2012-11-09 14:35:13 +00:00
|
|
|
#
|
|
|
|
# Test crypto
|
|
|
|
#
|
|
|
|
echo "#################################################"
|
|
|
|
echo "# Pipe mode Crypto tests"
|
|
|
|
echo "#################################################"
|
|
|
|
|
2012-12-11 10:53:35 +00:00
|
|
|
rm -f *.pz
|
|
|
|
rm -f *.1
|
|
|
|
|
2012-11-09 14:35:13 +00:00
|
|
|
for algo in lzfx adapt2
|
|
|
|
do
|
2013-01-02 17:26:21 +00:00
|
|
|
for tf in `cat files.lst`
|
2012-11-09 14:35:13 +00:00
|
|
|
do
|
2013-03-05 15:37:54 +00:00
|
|
|
for feat in "-e SALSA20" "-e AES -L" "-D -e SALSA20" "-D -EE -L -e AES" "-e SALSA20 -S CRC64" "-e SALSA20 -L" "-e AES -E"
|
2012-11-09 14:35:13 +00:00
|
|
|
do
|
|
|
|
for seg in 2m 5m
|
|
|
|
do
|
|
|
|
echo "sillypassword" > /tmp/pwf
|
|
|
|
cmd="cat ${tf} | ../../pcompress -c${algo} -p -l3 -s${seg} $feat -w /tmp/pwf > ${tf}.pz"
|
|
|
|
echo "Running $cmd"
|
|
|
|
eval $cmd
|
|
|
|
if [ $? -ne 0 ]
|
|
|
|
then
|
2012-12-08 08:49:01 +00:00
|
|
|
echo "FATAL: Compression errored."
|
2013-01-02 18:57:18 +00:00
|
|
|
rm -f ${tf}.pz ${tf}.1
|
|
|
|
continue
|
2012-11-09 14:35:13 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
pw=`cat /tmp/pwf`
|
|
|
|
if [ "$pw" = "sillypassword" ]
|
|
|
|
then
|
2012-12-08 08:49:01 +00:00
|
|
|
echo "FATAL: Password file /tmp/pwf not zeroed!"
|
2012-11-09 14:35:13 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
echo "sillypassword" > /tmp/pwf
|
|
|
|
cmd="../../pcompress -d -w /tmp/pwf ${tf}.pz ${tf}.1"
|
|
|
|
echo "Running $cmd"
|
|
|
|
eval $cmd
|
|
|
|
if [ $? -ne 0 ]
|
|
|
|
then
|
2012-12-08 08:49:01 +00:00
|
|
|
echo "FATAL: Decompression errored."
|
2013-01-02 18:57:18 +00:00
|
|
|
rm -f ${tf}.pz ${tf}.1
|
|
|
|
continue
|
2012-11-09 14:35:13 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
diff ${tf} ${tf}.1 > /dev/null
|
|
|
|
if [ $? -ne 0 ]
|
|
|
|
then
|
2012-12-08 08:49:01 +00:00
|
|
|
echo "FATAL: Decompression was not correct"
|
2012-11-09 14:35:13 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
pw=`cat /tmp/pwf`
|
|
|
|
if [ "$pw" = "sillypassword" ]
|
|
|
|
then
|
2012-12-08 08:49:01 +00:00
|
|
|
echo "FATAL: Password file /tmp/pwf not zeroed!"
|
2012-11-09 14:35:13 +00:00
|
|
|
fi
|
|
|
|
rm -f ${tf}.pz ${tf}.1
|
|
|
|
done
|
|
|
|
done
|
|
|
|
done
|
|
|
|
done
|
|
|
|
|
2013-04-26 13:02:00 +00:00
|
|
|
for algo in lzfx zlib
|
|
|
|
do
|
|
|
|
for tf in `cat files.lst`
|
|
|
|
do
|
|
|
|
for feat in "-e SALSA20" "-e AES -L" "-D -e SALSA20" "-D -EE -L -e SALSA20 -S KECCAK256" "-G -e SALSA20" "-G -F -e AES"
|
|
|
|
do
|
|
|
|
for seg in 5m
|
|
|
|
do
|
|
|
|
echo "sillypassword" > /tmp/pwf
|
|
|
|
cmd="../../pcompress -c${algo} -l3 -s${seg} $feat -w /tmp/pwf ${tf} - > ${tf}.pz"
|
|
|
|
echo "Running $cmd"
|
|
|
|
eval $cmd
|
|
|
|
if [ $? -ne 0 ]
|
|
|
|
then
|
|
|
|
echo "FATAL: Compression errored."
|
|
|
|
rm -f ${tf}.pz ${tf}.1
|
|
|
|
continue
|
|
|
|
fi
|
|
|
|
|
|
|
|
pw=`cat /tmp/pwf`
|
|
|
|
if [ "$pw" = "sillypassword" ]
|
|
|
|
then
|
|
|
|
echo "FATAL: Password file /tmp/pwf not zeroed!"
|
|
|
|
fi
|
|
|
|
|
|
|
|
echo "sillypassword" > /tmp/pwf
|
|
|
|
cmd="cat ${tf}.pz | ../../pcompress -d -w /tmp/pwf - ${tf}.1"
|
|
|
|
echo "Running $cmd"
|
|
|
|
eval $cmd
|
|
|
|
if [ $? -ne 0 ]
|
|
|
|
then
|
|
|
|
echo "FATAL: Decompression errored."
|
|
|
|
rm -f ${tf}.pz ${tf}.1
|
|
|
|
continue
|
|
|
|
fi
|
|
|
|
|
|
|
|
diff ${tf} ${tf}.1 > /dev/null
|
|
|
|
if [ $? -ne 0 ]
|
|
|
|
then
|
|
|
|
echo "FATAL: Decompression was not correct"
|
|
|
|
fi
|
|
|
|
|
|
|
|
pw=`cat /tmp/pwf`
|
|
|
|
if [ "$pw" = "sillypassword" ]
|
|
|
|
then
|
|
|
|
echo "FATAL: Password file /tmp/pwf not zeroed!"
|
|
|
|
fi
|
|
|
|
rm -f ${tf}.pz ${tf}.1
|
|
|
|
done
|
|
|
|
done
|
|
|
|
done
|
|
|
|
done
|
|
|
|
|
2012-11-09 14:35:13 +00:00
|
|
|
rm -f /tmp/pwf
|
|
|
|
|
|
|
|
echo "#################################################"
|
|
|
|
echo ""
|
|
|
|
|