30#if defined(WIN32) || defined(BEOS) || defined(NETWARE)
31#define CRYPT_ALGO_SUPPORTED 0
33#define CRYPT_ALGO_SUPPORTED 1
36#if defined __GLIBC_PREREQ
37#if __GLIBC_PREREQ(2,7)
38#define GLIBCSHA_ALGO_SUPPORTED
42#if CRYPT_ALGO_SUPPORTED
62 {
"pass1",
"1fWDc9QWYCWrQ"},
63 {
"pass2",
"1fiGx3u7QoXaM"},
64 {
"pass3",
"1fzijMylTiwCs"},
65 {
"pass4",
"nHUYc8U2UOP7s"},
66 {
"pass5",
"nHpETGLGPwAmA"},
67 {
"pass6",
"nHbsbWmJ3uyhc"},
68 {
"pass7",
"nHQ3BbF0Y9vpI"},
69 {
"pass8",
"nHZA1rViSldQk"}
92 for (
i = 0;
i < 100;
i++) {
124 const char *
pass =
"hellojed";
125 const char *
pass2 =
"hellojed2";
138 const char *
pass =
"hellojed", *
salt =
"sardine";
139 const char *
pass2 =
"hellojed2";
150#ifdef GLIBCSHA_ALGO_SUPPORTED
157 {
"secret1",
"$5$0123456789abcdef$SFX.CooXBS8oXsbAPgU/UyiCodhrLQ19sBgvcA3Zh1D" },
158 {
"secret2",
"$5$rounds=100000$0123456789abcdef$dLXfO5m4d.xv8G66kpz2LyL0.Mi5wjLlH0m7rtgyhyB" },
160 {
"secret3",
"$6$0123456789abcdef$idOsOfoWwnCQkJm9hd2hxS4NnEs9nBA9poOFXsvtrYSoSHaOToCfyUoZwKe.ZCZnq7D95tGVoi2jxZZMyVwTL1" },
161 {
"secret4",
"$6$rounds=100000$0123456789abcdef$ZiAMjbeA.iIGTWxq2oks9Bvz9sfxaoGPgAtpwimPEwFwkSNMTK7lLwABzzldds/n4UgCQ16HqawPrCrePr4YX1" },
179 const char *
pass =
"hellojed";
180 const char *
pass2 =
"hellojed2";
181 unsigned char salt[] =
"sardine_sardine";
183 const char *
hash2 =
"$2a$08$qipUJiI9fySUN38hcbz.lucXvAmtgowKOWYtB9y3CXyl6lTknruou";
184 const char *
pass3 =
"foobar";
203#if CRYPT_ALGO_SUPPORTED
212#ifdef GLIBCSHA_ALGO_SUPPORTED
#define APR_ASSERT_FAILURE(tc, ctxt, rv)
void abts_run_test(abts_suite *ts, test_func f, void *value)
#define ABTS_INT_EQUAL(a, b, c)
void apr_assert_success(abts_case *tc, const char *context, apr_status_t rv, int lineno)
static void test_crypt(abts_case *tc, void *data)
abts_suite * testpass(abts_suite *suite)
static void test_shapass(abts_case *tc, void *data)
static void test_md5pass(abts_case *tc, void *data)
static void test_bcryptpass(abts_case *tc, void *data)
static struct @71 passwords[]