sl@0
|
1 |
// COMMENTS SHOULD ALWAYS BEGIN IN A NEW LINE, NEVER EMBED COMMENTS WITHIN DATA
|
sl@0
|
2 |
|
sl@0
|
3 |
ENCRYPT_TEST_DATA_1
|
sl@0
|
4 |
// To test setkey() and encrypt() functions with all zeroes as key and data
|
sl@0
|
5 |
KEY :0000000000000000000000000000000000000000000000000000000000000000
|
sl@0
|
6 |
DATA_BLOCK :0000000000000000000000000000000000000000000000000000000000000000
|
sl@0
|
7 |
// A value of 0 indicates encryption
|
sl@0
|
8 |
ED_FLAG :0
|
sl@0
|
9 |
EXPECTED_OUTPUT:1000110010100110010011011110100111000001101100010010001110100111
|
sl@0
|
10 |
END_TEST_DATA
|
sl@0
|
11 |
|
sl@0
|
12 |
ENCRYPT_TEST_DATA_2
|
sl@0
|
13 |
// To test setkey() and encrypt() functions with all zeroes as key
|
sl@0
|
14 |
KEY :0000000000000000000000000000000000000000000000000000000000000000
|
sl@0
|
15 |
DATA_BLOCK :0000100110000000000000011110110100001001100001010000010100101100
|
sl@0
|
16 |
// A value of 0 indicates encryption
|
sl@0
|
17 |
ED_FLAG :0
|
sl@0
|
18 |
EXPECTED_OUTPUT:0110110110000110111111010111001001101010001000001011011010110001
|
sl@0
|
19 |
END_TEST_DATA
|
sl@0
|
20 |
|
sl@0
|
21 |
ENCRYPT_TEST_DATA_3
|
sl@0
|
22 |
// To test setkey() and encrypt() functions with all ones in the bit vectors of
|
sl@0
|
23 |
// both key and data
|
sl@0
|
24 |
KEY :1111111111111111111111111111111111111111111111111111111111111111
|
sl@0
|
25 |
DATA_BLOCK :1111111111111111111111111111111111111111111111111111111111111111
|
sl@0
|
26 |
// A value of 0 indicates encryption
|
sl@0
|
27 |
ED_FLAG :0
|
sl@0
|
28 |
EXPECTED_OUTPUT:0111001101011001101100100001011000111110010011101101110001011000
|
sl@0
|
29 |
END_TEST_DATA
|
sl@0
|
30 |
|
sl@0
|
31 |
ENCRYPT_TEST_DATA_4
|
sl@0
|
32 |
// To test setkey() and encrypt() functions with all ones in the bit vector of
|
sl@0
|
33 |
// key
|
sl@0
|
34 |
KEY :1111111111111111111111111111111111111111111111111111111111111111
|
sl@0
|
35 |
DATA_BLOCK :0111000101110011011000110111010011010001011010010110111101111111
|
sl@0
|
36 |
// A value of 0 indicates encryption
|
sl@0
|
37 |
ED_FLAG :0
|
sl@0
|
38 |
EXPECTED_OUTPUT:1101100001000111000111011001010111011111101101101111101010001100
|
sl@0
|
39 |
END_TEST_DATA
|
sl@0
|
40 |
|
sl@0
|
41 |
ENCRYPT_TEST_DATA_5
|
sl@0
|
42 |
// To test setkey() and encrypt() functions
|
sl@0
|
43 |
KEY :0101101001111010101010100101110001111101101010100111011111101010
|
sl@0
|
44 |
DATA_BLOCK :0000100110000000000000011110110100001001100001010000010100101100
|
sl@0
|
45 |
// A value of 0 indicates encryption
|
sl@0
|
46 |
ED_FLAG :0
|
sl@0
|
47 |
EXPECTED_OUTPUT:1001110010101010100010100010111111100110001001001101000000111110
|
sl@0
|
48 |
END_TEST_DATA
|
sl@0
|
49 |
|
sl@0
|
50 |
ENCRYPT_TEST_DATA_6
|
sl@0
|
51 |
// To test setkey() and encrypt() functions. KEY value is unchanged
|
sl@0
|
52 |
KEY :0101101001111010101010100101110001111101101010100111011111101010
|
sl@0
|
53 |
DATA_BLOCK :0111000101110011011000110111010011010001011010010110111101111111
|
sl@0
|
54 |
// A value of 0 indicates encryption
|
sl@0
|
55 |
ED_FLAG :0
|
sl@0
|
56 |
EXPECTED_OUTPUT:1010100110000001111010011100110101001111111010111001100000110100
|
sl@0
|
57 |
END_TEST_DATA
|
sl@0
|
58 |
|
sl@0
|
59 |
ENCRYPT_TEST_DATA_7
|
sl@0
|
60 |
// To test setkey() and encrypt() function. Key value is unchanged
|
sl@0
|
61 |
KEY :0101101001111010101010100101110001111101101010100111011111101010
|
sl@0
|
62 |
DATA_BLOCK :0000000000000000000000000000000000000000000000000000000000000000
|
sl@0
|
63 |
// A value of 0 indicates encryption
|
sl@0
|
64 |
ED_FLAG :0
|
sl@0
|
65 |
EXPECTED_OUTPUT:1111111101110111111110100101100000110110100100001110000110111111
|
sl@0
|
66 |
END_TEST_DATA
|
sl@0
|
67 |
|
sl@0
|
68 |
ENCRYPT_TEST_DATA_8
|
sl@0
|
69 |
// To test setkey() and encrypt() function. Key value is unchanged
|
sl@0
|
70 |
KEY :0101101001111010101010100101110001111101101010100111011111101010
|
sl@0
|
71 |
DATA_BLOCK :1111111111111111111111111111111111111111111111111111111111111111
|
sl@0
|
72 |
// A value of 0 indicates encryption
|
sl@0
|
73 |
ED_FLAG :0
|
sl@0
|
74 |
EXPECTED_OUTPUT: 1111110011010110011011000110100010111111001110111000011111101100
|
sl@0
|
75 |
END_TEST_DATA
|
sl@0
|
76 |
|
sl@0
|
77 |
ENCRYPT_TEST_DATA_9
|
sl@0
|
78 |
// To test setkey() and encrypt() function. ED_FLAG changed to denote a decrypt action.
|
sl@0
|
79 |
KEY :0101101001111010101010100101110001111101101010100111011111101010
|
sl@0
|
80 |
DATA_BLOCK :1111110011010110011011000110100010111111001110111000011111101100
|
sl@0
|
81 |
// A value of 0 indicates encryption
|
sl@0
|
82 |
ED_FLAG :1
|
sl@0
|
83 |
EXPECTED_OUTPUT: 11111111111111111111111111111111111111111111111111111111111111111
|
sl@0
|
84 |
END_TEST_DATA
|
sl@0
|
85 |
|
sl@0
|
86 |
CRYPT_TEST_DATA_1
|
sl@0
|
87 |
// To test crypt() function - DES algorithm. Password-eight characters in length
|
sl@0
|
88 |
PASSWORD :password
|
sl@0
|
89 |
SALT :XY
|
sl@0
|
90 |
EXPECTED_OUTPUT:XYGpusIMIT/IM
|
sl@0
|
91 |
END_TEST_DATA
|
sl@0
|
92 |
|
sl@0
|
93 |
CRYPT_TEST_DATA_2
|
sl@0
|
94 |
// To test crypt() function - DES algorithm. Password-less than eight characters
|
sl@0
|
95 |
// in length
|
sl@0
|
96 |
PASSWORD :passS
|
sl@0
|
97 |
SALT :XY
|
sl@0
|
98 |
EXPECTED_OUTPUT:XYGFf3I4Sg2K2
|
sl@0
|
99 |
END_TEST_DATA
|
sl@0
|
100 |
|
sl@0
|
101 |
CRYPT_TEST_DATA_3
|
sl@0
|
102 |
// To test crypt() function - DES algorithm. Password-less than eight characters
|
sl@0
|
103 |
// in length
|
sl@0
|
104 |
PASSWORD :pa
|
sl@0
|
105 |
SALT :9D
|
sl@0
|
106 |
EXPECTED_OUTPUT:9DWVv8b/n8C2M
|
sl@0
|
107 |
END_TEST_DATA
|
sl@0
|
108 |
|
sl@0
|
109 |
CRYPT_TEST_DATA_4
|
sl@0
|
110 |
// To test crypt() function - DES algorithm. Password-more than eight characters
|
sl@0
|
111 |
// in length
|
sl@0
|
112 |
PASSWORD :passwordXYTEY
|
sl@0
|
113 |
SALT :.Q
|
sl@0
|
114 |
EXPECTED_OUTPUT:.Q7kADsEJ1WMI
|
sl@0
|
115 |
END_TEST_DATA
|
sl@0
|
116 |
|
sl@0
|
117 |
CRYPT_TEST_DATA_5
|
sl@0
|
118 |
// To test crypt() function - DES algorithm. Password-more than eight characters
|
sl@0
|
119 |
// in length - notice that the output depends on the first eight characters of
|
sl@0
|
120 |
// the passowrd and "salt".
|
sl@0
|
121 |
PASSWORD :passwordXY367USH
|
sl@0
|
122 |
SALT :.Q
|
sl@0
|
123 |
EXPECTED_OUTPUT:.Q7kADsEJ1WMI
|
sl@0
|
124 |
END_TEST_DATA
|
sl@0
|
125 |
|
sl@0
|
126 |
CRYPT_TEST_DATA_6
|
sl@0
|
127 |
// To test crypt() function - DES algorithm. NULL as password with a valid "salt"
|
sl@0
|
128 |
PASSWORD :
|
sl@0
|
129 |
SALT :.Q
|
sl@0
|
130 |
EXPECTED_OUTPUT:.QJ.W2gUJgXaI
|
sl@0
|
131 |
END_TEST_DATA
|
sl@0
|
132 |
|
sl@0
|
133 |
CRYPT_TEST_DATA_7
|
sl@0
|
134 |
// To test crypt() function - DES algorithm. NULL as password with a valid "salt"
|
sl@0
|
135 |
PASSWORD :
|
sl@0
|
136 |
SALT :YU
|
sl@0
|
137 |
EXPECTED_OUTPUT:YU6VVzA5TJabA
|
sl@0
|
138 |
END_TEST_DATA
|
sl@0
|
139 |
|
sl@0
|
140 |
CRYPT_TEST_DATA_8
|
sl@0
|
141 |
// To test crypt() function - DES algorithm. NULL as password with a valid "salt"
|
sl@0
|
142 |
PASSWORD :
|
sl@0
|
143 |
SALT :/.
|
sl@0
|
144 |
EXPECTED_OUTPUT:/.elhbtlysKy6
|
sl@0
|
145 |
END_TEST_DATA
|
sl@0
|
146 |
|
sl@0
|
147 |
CRYPT_TEST_DATA_9
|
sl@0
|
148 |
// To test crypt() function - DES algorithm. NULL as password with a valid "salt"
|
sl@0
|
149 |
PASSWORD :
|
sl@0
|
150 |
SALT ://
|
sl@0
|
151 |
EXPECTED_OUTPUT://plGAV7Hp3Zo
|
sl@0
|
152 |
END_TEST_DATA
|
sl@0
|
153 |
|
sl@0
|
154 |
CRYPT_TEST_DATA_10
|
sl@0
|
155 |
// To test crypt() function - DES algorithm. NULL as password with a valid "salt"
|
sl@0
|
156 |
PASSWORD :
|
sl@0
|
157 |
SALT :aB
|
sl@0
|
158 |
EXPECTED_OUTPUT:aBtwyC/9wKybE
|
sl@0
|
159 |
END_TEST_DATA
|
sl@0
|
160 |
|
sl@0
|
161 |
CRYPT_TEST_DATA_11
|
sl@0
|
162 |
// To test crypt() function - DES algorithm. Valid password with a "salt" which
|
sl@0
|
163 |
// is one-character in length. Output differs from that of Linux's
|
sl@0
|
164 |
PASSWORD :OuEIW90I
|
sl@0
|
165 |
SALT :a
|
sl@0
|
166 |
EXPECTED_OUTPUT:
|
sl@0
|
167 |
END_TEST_DATA
|
sl@0
|
168 |
|
sl@0
|
169 |
CRYPT_TEST_DATA_12
|
sl@0
|
170 |
// To test crypt() function - DES algorithm. Valid password with a "salt" which
|
sl@0
|
171 |
// is longer two characters in length
|
sl@0
|
172 |
PASSWORD :OuEIW90I
|
sl@0
|
173 |
SALT :iKOI0
|
sl@0
|
174 |
EXPECTED_OUTPUT:iKr4GcNvuB/Wk
|
sl@0
|
175 |
END_TEST_DATA
|
sl@0
|
176 |
|
sl@0
|
177 |
CRYPT_TEST_DATA_13
|
sl@0
|
178 |
// To test crypt() function - DES algorithm. A valid password and no "salt"
|
sl@0
|
179 |
// Output differs from that of Linux's
|
sl@0
|
180 |
PASSWORD :uShyU7w9
|
sl@0
|
181 |
SALT :
|
sl@0
|
182 |
EXPECTED_OUTPUT:
|
sl@0
|
183 |
END_TEST_DATA
|
sl@0
|
184 |
|
sl@0
|
185 |
CRYPT_TEST_DATA_14
|
sl@0
|
186 |
// To test crypt() function. Both password and salt being
|
sl@0
|
187 |
// NULL. Output differs from that of Linux's
|
sl@0
|
188 |
PASSWORD :
|
sl@0
|
189 |
SALT :
|
sl@0
|
190 |
EXPECTED_OUTPUT:
|
sl@0
|
191 |
END_TEST_DATA
|
sl@0
|
192 |
|
sl@0
|
193 |
CRYPT_TEST_DATA_15
|
sl@0
|
194 |
// To test crypt() function - MD5 algorithm. Both password and salt
|
sl@0
|
195 |
// are valid
|
sl@0
|
196 |
PASSWORD :password
|
sl@0
|
197 |
SALT :$1$
|
sl@0
|
198 |
EXPECTED_OUTPUT:$1$$I2o9Z7NcvQAKp7wyCTlia0
|
sl@0
|
199 |
END_TEST_DATA
|
sl@0
|
200 |
|
sl@0
|
201 |
CRYPT_TEST_DATA_16
|
sl@0
|
202 |
// To test crypt() function - MD5 algorithm. Both password and salt
|
sl@0
|
203 |
// are valid with password being more than 8 characters in length
|
sl@0
|
204 |
PASSWORD :passwordUEI091H
|
sl@0
|
205 |
SALT :$1$
|
sl@0
|
206 |
EXPECTED_OUTPUT:$1$$V1X9nybzyUbSXdm8CAqve.
|
sl@0
|
207 |
END_TEST_DATA
|
sl@0
|
208 |
|
sl@0
|
209 |
CRYPT_TEST_DATA_018
|
sl@0
|
210 |
// To test crypt() function - MD5 algorithm. Both password and salt
|
sl@0
|
211 |
// are valid with password being more than 8 characters in length, and
|
sl@0
|
212 |
// '/' embedded within the string. Salt consists of "$1$" followed
|
sl@0
|
213 |
// by eight characters, and terminated by "$"
|
sl@0
|
214 |
PASSWORD :pass//rdI09Y.
|
sl@0
|
215 |
SALT :$1$password$
|
sl@0
|
216 |
EXPECTED_OUTPUT:$1$password$PnpYLDVZ8stpwScDiSk170
|
sl@0
|
217 |
END_TEST_DATA
|
sl@0
|
218 |
|
sl@0
|
219 |
CRYPT_TEST_DATA_17
|
sl@0
|
220 |
// To test crypt() function - MD5 algorithm. Both password and salt
|
sl@0
|
221 |
// are valid with password being more than 8 characters in length, and
|
sl@0
|
222 |
// '/' embedded within the string. Salt consists of "$1$" followed
|
sl@0
|
223 |
// by eight characters, and NOT terminated by "$"
|
sl@0
|
224 |
PASSWORD :pass//rdI09Y.
|
sl@0
|
225 |
SALT :$1$password
|
sl@0
|
226 |
EXPECTED_OUTPUT:$1$password$PnpYLDVZ8stpwScDiSk170
|
sl@0
|
227 |
END_TEST_DATA
|
sl@0
|
228 |
|
sl@0
|
229 |
CRYPT_TEST_DATA_18
|
sl@0
|
230 |
// To test crypt() function - MD5 algorithm. Both password and salt
|
sl@0
|
231 |
// are valid with password being more than 8 characters in length, and
|
sl@0
|
232 |
// '/' embedded within the string. Salt consists of just "$1$"
|
sl@0
|
233 |
PASSWORD :pass//rdI09Y.
|
sl@0
|
234 |
SALT :$1$
|
sl@0
|
235 |
EXPECTED_OUTPUT:$1$$Q.yyUXhIuZxEiqLaLs9Yt/
|
sl@0
|
236 |
END_TEST_DATA
|
sl@0
|
237 |
|
sl@0
|
238 |
CRYPT_TEST_DATA_19
|
sl@0
|
239 |
// To test crypt() function - MD5 algorithm. Both password and salt
|
sl@0
|
240 |
// are valid with the length of the password being less than 8.
|
sl@0
|
241 |
// Salt consists of just "$1$"
|
sl@0
|
242 |
PASSWORD ://URi
|
sl@0
|
243 |
SALT :$1$
|
sl@0
|
244 |
EXPECTED_OUTPUT:$1$$dNOmQGH620K312nN0mn1H/
|
sl@0
|
245 |
END_TEST_DATA
|
sl@0
|
246 |
|
sl@0
|
247 |
CRYPT_TEST_DATA_20
|
sl@0
|
248 |
// To test crypt() function - MD5 algorithm. Both password and salt
|
sl@0
|
249 |
// are valid with the length of the password being less than 8.
|
sl@0
|
250 |
// Salt consists of "$1$" followed by a string, and terminated by
|
sl@0
|
251 |
// "$"
|
sl@0
|
252 |
PASSWORD ://URi
|
sl@0
|
253 |
SALT :$1$paU7$
|
sl@0
|
254 |
EXPECTED_OUTPUT:$1$paU7$L1IzpLbp2c1NZn1fI5ZF3/
|
sl@0
|
255 |
END_TEST_DATA
|
sl@0
|
256 |
|
sl@0
|
257 |
CRYPT_TEST_DATA_21
|
sl@0
|
258 |
// To test crypt() function - MD5 algorithm. Both password and salt
|
sl@0
|
259 |
// are valid with the length of the password being less than 8.
|
sl@0
|
260 |
// Salt consists of "$1$" followed by a string, and NOT terminated by
|
sl@0
|
261 |
// "$"
|
sl@0
|
262 |
PASSWORD ://URi
|
sl@0
|
263 |
SALT :$1$paU7
|
sl@0
|
264 |
EXPECTED_OUTPUT:$1$paU7$L1IzpLbp2c1NZn1fI5ZF3/
|
sl@0
|
265 |
END_TEST_DATA
|
sl@0
|
266 |
|
sl@0
|
267 |
CRYPT_TEST_DATA_22
|
sl@0
|
268 |
// To test crypt() function - MD5 algorithm. Both password and salt
|
sl@0
|
269 |
// are valid with the length of the password being less than 8.
|
sl@0
|
270 |
// Salt consists of just "$1$"
|
sl@0
|
271 |
PASSWORD ://URi
|
sl@0
|
272 |
SALT :$1$
|
sl@0
|
273 |
EXPECTED_OUTPUT:$1$$dNOmQGH620K312nN0mn1H/
|
sl@0
|
274 |
END_TEST_DATA
|
sl@0
|
275 |
|
sl@0
|
276 |
CRYPT_TEST_DATA_23
|
sl@0
|
277 |
// To test crypt() function - MD5 algorithm. NULL as password and "$1$"
|
sl@0
|
278 |
// as salt
|
sl@0
|
279 |
PASSWORD :
|
sl@0
|
280 |
SALT :$1$
|
sl@0
|
281 |
EXPECTED_OUTPUT:$1$$qRPK7m23GJusamGpoGLby/
|
sl@0
|
282 |
END_TEST_DATA
|
sl@0
|
283 |
|
sl@0
|
284 |
CRYPT_TEST_DATA_24
|
sl@0
|
285 |
// To test crypt() function - MD5 algorithm. NULL as password. Salt consists
|
sl@0
|
286 |
// of "$1$" followed by a string, and terminated by "$"
|
sl@0
|
287 |
PASSWORD :
|
sl@0
|
288 |
SALT :$1$oI./$
|
sl@0
|
289 |
EXPECTED_OUTPUT:$1$oI./$rZsQHWhxaiZQFk7TPVtZv0
|
sl@0
|
290 |
END_TEST_DATA
|
sl@0
|
291 |
|
sl@0
|
292 |
CRYPT_TEST_DATA_25
|
sl@0
|
293 |
// To test crypt() function - MD5 algorithm. NULL as password. Salt consists
|
sl@0
|
294 |
// of "$1$" followed by a string with a "$" embedded within the string, and
|
sl@0
|
295 |
// NOT terminated by "$"
|
sl@0
|
296 |
PASSWORD :
|
sl@0
|
297 |
SALT :$1$o$./
|
sl@0
|
298 |
EXPECTED_OUTPUT:$1$o$q44o3M/kTKnXAewu70WtZ/
|
sl@0
|
299 |
END_TEST_DATA
|
sl@0
|
300 |
|
sl@0
|
301 |
CRYPT_TEST_DATA_26
|
sl@0
|
302 |
// To test crypt() function - MD5 algorithm. NULL as password. Salt consists
|
sl@0
|
303 |
// of "$1$" followed by a string, and NOT terminated by "$"
|
sl@0
|
304 |
PASSWORD :
|
sl@0
|
305 |
SALT :$1$oi8URVn
|
sl@0
|
306 |
EXPECTED_OUTPUT:$1$oi8URVn$f8o6zSdfLb/OggBchx70f0
|
sl@0
|
307 |
END_TEST_DATA
|
sl@0
|
308 |
|