summaryrefslogtreecommitdiff
path: root/_test/tests/inc/auth_password.test.php
diff options
context:
space:
mode:
authorAndreas Gohr <andi@splitbrain.org>2012-04-24 22:13:23 +0200
committerAndreas Gohr <andi@splitbrain.org>2012-04-27 01:11:36 +0200
commitf2ae886abc5bb17b10e0313506b7bdf1f84f5726 (patch)
tree358fedb1004b568b5d6bae8c4dbbcb5e1beb058e /_test/tests/inc/auth_password.test.php
parentf61996974881e45b6ba399d75c080481d66c4214 (diff)
downloadrpg-f2ae886abc5bb17b10e0313506b7bdf1f84f5726.tar.gz
rpg-f2ae886abc5bb17b10e0313506b7bdf1f84f5726.tar.bz2
reenabled password test
according to Dominik Eckelmann one of the tests fails on certain servers. I can't reproduce it. If you can, please open a bug report with as much info as possible.
Diffstat (limited to '_test/tests/inc/auth_password.test.php')
-rw-r--r--_test/tests/inc/auth_password.test.php70
1 files changed, 70 insertions, 0 deletions
diff --git a/_test/tests/inc/auth_password.test.php b/_test/tests/inc/auth_password.test.php
new file mode 100644
index 000000000..4c922d0e3
--- /dev/null
+++ b/_test/tests/inc/auth_password.test.php
@@ -0,0 +1,70 @@
+<?php
+
+require_once DOKU_INC.'inc/init.php';
+require_once DOKU_INC.'inc/auth.php';
+
+class auth_password_test extends PHPUnit_Framework_TestCase {
+
+ // hashes for the password foo$method, using abcdefgh as salt
+ var $passes = array(
+ 'smd5' => '$1$abcdefgh$SYbjm2AEvSoHG7Xapi8so.',
+ 'apr1' => '$apr1$abcdefgh$C/GzYTF4kOVByYLEoD5X4.',
+ 'md5' => '8fa22d62408e5351553acdd91c6b7003',
+ 'sha1' => 'b456d3b0efd105d613744ffd549514ecafcfc7e1',
+ 'ssha' => '{SSHA}QMHG+uC7bHNYKkmoLbNsNI38/dJhYmNk',
+ 'lsmd5' => '{SMD5}HGbkPrkWgy9KgcRGWlrsUWFiY2RlZmdo',
+ 'crypt' => 'ablvoGr1hvZ5k',
+ 'mysql' => '4a1fa3780bd6fd55',
+ 'my411' => '*e5929347e25f82e19e4ebe92f1dc6b6e7c2dbd29',
+ 'kmd5' => 'a579299436d7969791189acadd86fcb716',
+ 'pmd5' => '$P$abcdefgh1RC6Fd32heUzl7EYCG9uGw.',
+ 'hmd5' => '$H$abcdefgh1ZbJodHxmeXVAhEzTG7IAp.',
+ 'djangomd5' => 'md5$abcde$d0fdddeda8cd92725d2b54148ac09158',
+ 'djangosha1' => 'sha1$abcde$c8e65a7f0acc9158843048a53dcc5a6bc4d17678',
+ );
+
+
+ function test_cryptPassword(){
+ foreach($this->passes as $method => $hash){
+ $info = "testing method $method";
+ $this->assertEquals(auth_cryptPassword('foo'.$method, $method,'abcdefgh12345678912345678912345678'),
+ $hash, $info);
+ }
+ }
+
+ function test_verifyPassword(){
+ foreach($this->passes as $method => $hash){
+ $info = "testing method $method";
+ $this->assertTrue(auth_verifyPassword('foo'.$method, $hash), $info);
+ }
+ }
+
+ function test_verifySelf(){
+ foreach($this->passes as $method => $hash){
+ $info = "testing method $method";
+ $hash = auth_cryptPassword('foo'.$method,$method);
+ $this->assertTrue(auth_verifyPassword('foo'.$method, $hash), $info);
+ }
+ }
+
+ function test_bcrypt_self(){
+ $hash = auth_cryptPassword('foobcrypt','bcrypt');
+ $this->assertTrue(auth_verifyPassword('foobcrypt',$hash));
+ }
+
+ function test_verifyPassword_fixedbcrypt(){
+ $this->assertTrue(auth_verifyPassword('foobcrypt','$2a$12$uTWercxbq4sjp2xAzv3we.ZOxk51m5V/Bv5bp2H27oVFJl5neFQoC'));
+ }
+
+ function test_verifyPassword_nohash(){
+ $this->assertTrue(auth_verifyPassword('foo','$1$$n1rTiFE0nRifwV/43bVon/'));
+ }
+
+ function test_verifyPassword_fixedpmd5(){
+ $this->assertTrue(auth_verifyPassword('test12345','$P$9IQRaTwmfeRo7ud9Fh4E2PdI0S3r.L0'));
+ $this->assertTrue(auth_verifyPassword('test12345','$H$9IQRaTwmfeRo7ud9Fh4E2PdI0S3r.L0'));
+ }
+
+}
+
+//Setup VIM: ex: et ts=4 :