You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					
					
						
							210 lines
						
					
					
						
							5.8 KiB
						
					
					
				
			
		
		
	
	
							210 lines
						
					
					
						
							5.8 KiB
						
					
					
				| const bcrypt = require('../bcrypt');
 | |
| 
 | |
| test('salt_length', done => {
 | |
|     expect.assertions(1);
 | |
|     bcrypt.genSalt(10, function (err, salt) {
 | |
|         expect(salt).toHaveLength(29);
 | |
|         done();
 | |
|     });
 | |
| })
 | |
| 
 | |
| test('salt_only_cb', () => {
 | |
|     expect.assertions(1);
 | |
|     expect(() => {
 | |
|         bcrypt.genSalt((err, salt) => {
 | |
|         });
 | |
|     }).not.toThrow();
 | |
| })
 | |
| 
 | |
| test('salt_rounds_is_string_number', done => {
 | |
|     expect.assertions(2);
 | |
|     bcrypt.genSalt('10', void 0, function (err, salt) {
 | |
|         expect(err instanceof Error).toBe(true)
 | |
|         expect(err.message).toBe('rounds must be a number')
 | |
|         done();
 | |
|     });
 | |
| })
 | |
| 
 | |
| test('salt_rounds_is_string_non_number', done => {
 | |
|     expect.assertions(2);
 | |
|     bcrypt.genSalt('z', function (err, salt) {
 | |
|         expect(err instanceof Error).toBe(true)
 | |
|         expect(err.message).toBe('rounds must be a number')
 | |
|         done();
 | |
|     });
 | |
| })
 | |
| 
 | |
| test('salt_minor', done => {
 | |
|     expect.assertions(3);
 | |
|     bcrypt.genSalt(10, 'a', function (err, value) {
 | |
|         expect(value).toHaveLength(29);
 | |
|         const [_, minor, salt] = value.split('$');
 | |
|         expect(minor).toEqual('2a');
 | |
|         expect(salt).toEqual('10');
 | |
|         done();
 | |
|     });
 | |
| })
 | |
| 
 | |
| test('salt_minor_b', done => {
 | |
|     expect.assertions(3);
 | |
|     bcrypt.genSalt(10, 'b', function (err, value) {
 | |
|         expect(value).toHaveLength(29);
 | |
|         const [_, minor, salt] = value.split('$');
 | |
|         expect(minor).toEqual('2b');
 | |
|         expect(salt).toEqual('10');
 | |
|         done();
 | |
|     });
 | |
| })
 | |
| 
 | |
| test('hash', done => {
 | |
|     expect.assertions(2);
 | |
|     bcrypt.genSalt(10, function (err, salt) {
 | |
|         bcrypt.hash('password', salt, function (err, res) {
 | |
|             expect(res).toBeDefined();
 | |
|             expect(err).toBeUndefined();
 | |
|             done();
 | |
|         });
 | |
|     });
 | |
| })
 | |
| 
 | |
| test('hash_rounds', done => {
 | |
|     expect.assertions(1);
 | |
|     bcrypt.hash('bacon', 8, function (err, hash) {
 | |
|         expect(bcrypt.getRounds(hash)).toEqual(8);
 | |
|         done();
 | |
|     });
 | |
| })
 | |
| 
 | |
| test('hash_empty_strings', done => {
 | |
|     expect.assertions(1);
 | |
|     bcrypt.genSalt(10, function (err, salt) {
 | |
|         bcrypt.hash('', salt, function (err, res) {
 | |
|             expect(res).toBeDefined();
 | |
|             done();
 | |
|         });
 | |
|     });
 | |
| })
 | |
| 
 | |
| test('hash_fails_with_empty_salt', done => {
 | |
|     expect.assertions(1);
 | |
|     bcrypt.hash('', '', function (err, res) {
 | |
|         expect(err.message).toBe('Invalid salt. Salt must be in the form of: $Vers$log2(NumRounds)$saltvalue')
 | |
|         done();
 | |
|     });
 | |
| })
 | |
| 
 | |
| test('hash_no_params', done => {
 | |
|     expect.assertions(1);
 | |
|     bcrypt.hash(function (err, hash) {
 | |
|         expect(err.message).toBe('data must be a string or Buffer and salt must either be a salt string or a number of rounds')
 | |
|         done();
 | |
|     });
 | |
| })
 | |
| 
 | |
| test('hash_one_param', done => {
 | |
|     expect.assertions(1);
 | |
|     bcrypt.hash('password', function (err, hash) {
 | |
|         expect(err.message).toBe('data must be a string or Buffer and salt must either be a salt string or a number of rounds');
 | |
|         done();
 | |
|     });
 | |
| })
 | |
| 
 | |
| test('hash_salt_validity', done => {
 | |
|     expect.assertions(2);
 | |
|     bcrypt.hash('password', '$2a$10$somesaltyvaluertsetrse', function (err, enc) {
 | |
|         expect(err).toBeUndefined();
 | |
|         bcrypt.hash('password', 'some$value', function (err, enc) {
 | |
|             expect(err.message).toBe("Invalid salt. Salt must be in the form of: $Vers$log2(NumRounds)$saltvalue");
 | |
|             done();
 | |
|         });
 | |
|     });
 | |
| })
 | |
| 
 | |
| test('verify_salt', done => {
 | |
|     expect.assertions(2);
 | |
|     bcrypt.genSalt(10, function (err, value) {
 | |
|         const [_, version, rounds] = value.split('$');
 | |
|         expect(version).toEqual('2b');
 | |
|         expect(rounds).toEqual('10');
 | |
|         done();
 | |
|     });
 | |
| })
 | |
| 
 | |
| test('verify_salt_min_rounds', done => {
 | |
|     expect.assertions(2);
 | |
|     bcrypt.genSalt(1, function (err, value) {
 | |
|         const [_, version, rounds] = value.split('$');
 | |
|         expect(version).toEqual('2b');
 | |
|         expect(rounds).toEqual('04');
 | |
|         done();
 | |
|     });
 | |
| })
 | |
| 
 | |
| test('verify_salt_max_rounds', done => {
 | |
|     expect.assertions(2);
 | |
|     bcrypt.genSalt(100, function (err, value) {
 | |
|         const [_, version, rounds] = value.split('$');
 | |
|         expect(version).toEqual('2b');
 | |
|         expect(rounds).toEqual('31');
 | |
|         done();
 | |
|     });
 | |
| })
 | |
| 
 | |
| test('hash_compare', done => {
 | |
|     expect.assertions(2);
 | |
|     bcrypt.genSalt(10, function (err, salt) {
 | |
|         bcrypt.hash("test", salt, function (err, hash) {
 | |
|             bcrypt.compare("test", hash, function (err, res) {
 | |
|                 expect(hash).toBeDefined();
 | |
|                 bcrypt.compare("blah", hash, function (err, res) {
 | |
|                     expect(res).toBe(false);
 | |
|                     done();
 | |
|                 });
 | |
|             });
 | |
|         });
 | |
|     });
 | |
| })
 | |
| 
 | |
| test('hash_compare_empty_strings', done => {
 | |
|     expect.assertions(2);
 | |
|     const hash = bcrypt.hashSync("test", bcrypt.genSaltSync(10));
 | |
| 
 | |
|     bcrypt.compare("", hash, function (err, res) {
 | |
|         expect(res).toEqual(false)
 | |
|         bcrypt.compare("", "", function (err, res) {
 | |
|             expect(res).toEqual(false);
 | |
|             done();
 | |
|         });
 | |
|     });
 | |
| })
 | |
| 
 | |
| test('hash_compare_invalid_strings', done => {
 | |
|     expect.assertions(2);
 | |
|     const fullString = 'envy1362987212538';
 | |
|     const hash = '$2a$10$XOPbrlUPQdwdJUpSrIF6X.LbE14qsMmKGhM1A8W9iqaG3vv1BD7WC';
 | |
|     const wut = ':';
 | |
|     bcrypt.compare(fullString, hash, function (err, res) {
 | |
|         expect(res).toBe(true);
 | |
|         bcrypt.compare(fullString, wut, function (err, res) {
 | |
|             expect(res).toBe(false);
 | |
|             done();
 | |
|         });
 | |
|     });
 | |
| })
 | |
| 
 | |
| test('compare_no_params', done => {
 | |
|     expect.assertions(1);
 | |
|     bcrypt.compare(function (err, hash) {
 | |
|         expect(err.message).toBe('data and hash arguments required');
 | |
|         done();
 | |
|     });
 | |
| })
 | |
| 
 | |
| test('hash_compare_one_param', done => {
 | |
|     expect.assertions(1);
 | |
|     bcrypt.compare('password', function (err, hash) {
 | |
|         expect(err.message).toBe('data and hash arguments required');
 | |
|         done();
 | |
|     });
 | |
| })
 |