Skip to content

Commit f4d4f2c

Browse files
authored
Merge pull request #377 from Tarsnap/libcperciva-import
Libcperciva import
2 parents fbd5b10 + 171627a commit f4d4f2c

11 files changed

+287
-265
lines changed

tests/01-known-values.sh

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,15 +11,15 @@ reference_small="${scriptdir}/verify-strings/test_scrypt_small.good"
1111
### Actual command
1212
scenario_cmd() {
1313
# Run the binary which tests known input/output strings.
14-
setup_check_variables "test_scrypt"
14+
setup_check "test_scrypt"
1515
(
1616
${c_valgrind_cmd} "${bindir}/tests/verify-strings/test_scrypt" \
1717
"${SMALLMEM:-0}" 1> "${test_output}"
1818
echo $? > "${c_exitfile}"
1919
)
2020

2121
# The generated values should match the known good values.
22-
setup_check_variables "test_scrypt output against reference"
22+
setup_check "test_scrypt output against reference"
2323
if [ "${SMALLMEM:-0}" -gt "0" ]; then
2424
cmp -s "${test_output}" "${reference_small}"
2525
else

tests/02-decrypt-reference-file.sh

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ decrypted_badpass_log="${s_basename}-decrypt-badpass.log"
1111

1212
scenario_cmd() {
1313
# Decrypt a reference file.
14-
setup_check_variables "scrypt dec"
14+
setup_check "scrypt dec"
1515
(
1616
echo "${password}" | ${c_valgrind_cmd} "${bindir}/scrypt" \
1717
dec -P "${encrypted_reference_file}" \
@@ -21,18 +21,18 @@ scenario_cmd() {
2121
)
2222

2323
# The decrypted reference file should match the reference.
24-
setup_check_variables "scrypt dec output against reference"
24+
setup_check "scrypt dec output against reference"
2525
cmp -s "${decrypted_reference_file}" "${reference_file}"
2626
echo $? > "${c_exitfile}"
2727

2828
# We should not have any output on stderr.
29-
setup_check_variables "scrypt dec no stderr"
29+
setup_check "scrypt dec no stderr"
3030
test -s "${decrypted_reference_file_stderr}"
3131
expected_exitcode 1 $? > "${c_exitfile}"
3232

3333
# Attempt to decrypt the reference file with an incorrect passphrase.
3434
# We want this command to fail with 1.
35-
setup_check_variables "scrypt dec bad passphrase"
35+
setup_check "scrypt dec bad passphrase"
3636
(
3737
echo "bad-pass" | ${c_valgrind_cmd} "${bindir}/scrypt" \
3838
dec -P "${encrypted_reference_file}" \
@@ -42,7 +42,7 @@ scenario_cmd() {
4242
)
4343

4444
# We should have received an error message.
45-
setup_check_variables "scrypt dec bad passphrase error"
45+
setup_check "scrypt dec bad passphrase error"
4646
if grep -q "scrypt: Passphrase is incorrect" \
4747
"${decrypted_badpass_log}"; then
4848
echo "0"
@@ -51,7 +51,7 @@ scenario_cmd() {
5151
fi > "${c_exitfile}"
5252

5353
# We should not have created a file.
54-
setup_check_variables "scrypt dec bad passphrase no file"
54+
setup_check "scrypt dec bad passphrase no file"
5555
if [ -e "${decrypted_badpass_file}" ]; then
5656
echo "1"
5757
else

tests/03-encrypt-decrypt-file.sh

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ decrypted_file="${s_basename}-attempt.txt"
88

99
scenario_cmd() {
1010
# Encrypt a file. Use --passphrase dev:stdin-once instead of -P.
11-
setup_check_variables "scrypt enc"
11+
setup_check "scrypt enc"
1212
(
1313
echo "${password}" | ${c_valgrind_cmd} "${bindir}/scrypt" \
1414
enc --passphrase dev:stdin-once -t 1 \
@@ -20,20 +20,20 @@ scenario_cmd() {
2020
# We cannot check against the "reference" encrypted file, because
2121
# encrypted files include random salt. If successful, don't delete
2222
# ${encrypted_file} yet; we need it for the next test.
23-
setup_check_variables "scrypt enc random salt"
23+
setup_check "scrypt enc random salt"
2424
cmp -s "${encrypted_file}" "${reference_file}"
2525
expected_exitcode 1 $? > "${c_exitfile}"
2626

2727
# Decrypt the file we just encrypted.
28-
setup_check_variables "scrypt enc decrypt"
28+
setup_check "scrypt enc decrypt"
2929
(
3030
echo "${password}" | ${c_valgrind_cmd} "${bindir}/scrypt" \
3131
dec -P "${encrypted_file}" "${decrypted_file}"
3232
echo $? > "${c_exitfile}"
3333
)
3434

3535
# The decrypted file should match the reference.
36-
setup_check_variables "scrypt enc decrypt output against reference"
36+
setup_check "scrypt enc decrypt output against reference"
3737
cmp -s "${decrypted_file}" "${reference_file}"
3838
echo $? > "${c_exitfile}"
3939
}

tests/04-force-resources.sh

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ longwait_failed_log="${s_basename}-failed.log"
99

1010
scenario_cmd() {
1111
# Encrypt file which should take a long time to decrypt.
12-
setup_check_variables "scrypt enc 10 seconds"
12+
setup_check "scrypt enc 10 seconds"
1313
(
1414
echo "${password}" | ${c_valgrind_cmd} "${bindir}/scrypt" \
1515
enc -P -t 10 "${reference_file}" \
@@ -19,7 +19,7 @@ scenario_cmd() {
1919

2020
# Attempt to decrypt it with limited time. We want this
2121
# command to fail, so we negate the normal return code.
22-
setup_check_variables "scrypt dec 1 second"
22+
setup_check "scrypt dec 1 second"
2323
(
2424
echo "${password}" | ${c_valgrind_cmd} "${bindir}/scrypt" \
2525
dec -P -t 1 "${longwait_encrypted_file}" \
@@ -29,13 +29,13 @@ scenario_cmd() {
2929
)
3030

3131
# We should have received an error message.
32-
setup_check_variables "scrypt dec 1 second error"
32+
setup_check "scrypt dec 1 second error"
3333
grep -q "scrypt: Decrypting file would take too much CPU time" \
3434
"${longwait_failed_log}"
3535
echo "$?" > "${c_exitfile}"
3636

3737
# Attempt to decrypt it with limited time, but force success.
38-
setup_check_variables "scrypt dec force"
38+
setup_check "scrypt dec force"
3939
(
4040
echo "${password}" | ${c_valgrind_cmd} "${bindir}/scrypt" \
4141
dec -P -t 1 -f "${longwait_encrypted_file}" \
@@ -44,7 +44,7 @@ scenario_cmd() {
4444
)
4545

4646
# The decrypted reference file should match the reference.
47-
setup_check_variables "scrypt dec force output against reference"
47+
setup_check "scrypt dec force output against reference"
4848
cmp -s "${longwait_decrypted_file}" "${reference_file}"
4949
echo $? > "${c_exitfile}"
5050
}

tests/05-system-scrypt-encrypt-decrypt.sh

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,13 +12,13 @@ scenario_cmd() {
1212
if [ -z "${system_scrypt}" ]; then
1313
printf "no suitable system scrypt: " 1>&2
1414
# Inform test suite that we are skipping.
15-
setup_check_variables "system scrypt skip"
15+
setup_check "system scrypt skip"
1616
echo "-1" > "${c_exitfile}"
1717
return
1818
fi
1919

2020
# Encrypt a file with our scrypt.
21-
setup_check_variables "scrypt enc for system"
21+
setup_check "scrypt enc for system"
2222
(
2323
echo "${password}" | ${c_valgrind_cmd} "${bindir}/scrypt" \
2424
enc -P -t 1 "${reference_file}" "${encrypted_file_1}"
@@ -27,37 +27,37 @@ scenario_cmd() {
2727

2828
# Use the system scrypt to decrypt the file we just
2929
# encrypted. Don't use valgrind for this.
30-
setup_check_variables "system scrypt dec"
30+
setup_check "system scrypt dec"
3131
(
3232
echo "${password}" | ${system_scrypt} \
3333
dec -P "${encrypted_file_1}" "${decrypted_file_1}"
3434
echo $? > "${c_exitfile}"
3535
)
3636

3737
# The decrypted file should match the reference.
38-
setup_check_variables "system scrypt dec output against reference"
38+
setup_check "system scrypt dec output against reference"
3939
cmp -s "${decrypted_file_1}" "${reference_file}"
4040
echo $? > "${c_exitfile}"
4141

4242
# Encrypt a file with the system scrypt. Don't use
4343
# valgrind for this.
44-
setup_check_variables "system scrypt enc"
44+
setup_check "system scrypt enc"
4545
(
4646
echo "${password}" | ${system_scrypt} \
4747
enc -P -t 1 "${reference_file}" "${encrypted_file_2}"
4848
echo $? > "${c_exitfile}"
4949
)
5050

5151
# Use our scrypt to decrypt the file we just encrypted.
52-
setup_check_variables "scrypt dec for system"
52+
setup_check "scrypt dec for system"
5353
(
5454
echo "${password}" | ${c_valgrind_cmd} "${bindir}/scrypt" \
5555
dec -P "${encrypted_file_2}" "${decrypted_file_2}"
5656
echo $? > "${c_exitfile}"
5757
)
5858

5959
# The decrypted file should match the reference.
60-
setup_check_variables "scrypt dec for system output against reference"
60+
setup_check "scrypt dec for system output against reference"
6161
cmp -s "${decrypted_file_2}" "${reference_file}"
6262
echo $? > "${c_exitfile}"
6363
}

tests/06-decrypt-fail.sh

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ non_encoded_file_output="${s_basename}-nonfile.txt"
99
scenario_cmd() {
1010
# Attempt to decrypt a non-scrypt-encoded file.
1111
# We want this command to fail with 1.
12-
setup_check_variables "scrypt dec non-scrypt"
12+
setup_check "scrypt dec non-scrypt"
1313
(
1414
echo "" | ${c_valgrind_cmd} "${bindir}/scrypt" \
1515
dec -P "${non_encoded_file}" \
@@ -19,13 +19,13 @@ scenario_cmd() {
1919
)
2020

2121
# We should have received an error message.
22-
setup_check_variables "scrypt dec non-scrypt error"
22+
setup_check "scrypt dec non-scrypt error"
2323
grep -q "scrypt: Input is not valid scrypt-encrypted block" \
2424
"${non_encoded_file_stderr}"
2525
echo "$?" > "${c_exitfile}"
2626

2727
# We should not have created a file.
28-
setup_check_variables "scrypt dec non-scrypt no file"
28+
setup_check "scrypt dec non-scrypt no file"
2929
if [ -e "${non_encoded_file_output}" ]; then
3030
echo "1"
3131
else

tests/07-passphrase-env.sh

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -11,42 +11,42 @@ decrypted_no_envvar_log="${s_basename}-decrypt-no-envvar.log"
1111

1212
scenario_cmd() {
1313
# Decrypt a reference file using --passphrase env:VAR.
14-
setup_check_variables "scrypt dec env"
14+
setup_check "scrypt dec env"
1515
PASSPHRASE="${password}" \
1616
${c_valgrind_cmd} "${bindir}/scrypt" \
1717
dec --passphrase env:PASSPHRASE \
1818
"${encrypted_reference_file}" "${decrypted_reference_file}"
1919
echo $? > "${c_exitfile}"
2020

2121
# The decrypted reference file should match the reference.
22-
setup_check_variables "scrypt dec env output against reference"
22+
setup_check "scrypt dec env output against reference"
2323
cmp -s "${decrypted_reference_file}" "${reference_file}"
2424
echo $? > "${c_exitfile}"
2525

2626
# Attempt to decrypt the reference file with a non-existent envvar.
2727
# We want this command to fail with 1.
28-
setup_check_variables "scrypt dec env none"
28+
setup_check "scrypt dec env none"
2929
${c_valgrind_cmd} "${bindir}/scrypt" \
3030
dec --passphrase env:THIS_ENVVAR_DOES_NOT_EXIST \
3131
"${encrypted_reference_file}" "${decrypted_reference_file}" \
3232
2> "${decrypted_no_envvar_log}"
3333
expected_exitcode 1 $? > "${c_exitfile}"
3434

3535
# We should have received an error message.
36-
setup_check_variables "scrypt dec env none error"
36+
setup_check "scrypt dec env none error"
3737
grep -q \
3838
"scrypt: Failed to read from \${THIS_ENVVAR_DOES_NOT_EXIST}" \
3939
"${decrypted_no_envvar_log}"
4040
echo "$?" > "${c_exitfile}"
4141

4242
# We should not have created a file.
43-
setup_check_variables "scrypt dec env no file"
43+
setup_check "scrypt dec env no file"
4444
test -e "${decrypted_badpass_file}"
4545
expected_exitcode 1 $? > "${c_exitfile}"
4646

4747
# Attempt to decrypt the reference file with an incorrect passphrase.
4848
# We want this command to fail with 1.
49-
setup_check_variables "scrypt dec env bad"
49+
setup_check "scrypt dec env bad"
5050
PASSPHRASE="bad-pass" \
5151
${c_valgrind_cmd} "${bindir}/scrypt" \
5252
dec --passphrase env:PASSPHRASE \
@@ -55,11 +55,11 @@ scenario_cmd() {
5555
expected_exitcode 1 $? > "${c_exitfile}"
5656

5757
# We should have received an error message.
58-
setup_check_variables "scrypt dec env bad error"
58+
setup_check "scrypt dec env bad error"
5959
grep -q "scrypt: Passphrase is incorrect" "${decrypted_badpass_log}"
6060
echo "$?" > "${c_exitfile}"
6161

62-
setup_check_variables "scrypt dec env bad no file"
62+
setup_check "scrypt dec env bad no file"
6363
# We should not have created a file.
6464
test -e "${decrypted_badpass_file}"
6565
expected_exitcode 1 $? > "${c_exitfile}"

tests/08-passphrase-file.sh

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -16,40 +16,40 @@ scenario_cmd() {
1616
echo "${password}" > "${passphrase_file}"
1717

1818
# Decrypt a reference file using --passphrase file:FILENAME.
19-
setup_check_variables "scrypt dec file"
19+
setup_check "scrypt dec file"
2020
${c_valgrind_cmd} "${bindir}/scrypt" \
2121
dec --passphrase file:"${passphrase_file}" \
2222
"${encrypted_reference_file}" "${decrypted_reference_file}"
2323
echo $? > "${c_exitfile}"
2424

2525
# The decrypted reference file should match the reference.
26-
setup_check_variables "scrypt dec file output against reference"
26+
setup_check "scrypt dec file output against reference"
2727
cmp -s "${decrypted_reference_file}" "${reference_file}"
2828
echo $? > "${c_exitfile}"
2929

3030
# Attempt to decrypt the reference file with a non-existent file.
3131
# We want this command to fail with 1.
32-
setup_check_variables "scrypt dec file none"
32+
setup_check "scrypt dec file none"
3333
${c_valgrind_cmd} "${bindir}/scrypt" \
3434
dec --passphrase file:THIS_FILE_DOES_NOT_EXIST \
3535
"${encrypted_reference_file}" "${decrypted_reference_file}" \
3636
2> "${decrypted_no_file_log}"
3737
expected_exitcode 1 $? > "${c_exitfile}"
3838

3939
# We should have received an error message.
40-
setup_check_variables "scrypt dec file none error"
40+
setup_check "scrypt dec file none error"
4141
grep -q "scrypt: fopen(THIS_FILE_DOES_NOT_EXIST)" \
4242
"${decrypted_no_file_log}"
4343
echo "$?" > "${c_exitfile}"
4444

4545
# We should not have created a file.
46-
setup_check_variables "scrypt dec file none no file"
46+
setup_check "scrypt dec file none no file"
4747
test -e "${decrypted_badpass_file}"
4848
expected_exitcode 1 $? > "${c_exitfile}"
4949

5050
# Attempt to decrypt the reference file with an incorrect passphrase.
5151
# We want this command to fail with 1.
52-
setup_check_variables "scrypt dec file bad"
52+
setup_check "scrypt dec file bad"
5353
echo "bad-pass" > "${bad_passphrase_file}"
5454
${c_valgrind_cmd} "${bindir}/scrypt" \
5555
dec --passphrase file:"${bad_passphrase_file}" \
@@ -58,12 +58,12 @@ scenario_cmd() {
5858
expected_exitcode 1 $? > "${c_exitfile}"
5959

6060
# We should have received an error message.
61-
setup_check_variables "scrypt dec file bad error"
61+
setup_check "scrypt dec file bad error"
6262
grep -q "scrypt: Passphrase is incorrect" "${decrypted_badpass_log}"
6363
echo "$?" > "${c_exitfile}"
6464

6565
# We should not have created a file.
66-
setup_check_variables "scrypt dec file bad no file"
66+
setup_check "scrypt dec file bad no file"
6767
test -e "${decrypted_badpass_file}"
6868
expected_exitcode 1 $? > "${c_exitfile}"
6969
}

0 commit comments

Comments
 (0)