|
|
|
@ -76,11 +76,12 @@ my @sha_tests =
|
|
|
|
|
expected => '$6$rounds=1000$roundstoolow$kUMsbe306n21p9R.FRkW3IGn.S9NPN0x50YhH1xhLsPuWGsUSklZt58jaTfF4ZEQpyUNGc0dqbpBYYBaHHrsX.' }
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
plan tests => (disabled("des") || disabled("deprecated") ? 9 : 11) + scalar @sha_tests;
|
|
|
|
|
plan tests => (disabled("des") || disabled('deprecated-3.0') ? 9 : 11) + scalar @sha_tests;
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ok(compare1stline_re([qw{openssl passwd password}], '^.{13}\R$'),
|
|
|
|
|
'crypt password with random salt') if !disabled("des") && !disabled("deprecated");
|
|
|
|
|
'crypt password with random salt')
|
|
|
|
|
if !disabled("des") && !disabled('deprecated-3.0');
|
|
|
|
|
ok(compare1stline_re([qw{openssl passwd -1 password}], '^\$1\$.{8}\$.{22}\R$'),
|
|
|
|
|
'BSD style MD5 password with random salt');
|
|
|
|
|
ok(compare1stline_re([qw{openssl passwd -apr1 password}], '^\$apr1\$.{8}\$.{22}\R$'),
|
|
|
|
@ -91,7 +92,8 @@ ok(compare1stline_re([qw{openssl passwd -6 password}], '^\$6\$.{16}\$.{86}\R$'),
|
|
|
|
|
'Apache SHA512 password with random salt');
|
|
|
|
|
|
|
|
|
|
ok(compare1stline([qw{openssl passwd -salt xx password}], 'xxj31ZMTZzkVA'),
|
|
|
|
|
'crypt password with salt xx') if !disabled("des") && !disabled("deprecated");
|
|
|
|
|
'crypt password with salt xx')
|
|
|
|
|
if !disabled("des") && !disabled('deprecated-3.0');
|
|
|
|
|
ok(compare1stline([qw{openssl passwd -salt xxxxxxxx -1 password}], '$1$xxxxxxxx$UYCIxa628.9qXjpQCjM4a.'),
|
|
|
|
|
'BSD style MD5 password with salt xxxxxxxx');
|
|
|
|
|
ok(compare1stline([qw{openssl passwd -salt xxxxxxxx -apr1 password}], '$apr1$xxxxxxxx$dxHfLAsjHkDRmG83UXe8K0'),
|
|
|
|
|