joey Fri, 19 Feb 2010 21:08:35 +0000 Revision: http://svn.php.net/viewvc?view=revision&revision=295264
Log: Tests for upcoming patches to crypt, as discussed with Pierre over IRC. Changed paths: A php/php-src/trunk/ext/standard/tests/strings/bug51059.phpt A php/php-src/trunk/ext/standard/tests/strings/crypt_blowfish_invalid_rounds.phpt Added: php/php-src/trunk/ext/standard/tests/strings/bug51059.phpt =================================================================== --- php/php-src/trunk/ext/standard/tests/strings/bug51059.phpt (rev 0) +++ php/php-src/trunk/ext/standard/tests/strings/bug51059.phpt 2010-02-19 21:08:35 UTC (rev 295264) @@ -0,0 +1,11 @@ +--TEST-- +Bug #51059 crypt() segfaults on certain salts +--FILE-- +<?php + +if (crypt('a', '_') === FALSE) echo 'OK'; +else echo 'Not OK'; + +?> +--EXPECT-- +OK Added: php/php-src/trunk/ext/standard/tests/strings/crypt_blowfish_invalid_rounds.phpt =================================================================== --- php/php-src/trunk/ext/standard/tests/strings/crypt_blowfish_invalid_rounds.phpt (rev 0) +++ php/php-src/trunk/ext/standard/tests/strings/crypt_blowfish_invalid_rounds.phpt 2010-02-19 21:08:35 UTC (rev 295264) @@ -0,0 +1,22 @@ +--TEST-- +Test Blowfish crypt() with invalid rounds +--FILE-- +<?php + +foreach(range(32, 38) as $i) { + if (crypt('U*U', '$2a$'.$i.'$CCCCCCCCCCCCCCCCCCCCCC$') === FALSE) { + echo "$i. OK\n"; + } else { + echo "$i. Not OK\n"; + } +} + +?> +--EXPECT-- +32. OK +33. OK +34. OK +35. OK +36. OK +37. OK +38. OK
-- PHP CVS Mailing List (http://www.php.net/) To unsubscribe, visit: http://www.php.net/unsub.php