You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					210 lines
				
				5.8 KiB
			
		
		
			
		
	
	
					210 lines
				
				5.8 KiB
			| 
								 
											3 years ago
										 
									 | 
							
								const bcrypt = require('../bcrypt');
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('salt_length', done => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(1);
							 | 
						||
| 
								 | 
							
								    bcrypt.genSalt(10, function (err, salt) {
							 | 
						||
| 
								 | 
							
								        expect(salt).toHaveLength(29);
							 | 
						||
| 
								 | 
							
								        done();
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								})
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('salt_only_cb', () => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(1);
							 | 
						||
| 
								 | 
							
								    expect(() => {
							 | 
						||
| 
								 | 
							
								        bcrypt.genSalt((err, salt) => {
							 | 
						||
| 
								 | 
							
								        });
							 | 
						||
| 
								 | 
							
								    }).not.toThrow();
							 | 
						||
| 
								 | 
							
								})
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('salt_rounds_is_string_number', done => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(2);
							 | 
						||
| 
								 | 
							
								    bcrypt.genSalt('10', void 0, function (err, salt) {
							 | 
						||
| 
								 | 
							
								        expect(err instanceof Error).toBe(true)
							 | 
						||
| 
								 | 
							
								        expect(err.message).toBe('rounds must be a number')
							 | 
						||
| 
								 | 
							
								        done();
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								})
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('salt_rounds_is_string_non_number', done => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(2);
							 | 
						||
| 
								 | 
							
								    bcrypt.genSalt('z', function (err, salt) {
							 | 
						||
| 
								 | 
							
								        expect(err instanceof Error).toBe(true)
							 | 
						||
| 
								 | 
							
								        expect(err.message).toBe('rounds must be a number')
							 | 
						||
| 
								 | 
							
								        done();
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								})
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('salt_minor', done => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(3);
							 | 
						||
| 
								 | 
							
								    bcrypt.genSalt(10, 'a', function (err, value) {
							 | 
						||
| 
								 | 
							
								        expect(value).toHaveLength(29);
							 | 
						||
| 
								 | 
							
								        const [_, minor, salt] = value.split('$');
							 | 
						||
| 
								 | 
							
								        expect(minor).toEqual('2a');
							 | 
						||
| 
								 | 
							
								        expect(salt).toEqual('10');
							 | 
						||
| 
								 | 
							
								        done();
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								})
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('salt_minor_b', done => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(3);
							 | 
						||
| 
								 | 
							
								    bcrypt.genSalt(10, 'b', function (err, value) {
							 | 
						||
| 
								 | 
							
								        expect(value).toHaveLength(29);
							 | 
						||
| 
								 | 
							
								        const [_, minor, salt] = value.split('$');
							 | 
						||
| 
								 | 
							
								        expect(minor).toEqual('2b');
							 | 
						||
| 
								 | 
							
								        expect(salt).toEqual('10');
							 | 
						||
| 
								 | 
							
								        done();
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								})
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('hash', done => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(2);
							 | 
						||
| 
								 | 
							
								    bcrypt.genSalt(10, function (err, salt) {
							 | 
						||
| 
								 | 
							
								        bcrypt.hash('password', salt, function (err, res) {
							 | 
						||
| 
								 | 
							
								            expect(res).toBeDefined();
							 | 
						||
| 
								 | 
							
								            expect(err).toBeUndefined();
							 | 
						||
| 
								 | 
							
								            done();
							 | 
						||
| 
								 | 
							
								        });
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								})
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('hash_rounds', done => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(1);
							 | 
						||
| 
								 | 
							
								    bcrypt.hash('bacon', 8, function (err, hash) {
							 | 
						||
| 
								 | 
							
								        expect(bcrypt.getRounds(hash)).toEqual(8);
							 | 
						||
| 
								 | 
							
								        done();
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								})
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('hash_empty_strings', done => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(1);
							 | 
						||
| 
								 | 
							
								    bcrypt.genSalt(10, function (err, salt) {
							 | 
						||
| 
								 | 
							
								        bcrypt.hash('', salt, function (err, res) {
							 | 
						||
| 
								 | 
							
								            expect(res).toBeDefined();
							 | 
						||
| 
								 | 
							
								            done();
							 | 
						||
| 
								 | 
							
								        });
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								})
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('hash_fails_with_empty_salt', done => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(1);
							 | 
						||
| 
								 | 
							
								    bcrypt.hash('', '', function (err, res) {
							 | 
						||
| 
								 | 
							
								        expect(err.message).toBe('Invalid salt. Salt must be in the form of: $Vers$log2(NumRounds)$saltvalue')
							 | 
						||
| 
								 | 
							
								        done();
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								})
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('hash_no_params', done => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(1);
							 | 
						||
| 
								 | 
							
								    bcrypt.hash(function (err, hash) {
							 | 
						||
| 
								 | 
							
								        expect(err.message).toBe('data must be a string or Buffer and salt must either be a salt string or a number of rounds')
							 | 
						||
| 
								 | 
							
								        done();
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								})
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('hash_one_param', done => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(1);
							 | 
						||
| 
								 | 
							
								    bcrypt.hash('password', function (err, hash) {
							 | 
						||
| 
								 | 
							
								        expect(err.message).toBe('data must be a string or Buffer and salt must either be a salt string or a number of rounds');
							 | 
						||
| 
								 | 
							
								        done();
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								})
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('hash_salt_validity', done => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(2);
							 | 
						||
| 
								 | 
							
								    bcrypt.hash('password', '$2a$10$somesaltyvaluertsetrse', function (err, enc) {
							 | 
						||
| 
								 | 
							
								        expect(err).toBeUndefined();
							 | 
						||
| 
								 | 
							
								        bcrypt.hash('password', 'some$value', function (err, enc) {
							 | 
						||
| 
								 | 
							
								            expect(err.message).toBe("Invalid salt. Salt must be in the form of: $Vers$log2(NumRounds)$saltvalue");
							 | 
						||
| 
								 | 
							
								            done();
							 | 
						||
| 
								 | 
							
								        });
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								})
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('verify_salt', done => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(2);
							 | 
						||
| 
								 | 
							
								    bcrypt.genSalt(10, function (err, value) {
							 | 
						||
| 
								 | 
							
								        const [_, version, rounds] = value.split('$');
							 | 
						||
| 
								 | 
							
								        expect(version).toEqual('2b');
							 | 
						||
| 
								 | 
							
								        expect(rounds).toEqual('10');
							 | 
						||
| 
								 | 
							
								        done();
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								})
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('verify_salt_min_rounds', done => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(2);
							 | 
						||
| 
								 | 
							
								    bcrypt.genSalt(1, function (err, value) {
							 | 
						||
| 
								 | 
							
								        const [_, version, rounds] = value.split('$');
							 | 
						||
| 
								 | 
							
								        expect(version).toEqual('2b');
							 | 
						||
| 
								 | 
							
								        expect(rounds).toEqual('04');
							 | 
						||
| 
								 | 
							
								        done();
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								})
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('verify_salt_max_rounds', done => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(2);
							 | 
						||
| 
								 | 
							
								    bcrypt.genSalt(100, function (err, value) {
							 | 
						||
| 
								 | 
							
								        const [_, version, rounds] = value.split('$');
							 | 
						||
| 
								 | 
							
								        expect(version).toEqual('2b');
							 | 
						||
| 
								 | 
							
								        expect(rounds).toEqual('31');
							 | 
						||
| 
								 | 
							
								        done();
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								})
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('hash_compare', done => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(2);
							 | 
						||
| 
								 | 
							
								    bcrypt.genSalt(10, function (err, salt) {
							 | 
						||
| 
								 | 
							
								        bcrypt.hash("test", salt, function (err, hash) {
							 | 
						||
| 
								 | 
							
								            bcrypt.compare("test", hash, function (err, res) {
							 | 
						||
| 
								 | 
							
								                expect(hash).toBeDefined();
							 | 
						||
| 
								 | 
							
								                bcrypt.compare("blah", hash, function (err, res) {
							 | 
						||
| 
								 | 
							
								                    expect(res).toBe(false);
							 | 
						||
| 
								 | 
							
								                    done();
							 | 
						||
| 
								 | 
							
								                });
							 | 
						||
| 
								 | 
							
								            });
							 | 
						||
| 
								 | 
							
								        });
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								})
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('hash_compare_empty_strings', done => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(2);
							 | 
						||
| 
								 | 
							
								    const hash = bcrypt.hashSync("test", bcrypt.genSaltSync(10));
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    bcrypt.compare("", hash, function (err, res) {
							 | 
						||
| 
								 | 
							
								        expect(res).toEqual(false)
							 | 
						||
| 
								 | 
							
								        bcrypt.compare("", "", function (err, res) {
							 | 
						||
| 
								 | 
							
								            expect(res).toEqual(false);
							 | 
						||
| 
								 | 
							
								            done();
							 | 
						||
| 
								 | 
							
								        });
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								})
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('hash_compare_invalid_strings', done => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(2);
							 | 
						||
| 
								 | 
							
								    const fullString = 'envy1362987212538';
							 | 
						||
| 
								 | 
							
								    const hash = '$2a$10$XOPbrlUPQdwdJUpSrIF6X.LbE14qsMmKGhM1A8W9iqaG3vv1BD7WC';
							 | 
						||
| 
								 | 
							
								    const wut = ':';
							 | 
						||
| 
								 | 
							
								    bcrypt.compare(fullString, hash, function (err, res) {
							 | 
						||
| 
								 | 
							
								        expect(res).toBe(true);
							 | 
						||
| 
								 | 
							
								        bcrypt.compare(fullString, wut, function (err, res) {
							 | 
						||
| 
								 | 
							
								            expect(res).toBe(false);
							 | 
						||
| 
								 | 
							
								            done();
							 | 
						||
| 
								 | 
							
								        });
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								})
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('compare_no_params', done => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(1);
							 | 
						||
| 
								 | 
							
								    bcrypt.compare(function (err, hash) {
							 | 
						||
| 
								 | 
							
								        expect(err.message).toBe('data and hash arguments required');
							 | 
						||
| 
								 | 
							
								        done();
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								})
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								test('hash_compare_one_param', done => {
							 | 
						||
| 
								 | 
							
								    expect.assertions(1);
							 | 
						||
| 
								 | 
							
								    bcrypt.compare('password', function (err, hash) {
							 | 
						||
| 
								 | 
							
								        expect(err.message).toBe('data and hash arguments required');
							 | 
						||
| 
								 | 
							
								        done();
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								})
							 |