crypto: testmgr - update LZO compression test vectors

Update the LZO compression test vectors according to the latest compressor
version.

Signed-off-by: Markus F.X.J. Oberhumer <markus@oberhumer.com>
This commit is contained in:
Markus F.X.J. Oberhumer 2012-10-14 15:39:04 +02:00
parent 8b975bd3f9
commit 0ec7382036
1 changed files with 20 additions and 18 deletions

View File

@ -25084,38 +25084,40 @@ static struct pcomp_testvec zlib_decomp_tv_template[] = {
static struct comp_testvec lzo_comp_tv_template[] = { static struct comp_testvec lzo_comp_tv_template[] = {
{ {
.inlen = 70, .inlen = 70,
.outlen = 46, .outlen = 57,
.input = "Join us now and share the software " .input = "Join us now and share the software "
"Join us now and share the software ", "Join us now and share the software ",
.output = "\x00\x0d\x4a\x6f\x69\x6e\x20\x75" .output = "\x00\x0d\x4a\x6f\x69\x6e\x20\x75"
"\x73\x20\x6e\x6f\x77\x20\x61\x6e" "\x73\x20\x6e\x6f\x77\x20\x61\x6e"
"\x64\x20\x73\x68\x61\x72\x65\x20" "\x64\x20\x73\x68\x61\x72\x65\x20"
"\x74\x68\x65\x20\x73\x6f\x66\x74" "\x74\x68\x65\x20\x73\x6f\x66\x74"
"\x77\x70\x01\x01\x4a\x6f\x69\x6e" "\x77\x70\x01\x32\x88\x00\x0c\x65"
"\x3d\x88\x00\x11\x00\x00", "\x20\x74\x68\x65\x20\x73\x6f\x66"
"\x74\x77\x61\x72\x65\x20\x11\x00"
"\x00",
}, { }, {
.inlen = 159, .inlen = 159,
.outlen = 133, .outlen = 131,
.input = "This document describes a compression method based on the LZO " .input = "This document describes a compression method based on the LZO "
"compression algorithm. This document defines the application of " "compression algorithm. This document defines the application of "
"the LZO algorithm used in UBIFS.", "the LZO algorithm used in UBIFS.",
.output = "\x00\x2b\x54\x68\x69\x73\x20\x64" .output = "\x00\x2c\x54\x68\x69\x73\x20\x64"
"\x6f\x63\x75\x6d\x65\x6e\x74\x20" "\x6f\x63\x75\x6d\x65\x6e\x74\x20"
"\x64\x65\x73\x63\x72\x69\x62\x65" "\x64\x65\x73\x63\x72\x69\x62\x65"
"\x73\x20\x61\x20\x63\x6f\x6d\x70" "\x73\x20\x61\x20\x63\x6f\x6d\x70"
"\x72\x65\x73\x73\x69\x6f\x6e\x20" "\x72\x65\x73\x73\x69\x6f\x6e\x20"
"\x6d\x65\x74\x68\x6f\x64\x20\x62" "\x6d\x65\x74\x68\x6f\x64\x20\x62"
"\x61\x73\x65\x64\x20\x6f\x6e\x20" "\x61\x73\x65\x64\x20\x6f\x6e\x20"
"\x74\x68\x65\x20\x4c\x5a\x4f\x2b" "\x74\x68\x65\x20\x4c\x5a\x4f\x20"
"\x8c\x00\x0d\x61\x6c\x67\x6f\x72" "\x2a\x8c\x00\x09\x61\x6c\x67\x6f"
"\x69\x74\x68\x6d\x2e\x20\x20\x54" "\x72\x69\x74\x68\x6d\x2e\x20\x20"
"\x68\x69\x73\x2a\x54\x01\x02\x66" "\x2e\x54\x01\x03\x66\x69\x6e\x65"
"\x69\x6e\x65\x73\x94\x06\x05\x61" "\x73\x20\x74\x06\x05\x61\x70\x70"
"\x70\x70\x6c\x69\x63\x61\x74\x76" "\x6c\x69\x63\x61\x74\x76\x0a\x6f"
"\x0a\x6f\x66\x88\x02\x60\x09\x27" "\x66\x88\x02\x60\x09\x27\xf0\x00"
"\xf0\x00\x0c\x20\x75\x73\x65\x64" "\x0c\x20\x75\x73\x65\x64\x20\x69"
"\x20\x69\x6e\x20\x55\x42\x49\x46" "\x6e\x20\x55\x42\x49\x46\x53\x2e"
"\x53\x2e\x11\x00\x00", "\x11\x00\x00",
}, },
}; };