File: legacy_password_test.c

package info (click to toggle)
grub2 2.02%2Bdfsg1-20
  • links: PTS, VCS
  • area: main
  • in suites: buster
  • size: 61,784 kB
  • sloc: ansic: 384,086; asm: 16,323; sh: 13,230; cpp: 1,994; makefile: 1,488; python: 1,458; sed: 423; lex: 393; yacc: 267; awk: 75; lisp: 50; perl: 31
file content (68 lines) | stat: -rw-r--r-- 2,450 bytes parent folder | download | duplicates (15)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
/*
 *  GRUB  --  GRand Unified Bootloader
 *  Copyright (C) 2013 Free Software Foundation, Inc.
 *
 *  GRUB is free software: you can redistribute it and/or modify
 *  it under the terms of the GNU General Public License as published by
 *  the Free Software Foundation, either version 3 of the License, or
 *  (at your option) any later version.
 *
 *  GRUB is distributed in the hope that it will be useful,
 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 *  GNU General Public License for more details.
 *
 *  You should have received a copy of the GNU General Public License
 *  along with GRUB.  If not, see <http://www.gnu.org/licenses/>.
 */

#include <grub/test.h>
#include <grub/dl.h>
#include <grub/misc.h>
#include <grub/crypto.h>
#include <grub/legacy_parse.h>
#include <grub/auth.h>

GRUB_MOD_LICENSE ("GPLv3+");

static struct
{
  char **args;
  int argc;
  char entered[GRUB_AUTH_MAX_PASSLEN];
  int exp;
} vectors[] = {
  { (char * []) { (char *) "hello", NULL }, 1, "hello", 1 },
  { (char * []) { (char *) "hello", NULL }, 1, "hi", 0 },
  { (char * []) { (char *) "hello", NULL }, 1, "hillo", 0 },
  { (char * []) { (char *) "hello", NULL }, 1, "hellw", 0 },
  { (char * []) { (char *) "hello", NULL }, 1, "hell", 0 },
  { (char * []) { (char *) "hello", NULL }, 1, "h", 0 },
  { (char * []) { (char *) "--md5", (char *) "$1$maL$OKEF0PD2k6eQ0Po8u4Gjr/",
		  NULL }, 2, "hello", 1 },
  { (char * []) { (char *) "--md5", (char *) "$1$maL$OKEF0PD2k6eQ0Po8u4Gjr/",
		  NULL }, 2, "hell", 0 },
  { (char * []) { (char *) "--md5", (char *) "$1$naL$BaFO8zGgmss1E76GsrAec1",
		  NULL }, 2, "hello", 1 },
  { (char * []) { (char *) "--md5", (char *) "$1$naL$BaFO8zGgmss1E76GsrAec1",
		  NULL }, 2, "hell", 0 },
  { (char * []) { (char *) "--md5", (char *) "$1$oaL$eyrazuM7TkxVkKgBim1WH1",
		  NULL }, 2, "hi", 1 },
  { (char * []) { (char *) "--md5", (char *) "$1$oaL$eyrazuM7TkxVkKgBim1WH1",
		  NULL }, 2, "hello", 0 },
};

static void
legacy_password_test (void)
{
  grub_size_t i;

  for (i = 0; i < ARRAY_SIZE (vectors); i++)
    grub_test_assert (grub_legacy_check_md5_password (vectors[i].argc,
						      vectors[i].args,
						      vectors[i].entered)
		      == vectors[i].exp, "Bad password check (%d)", (int) i);
}

/* Register example_test method as a functional test.  */
GRUB_FUNCTIONAL_TEST (legacy_password_test, legacy_password_test);