lemonldap-ng/lemonldap-ng-common/t/35-Common-Crypto.t

62 lines
1.7 KiB
Perl
Raw Normal View History

2010-10-11 22:25:42 +02:00
# Before `make install' is performed this script should be runnable with
# `make test'. After `make install' it should work as `perl Lemonldap-NG-Common.t'
#########################
# change 'tests => 1' to 'tests => last_test_to_print';
2019-06-30 23:11:39 +02:00
use Test::More tests => 21;
use Digest::MD5 qw(md5 md5_hex md5_base64);
2010-10-12 07:56:40 +02:00
use strict;
BEGIN {
use_ok('Lemonldap::NG::Common::Crypto');
}
2010-10-11 22:25:42 +02:00
#########################
2018-08-31 19:30:18 +02:00
# Insert your test code below, the Test::More module is used here so read
2010-10-11 22:25:42 +02:00
# its man page ( perldoc Test::More ) for help writing this test script.
2010-10-12 07:56:40 +02:00
my $c;
ok(
$c = Lemonldap::NG::Common::Crypto->new(
'lemonldap-ng-key', Crypt::Rijndael::MODE_CBC()
),
'New object'
);
foreach my $i ( 1 .. 17 ) {
my $s = '';
$s = join( '', map { chr( int( rand(94) ) + 33 ) } ( 1 .. $i ) );
ok( $c->decrypt( $c->encrypt($s) ) eq $s,
"Test of base64 encrypting with $i characters string" )
2019-06-30 23:11:39 +02:00
or diagErr( $s, $c->decrypt( $c->encrypt($s) ), $c->encrypt($s) );
2010-10-12 07:56:40 +02:00
}
2012-02-29 14:19:57 +01:00
my $data = md5_hex(rand);
my $secondKey = md5(rand);
ok(
2012-02-29 14:19:57 +01:00
$c->decryptHex( $c->encryptHex( $data, $secondKey ), $secondKey ) eq $data,
"Test of hexadecimal encrypting"
2019-06-30 23:11:39 +02:00
)
or diagErr(
$data,
$c->decryptHex( $c->encryptHex( $data, $secondKey ), $secondKey ),
$c->encryptHex( $data, $secondKey )
);
# Test a long value, and replace carriage return by %0A
2019-06-30 23:11:39 +02:00
my $long = Lemonldap::NG::Common::Crypto::srandom()->randpattern( "s" x 1000 );
ok( $c->decrypt( $c->encrypt($long) ) eq $long,
2019-06-30 23:11:39 +02:00
"Test of long value encrypting" )
or diagErr(
$long,
$c->decryptHex( $c->encryptHex($long) ),
$c->encryptHex($long)
);
sub diagErr {
diag "Expect: $_[0]\nGet : $_[1]\nCipher: $_[2]";
}