diff options
| author | Sven Moritz Hallberg <pesco@khjk.org> | 2008-07-17 01:22:52 +0200 | 
|---|---|---|
| committer | Sven Moritz Hallberg <pesco@khjk.org> | 2008-07-17 01:22:52 +0200 | 
| commit | 6738a676c7a3895988de4bd9eacfe8fa0ef73cc3 (patch) | |
| tree | d95d913484cf79ff4a3c6d920a4d9b92ecd66de9 /tests/check_arc.c | |
| parent | 9730d7250bb9e938ca00b72efdd8e8b3c03b2753 (diff) | |
| parent | 6a78c0eed44820a2fefe1e96516e335eddc9c70b (diff) | |
merge in latest trunk
Diffstat (limited to 'tests/check_arc.c')
| -rw-r--r-- | tests/check_arc.c | 35 | 
1 files changed, 22 insertions, 13 deletions
| diff --git a/tests/check_arc.c b/tests/check_arc.c index a430f899..9d913dcd 100644 --- a/tests/check_arc.c +++ b/tests/check_arc.c @@ -6,13 +6,14 @@  #include <stdio.h>  #include "arc.h" -char *password = "TotT"; +char *password = "ArcVier";  char *clear_tests[] =  {  	"Wie dit leest is gek :-)",  	"ItllBeBitlBee",  	"One more boring password", +	"Hoi hoi",  	NULL  }; @@ -27,7 +28,7 @@ static void check_codec(int l)  		char *decrypted;  		int len; -		len = arc_encode( clear_tests[i], 0, &crypted, password ); +		len = arc_encode( clear_tests[i], 0, &crypted, password, 12 );  		len = arc_decode( crypted, len, &decrypted, password );  		fail_if( strcmp( clear_tests[i], decrypted ) != 0, @@ -40,27 +41,35 @@ static void check_codec(int l)  struct  { -	unsigned char crypted[24]; +	unsigned char crypted[30];  	int len;  	char *decrypted;  } decrypt_tests[] = { +	/* One block with padding. */  	{  		{ -			0xc3, 0x0d, 0x43, 0xc3, 0xee, 0x80, 0xe2, 0x8c, 0x0b, 0x29, 0x32, 0x7e, -			0x38, 0x05, 0x82, 0x10, 0x21, 0x1c, 0x4a, 0x00, 0x2c -		}, 21, "Debugging sucks" +			0x3f, 0x79, 0xb0, 0xf5, 0x91, 0x56, 0xd2, 0x1b, 0xd1, 0x4b, 0x67, 0xac, +			0xb1, 0x31, 0xc9, 0xdb, 0xf9, 0xaa +		}, 18, "short pass"  	}, +	 +	/* Two blocks with padding. */  	{  		{ -			0xb0, 0x00, 0x57, 0x0d, 0x0d, 0x0d, 0x70, 0xe1, 0xc0, 0x00, 0xa4, 0x25, -			0x7d, 0xbe, 0x03, 0xcc, 0x24, 0xd1, 0x0c -		}, 19, "Testing rocks" +			0xf9, 0xa6, 0xec, 0x5d, 0xc7, 0x06, 0xb8, 0x6b, 0x63, 0x9f, 0x2d, 0xb5, +			0x7d, 0xaa, 0x32, 0xbb, 0xd8, 0x08, 0xfd, 0x81, 0x2e, 0xca, 0xb4, 0xd7, +			0x2f, 0x36, 0x9c, 0xac, 0xa0, 0xbc +		}, 30, "longer password"  	}, + +	/* This string is exactly two "blocks" long, to make sure unpadded strings also decrypt +	   properly. */  	{  		{ -			0xb6, 0x92, 0x59, 0xe4, 0xf9, 0xc1, 0x7a, 0xf6, 0xf3, 0x18, 0xea, 0x28, -			0x73, 0x6d, 0xb3, 0x0a, 0x6f, 0x0a, 0x2b, 0x43, 0x57, 0xe9, 0x3e, 0x63 -		}, 24, "OSCAR is creepy..." +			0x95, 0x4d, 0xcf, 0x4d, 0x5e, 0x6c, 0xcf, 0xef, 0xb9, 0x80, 0x00, 0xef, +			0x25, 0xe9, 0x17, 0xf6, 0x29, 0x6a, 0x82, 0x79, 0x1c, 0xca, 0x68, 0xb5, +			0x4e, 0xd0, 0xc1, 0x41, 0x8e, 0xe6 +		}, 30, "OSCAR is really creepy.."  	},  	{ "", 0, NULL }  }; @@ -79,7 +88,7 @@ static void check_decod(int l)  		                  &decrypted, password );  		fail_if( strcmp( decrypt_tests[i].decrypted, decrypted ) != 0, -		         "%s didn't decrypt properly", clear_tests[i] ); +		         "`%s' didn't decrypt properly", decrypt_tests[i].decrypted );  		g_free( decrypted );  	} | 
