
+ char *s;
+
+ s = crypt_sha512_r(c->input, c->salt, &data);
+ print_test_case(c, s);
+ rtems_test_assert(strcmp(s, c->expected) == 0);
+ }
+}
+
+static const test_case test_cases_generic[] = {
+ {
+ "saltstring", "Hello world!",
+ "$6$saltstring$svn8UoSVapNtMuq1ukKS4tPQd8iKwSMHWjl/O817G3uBnIFNjnQJu"
+ "esI68u4OTLiBFdcbYEdFCoEOfaS35inz1"
+ }, {
+ "$1$deadbeef", "0.s0.l33t",
+ "$1$deadbeef$0Huu6KHrKLVWfqa4WljDE0"
+ }, {
+ "$5$saltstring", "Hello world!",
+ "$5$saltstring$5B8vYYiY.CVt1RlTTf8KbXBH3hsxY/GNooZaBBGWEc5"
+ }, {
+ "$6$saltstring", "Hello world!",
+ "$6$saltstring$svn8UoSVapNtMuq1ukKS4tPQd8iKwSMHWjl/O817G3uBnIFNjnQJu"
+ "esI68u4OTLiBFdcbYEdFCoEOfaS35inz1"
+ }
+};
+
+static void test_generic(void)
+{
+ size_t i;
+
+ printf("test crypt_r()\n");
+
+ for (i = 0; i < RTEMS_ARRAY_SIZE(test_cases_generic); ++i) {
+ const test_case *c = &test_cases_generic[i];
+ struct crypt_data data;
+ char *s;
+
+ s = crypt_r(c->input, c->salt, &data);
+ print_test_case(c, s);
+ rtems_test_assert(strcmp(s, c->expected) == 0);
+ }
+}
+
+static void Init(rtems_task_argument arg)
+{
+ TEST_BEGIN();
+
+ test_formats();
+ test_md5();
+ test_sha256();
+ test_sha512();
+ test_generic();
+
+ TEST_END();
+ rtems_test_exit(0);
+}
+
+#define CONFIGURE_APPLICATION_DOES_NOT_NEED_CLOCK_DRIVER
+#define CONFIGURE_APPLICATION_NEEDS_CONSOLE_DRIVER
+
+#define CONFIGURE_USE_IMFS_AS_BASE_FILESYSTEM
+
+#define CONFIGURE_MAXIMUM_TASKS 1
+
+#define CONFIGURE_INITIAL_EXTENSIONS RTEMS_TEST_INITIAL_EXTENSION
+
+#define CONFIGURE_RTEMS_INIT_TASKS_TABLE
+
+#define CONFIGURE_INIT
+
+#include <rtems/confdefs.h>