2012-11-08 16:52:37 +00:00
|
|
|
#
|
|
|
|
# Test crypto
|
|
|
|
#
|
|
|
|
echo "#################################################"
|
|
|
|
echo "# Crypto tests"
|
|
|
|
echo "#################################################"
|
|
|
|
|
|
|
|
for algo in lzfx adapt2
|
|
|
|
do
|
2013-01-02 17:26:21 +00:00
|
|
|
for tf in `cat files.lst`
|
2012-11-08 16:52:37 +00:00
|
|
|
do
|
2013-01-02 17:26:21 +00:00
|
|
|
rm -f ${tf}.*
|
2012-12-15 16:33:23 +00:00
|
|
|
for feat in "-e" "-e -L -S SHA256" "-D -e -S SHA512" "-D -EE -L -e -S SKEIN512" "-e -S CRC64" "-e -P" "-e -L -P -S KECCAK256" "-D -e -L -S KECCAK512"
|
2012-11-08 16:52:37 +00:00
|
|
|
do
|
|
|
|
for seg in 2m 100m
|
|
|
|
do
|
|
|
|
echo "sillypassword" > /tmp/pwf
|
|
|
|
cmd="../../pcompress -c ${algo} -l 3 -s ${seg} $feat -w /tmp/pwf ${tf}"
|
|
|
|
echo "Running $cmd"
|
|
|
|
eval $cmd
|
|
|
|
if [ $? -ne 0 ]
|
|
|
|
then
|
2013-01-02 18:57:18 +00:00
|
|
|
echo "FATAL: Compression errored."
|
|
|
|
rm -f ${tf}.pz
|
|
|
|
continue
|
2012-11-08 16:52:37 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
pw=`cat /tmp/pwf`
|
|
|
|
if [ "$pw" = "sillypassword" ]
|
|
|
|
then
|
2012-12-08 08:49:01 +00:00
|
|
|
echo "FATAL: Password file /tmp/pwf not zeroed!"
|
2012-11-08 16:52:37 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
echo "sillypassword" > /tmp/pwf
|
|
|
|
cmd="../../pcompress -d -w /tmp/pwf ${tf}.pz ${tf}.1"
|
|
|
|
echo "Running $cmd"
|
|
|
|
eval $cmd
|
|
|
|
if [ $? -ne 0 ]
|
|
|
|
then
|
2013-01-02 18:57:18 +00:00
|
|
|
echo "FATAL: Decompression errored."
|
|
|
|
rm -f ${tf}.pz ${tf}.1
|
|
|
|
continue
|
2012-11-08 16:52:37 +00:00
|
|
|
fi
|
|
|
|
|
2012-11-09 14:35:13 +00:00
|
|
|
diff ${tf} ${tf}.1 > /dev/null
|
|
|
|
if [ $? -ne 0 ]
|
2012-11-08 16:52:37 +00:00
|
|
|
then
|
2013-01-02 18:57:18 +00:00
|
|
|
echo "FATAL: Decompression was not correct"
|
|
|
|
rm -f ${tf}.pz ${tf}.1
|
|
|
|
continue
|
2012-11-08 16:52:37 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
pw=`cat /tmp/pwf`
|
|
|
|
if [ "$pw" = "sillypassword" ]
|
|
|
|
then
|
2012-12-08 08:49:01 +00:00
|
|
|
echo "FATAL: Password file /tmp/pwf not zeroed!"
|
|
|
|
fi
|
|
|
|
|
|
|
|
#
|
|
|
|
# Now try decompression with invalid password. It should
|
|
|
|
# fail.
|
|
|
|
#
|
|
|
|
rm -f ${tf}.1
|
|
|
|
cmd="../../pcompress -d -w /tmp/pwf ${tf}.pz ${tf}.1"
|
|
|
|
echo "Running $cmd"
|
|
|
|
eval $cmd
|
|
|
|
if [ $? -eq 0 ]
|
|
|
|
then
|
|
|
|
echo "FATAL: Decompression did not fail where expected."
|
2012-11-08 16:52:37 +00:00
|
|
|
fi
|
|
|
|
rm -f ${tf}.pz ${tf}.1
|
|
|
|
done
|
|
|
|
done
|
|
|
|
done
|
|
|
|
done
|
|
|
|
|
|
|
|
rm -f /tmp/pwf
|
|
|
|
|
|
|
|
echo "#################################################"
|
|
|
|
echo ""
|
|
|
|
|