Add a test for 'openssl passwd'

Also, enlarge test group 20 to include openssl commands that aren't
tested otherwise

Reviewed-by: Rich Salz <rsalz@openssl.org>
This commit is contained in:
Richard Levitte 2016-09-13 23:23:51 +02:00
parent 9f9f962d96
commit 497f3bf9a7
2 changed files with 39 additions and 1 deletions

View file

@ -22,7 +22,7 @@ The number {nn} is (somewhat loosely) grouped as follows:
05 individual symmetric cipher algorithms 05 individual symmetric cipher algorithms
10 math (bignum) 10 math (bignum)
15 individual asymmetric cipher algorithms 15 individual asymmetric cipher algorithms
20 openssl enc 20 openssl commands (some otherwise not tested)
25 certificate forms, generation and verification 25 certificate forms, generation and verification
30 engine and evp 30 engine and evp
70 PACKET layer 70 PACKET layer

View file

@ -0,0 +1,38 @@
#! /usr/bin/env perl
# Copyright 2015-2016 The OpenSSL Project Authors. All Rights Reserved.
#
# Licensed under the OpenSSL license (the "License"). You may not use
# this file except in compliance with the License. You can obtain a copy
# in the file LICENSE in the source distribution or at
# https://www.openssl.org/source/license.html
use strict;
use warnings;
use OpenSSL::Test;
setup("test_passwd");
plan tests => 6;
ok(compare1stline([qw{openssl passwd password}], '^.{13}\R$'),
'crypt password with random salt');
ok(compare1stline([qw{openssl passwd -1 password}], '^\$1\$.{8}\$.{22}\R$'),
'BSD style MD5 password with random salt');
ok(compare1stline([qw{openssl passwd -apr1 password}], '^\$apr1\$.{8}\$.{22}\R$'),
'Apache style MD5 password with random salt');
ok(compare1stline([qw{openssl passwd -salt xx password}], '^xxj31ZMTZzkVA\R$'),
'crypt password with salt xx');
ok(compare1stline([qw{openssl passwd -salt xxxxxxxx -1 password}], '^\$1\$xxxxxxxx\$UYCIxa628\.9qXjpQCjM4a\.\R$'),
'BSD style MD5 password with salt xxxxxxxx');
ok(compare1stline([qw{openssl passwd -salt xxxxxxxx -apr1 password}], '^\$apr1\$xxxxxxxx\$dxHfLAsjHkDRmG83UXe8K0\R$'),
'Apache style MD5 password with salt xxxxxxxx');
sub compare1stline {
my ($cmdarray, $regexp) = @_;
my @lines = run(app($cmdarray), capture => 1);
return $lines[0] =~ m|$regexp|;
}