File: crypt_blowfish_variation1.phpt

package info (click to toggle)
php5 5.3.3-7%2Bsqueeze19
  • links: PTS, VCS
  • area: main
  • in suites: squeeze
  • size: 122,836 kB
  • ctags: 55,742
  • sloc: ansic: 633,963; php: 19,620; sh: 11,344; xml: 5,816; cpp: 2,400; yacc: 1,745; exp: 1,514; makefile: 1,019; pascal: 623; awk: 537; sql: 22
file content (37 lines) | stat: -rw-r--r-- 856 bytes parent folder | download | duplicates (7)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
--TEST--
Test Blowfish crypt() with invalid rounds
--SKIPIF--
<?php
if (!function_exists('crypt') || !defined("CRYPT_BLOWFISH")) {
    die("SKIP crypt()-blowfish is not available");
}
?>
--FILE--
<?php

$salts = array(b'32' => b'$2a$32$CCCCCCCCCCCCCCCCCCCCCC$',
               b'33' => b'$2a$33$CCCCCCCCCCCCCCCCCCCCCC$',
               b'34' => b'$2a$34$CCCCCCCCCCCCCCCCCCCCCC$',
               b'35' => b'$2a$35$CCCCCCCCCCCCCCCCCCCCCC$',
               b'36' => b'$2a$36$CCCCCCCCCCCCCCCCCCCCCC$',
               b'37' => b'$2a$37$CCCCCCCCCCCCCCCCCCCCCC$',
               b'38' => b'$2a$38$CCCCCCCCCCCCCCCCCCCCCC$',);

foreach($salts as $i=>$salt) {
  $crypt = crypt(b'U*U', $salt);
  if ($crypt === b'*0' || $crypt === b'*1') {
    echo "$i. OK\n";
  } else {
    echo "$i. Not OK\n";
  }
}

?>
--EXPECT--
32. OK
33. OK
34. OK
35. OK
36. OK
37. OK
38. OK