1#!./perl -w 2 3BEGIN { 4 chdir 't' if -d 't'; 5 @INC = qw(. ../lib); 6} 7 8BEGIN { 9 use Config; 10 11 require "test.pl"; 12 13 if( !$Config{d_crypt} ) { 14 skip_all("crypt unimplemented"); 15 } 16 else { 17 plan(tests => 4); 18 } 19} 20 21# Can't assume too much about the string returned by crypt(), 22# and about how many bytes of the encrypted (really, hashed) 23# string matter. 24# 25# HISTORICALLY the results started with the first two bytes of the salt, 26# followed by 11 bytes from the set [./0-9A-Za-z], and only the first 27# eight characters mattered, but those are probably no more safe 28# bets, given alternative encryption/hashing schemes like MD5, 29# C2 (or higher) security schemes, and non-UNIX platforms. 30 31SKIP: { 32 skip ("VOS crypt ignores salt.", 1) if ($^O eq 'vos'); 33 ok(substr(crypt("ab", "cd"), 2) ne substr(crypt("ab", "ce"), 2), "salt makes a difference"); 34} 35 36$a = "a\xFF\x{100}"; 37 38eval {$b = crypt($a, "cd")}; 39like($@, qr/Wide character in crypt/, "wide characters ungood"); 40 41chop $a; # throw away the wide character 42 43eval {$b = crypt($a, "cd")}; 44is($@, '', "downgrade to eight bit characters"); 45is($b, crypt("a\xFF", "cd"), "downgrade results agree"); 46 47