joey                                     Fri, 19 Feb 2010 21:08:35 +0000

Revision: http://svn.php.net/viewvc?view=revision&revision=295264

Log:
Tests for upcoming patches to crypt, as discussed with Pierre over IRC.

Changed paths:
    A   php/php-src/trunk/ext/standard/tests/strings/bug51059.phpt
    A   
php/php-src/trunk/ext/standard/tests/strings/crypt_blowfish_invalid_rounds.phpt

Added: php/php-src/trunk/ext/standard/tests/strings/bug51059.phpt
===================================================================
--- php/php-src/trunk/ext/standard/tests/strings/bug51059.phpt                  
        (rev 0)
+++ php/php-src/trunk/ext/standard/tests/strings/bug51059.phpt  2010-02-19 
21:08:35 UTC (rev 295264)
@@ -0,0 +1,11 @@
+--TEST--
+Bug #51059 crypt() segfaults on certain salts
+--FILE--
+<?php
+
+if (crypt('a', '_') === FALSE) echo 'OK';
+else echo 'Not OK';
+
+?>
+--EXPECT--
+OK

Added: 
php/php-src/trunk/ext/standard/tests/strings/crypt_blowfish_invalid_rounds.phpt
===================================================================
--- 
php/php-src/trunk/ext/standard/tests/strings/crypt_blowfish_invalid_rounds.phpt 
                            (rev 0)
+++ 
php/php-src/trunk/ext/standard/tests/strings/crypt_blowfish_invalid_rounds.phpt 
    2010-02-19 21:08:35 UTC (rev 295264)
@@ -0,0 +1,22 @@
+--TEST--
+Test Blowfish crypt() with invalid rounds
+--FILE--
+<?php
+
+foreach(range(32, 38) as $i) {
+  if (crypt('U*U', '$2a$'.$i.'$CCCCCCCCCCCCCCCCCCCCCC$') === FALSE) {
+    echo "$i. OK\n";
+  } else {
+    echo "$i. Not OK\n";
+  }
+}
+
+?>
+--EXPECT--
+32. OK
+33. OK
+34. OK
+35. OK
+36. OK
+37. OK
+38. OK

-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to