joey Fri, 19 Feb 2010 21:08:35 +0000
Revision: http://svn.php.net/viewvc?view=revision&revision=295264
Log:
Tests for upcoming patches to crypt, as discussed with Pierre over IRC.
Changed paths:
A php/php-src/trunk/ext/standard/tests/strings/bug51059.phpt
A
php/php-src/trunk/ext/standard/tests/strings/crypt_blowfish_invalid_rounds.phpt
Added: php/php-src/trunk/ext/standard/tests/strings/bug51059.phpt
===================================================================
--- php/php-src/trunk/ext/standard/tests/strings/bug51059.phpt
(rev 0)
+++ php/php-src/trunk/ext/standard/tests/strings/bug51059.phpt 2010-02-19
21:08:35 UTC (rev 295264)
@@ -0,0 +1,11 @@
+--TEST--
+Bug #51059 crypt() segfaults on certain salts
+--FILE--
+<?php
+
+if (crypt('a', '_') === FALSE) echo 'OK';
+else echo 'Not OK';
+
+?>
+--EXPECT--
+OK
Added:
php/php-src/trunk/ext/standard/tests/strings/crypt_blowfish_invalid_rounds.phpt
===================================================================
---
php/php-src/trunk/ext/standard/tests/strings/crypt_blowfish_invalid_rounds.phpt
(rev 0)
+++
php/php-src/trunk/ext/standard/tests/strings/crypt_blowfish_invalid_rounds.phpt
2010-02-19 21:08:35 UTC (rev 295264)
@@ -0,0 +1,22 @@
+--TEST--
+Test Blowfish crypt() with invalid rounds
+--FILE--
+<?php
+
+foreach(range(32, 38) as $i) {
+ if (crypt('U*U', '$2a$'.$i.'$CCCCCCCCCCCCCCCCCCCCCC$') === FALSE) {
+ echo "$i. OK\n";
+ } else {
+ echo "$i. Not OK\n";
+ }
+}
+
+?>
+--EXPECT--
+32. OK
+33. OK
+34. OK
+35. OK
+36. OK
+37. OK
+38. OK
--
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php