summaryrefslogtreecommitdiff
path: root/tests
diff options
context:
space:
mode:
authorDonald Stufft <donald@stufft.io>2013-05-10 23:44:58 -0400
committerDonald Stufft <donald@stufft.io>2013-05-10 23:44:58 -0400
commita6f9d17a5981f0e57db7ab222f43ffa6598e0fd7 (patch)
treefcd33200f4d394c0343d23a6f5c5d2cddb05def9 /tests
parent91fc18b2d40068030491d35530e4d2824a9a3205 (diff)
downloadpy-bcrypt-git-a6f9d17a5981f0e57db7ab222f43ffa6598e0fd7.tar.gz
Add tests to ensure behavior
Diffstat (limited to 'tests')
-rw-r--r--tests/test_bcrypt.py107
1 files changed, 107 insertions, 0 deletions
diff --git a/tests/test_bcrypt.py b/tests/test_bcrypt.py
new file mode 100644
index 0000000..476f919
--- /dev/null
+++ b/tests/test_bcrypt.py
@@ -0,0 +1,107 @@
+import os
+
+import mock
+import pytest
+
+import bcrypt
+
+
+def test_gensalt_basic(monkeypatch):
+ urandom = mock.Mock(return_value=b"0000000000000000")
+ monkeypatch.setattr(os, "urandom", urandom)
+ assert bcrypt.gensalt() == b"$2a$12$KB.uKB.uKB.uKB.uKB.uK."
+
+
+@pytest.mark.parametrize(("rounds", "expected"), [
+ (4, b"$2a$04$KB.uKB.uKB.uKB.uKB.uK."),
+ (5, b"$2a$05$KB.uKB.uKB.uKB.uKB.uK."),
+ (6, b"$2a$06$KB.uKB.uKB.uKB.uKB.uK."),
+ (7, b"$2a$07$KB.uKB.uKB.uKB.uKB.uK."),
+ (8, b"$2a$08$KB.uKB.uKB.uKB.uKB.uK."),
+ (9, b"$2a$09$KB.uKB.uKB.uKB.uKB.uK."),
+ (10, b"$2a$10$KB.uKB.uKB.uKB.uKB.uK."),
+ (11, b"$2a$11$KB.uKB.uKB.uKB.uKB.uK."),
+ (12, b"$2a$12$KB.uKB.uKB.uKB.uKB.uK."),
+ (13, b"$2a$13$KB.uKB.uKB.uKB.uKB.uK."),
+ (14, b"$2a$14$KB.uKB.uKB.uKB.uKB.uK."),
+ (15, b"$2a$15$KB.uKB.uKB.uKB.uKB.uK."),
+ (16, b"$2a$16$KB.uKB.uKB.uKB.uKB.uK."),
+ (17, b"$2a$17$KB.uKB.uKB.uKB.uKB.uK."),
+ (18, b"$2a$18$KB.uKB.uKB.uKB.uKB.uK."),
+ (19, b"$2a$19$KB.uKB.uKB.uKB.uKB.uK."),
+ (20, b"$2a$20$KB.uKB.uKB.uKB.uKB.uK."),
+ (21, b"$2a$21$KB.uKB.uKB.uKB.uKB.uK."),
+ (22, b"$2a$22$KB.uKB.uKB.uKB.uKB.uK."),
+ (23, b"$2a$23$KB.uKB.uKB.uKB.uKB.uK."),
+ (24, b"$2a$24$KB.uKB.uKB.uKB.uKB.uK."),
+])
+def test_gensalt_rounds_valid(rounds, expected, monkeypatch):
+ urandom = mock.Mock(return_value=b"0000000000000000")
+ monkeypatch.setattr(os, "urandom", urandom)
+ assert bcrypt.gensalt(rounds) == expected
+
+
+@pytest.mark.parametrize(("rounds",), [[x] for x in range(1, 4)])
+def test_gensalt_rounds_invalid(rounds, monkeypatch):
+ urandom = mock.Mock(return_value=b"0000000000000000")
+ monkeypatch.setattr(os, "urandom", urandom)
+
+ with pytest.raises(ValueError):
+ bcrypt.gensalt(rounds)
+
+
+@pytest.mark.parametrize(("password", "salt", "expected"), [
+ (b"Kk4DQuMMfZL9o", b"$2a$04$cVWp4XaNU8a4v1uMRum2SO", b"$2a$04$cVWp4XaNU8a4v1uMRum2SO026BWLIoQMD/TXg5uZV.0P.uO8m3YEm"),
+ (b"9IeRXmnGxMYbs", b"$2a$04$pQ7gRO7e6wx/936oXhNjrO", b"$2a$04$pQ7gRO7e6wx/936oXhNjrOUNOHL1D0h1N2IDbJZYs.1ppzSof6SPy"),
+ (b"xVQVbwa1S0M8r", b"$2a$04$SQe9knOzepOVKoYXo9xTte", b"$2a$04$SQe9knOzepOVKoYXo9xTteNYr6MBwVz4tpriJVe3PNgYufGIsgKcW"),
+ (b"Zfgr26LWd22Za", b"$2a$04$eH8zX.q5Q.j2hO1NkVYJQO", b"$2a$04$eH8zX.q5Q.j2hO1NkVYJQOM6KxntS/ow3.YzVmFrE4t//CoF4fvne"),
+ (b"Tg4daC27epFBE", b"$2a$04$ahiTdwRXpUG2JLRcIznxc.", b"$2a$04$ahiTdwRXpUG2JLRcIznxc.s1.ydaPGD372bsGs8NqyYjLY1inG5n2"),
+ (b"xhQPMmwh5ALzW", b"$2a$04$nQn78dV0hGHf5wUBe0zOFu", b"$2a$04$nQn78dV0hGHf5wUBe0zOFu8n07ZbWWOKoGasZKRspZxtt.vBRNMIy"),
+ (b"59je8h5Gj71tg", b"$2a$04$cvXudZ5ugTg95W.rOjMITu", b"$2a$04$cvXudZ5ugTg95W.rOjMITuM1jC0piCl3zF5cmGhzCibHZrNHkmckG"),
+ (b"wT4fHJa2N9WSW", b"$2a$04$YYjtiq4Uh88yUsExO0RNTu", b"$2a$04$YYjtiq4Uh88yUsExO0RNTuEJ.tZlsONac16A8OcLHleWFjVawfGvO"),
+ (b"uSgFRnQdOgm4S", b"$2a$04$WLTjgY/pZSyqX/fbMbJzf.", b"$2a$04$WLTjgY/pZSyqX/fbMbJzf.qxCeTMQOzgL.CimRjMHtMxd/VGKojMu"),
+ (b"tEPtJZXur16Vg", b"$2a$04$2moPs/x/wnCfeQ5pCheMcu", b"$2a$04$2moPs/x/wnCfeQ5pCheMcuSJQ/KYjOZG780UjA/SiR.KsYWNrC7SG"),
+ (b"vvho8C6nlVf9K", b"$2a$04$HrEYC/AQ2HS77G78cQDZQ.", b"$2a$04$HrEYC/AQ2HS77G78cQDZQ.r44WGcruKw03KHlnp71yVQEwpsi3xl2"),
+ (b"5auCCY9by0Ruf", b"$2a$04$vVYgSTfB8KVbmhbZE/k3R.", b"$2a$04$vVYgSTfB8KVbmhbZE/k3R.ux9A0lJUM4CZwCkHI9fifke2.rTF7MG"),
+ (b"GtTkR6qn2QOZW", b"$2a$04$JfoNrR8.doieoI8..F.C1O", b"$2a$04$JfoNrR8.doieoI8..F.C1OQgwE3uTeuardy6lw0AjALUzOARoyf2m"),
+ (b"zKo8vdFSnjX0f", b"$2a$04$HP3I0PUs7KBEzMBNFw7o3O", b"$2a$04$HP3I0PUs7KBEzMBNFw7o3O7f/uxaZU7aaDot1quHMgB2yrwBXsgyy"),
+ (b"I9VfYlacJiwiK", b"$2a$04$xnFVhJsTzsFBTeP3PpgbMe", b"$2a$04$xnFVhJsTzsFBTeP3PpgbMeMREb6rdKV9faW54Sx.yg9plf4jY8qT6"),
+ (b"VFPO7YXnHQbQO", b"$2a$04$WQp9.igoLqVr6Qk70mz6xu", b"$2a$04$WQp9.igoLqVr6Qk70mz6xuRxE0RttVXXdukpR9N54x17ecad34ZF6"),
+ (b"VDx5BdxfxstYk", b"$2a$04$xgZtlonpAHSU/njOCdKztO", b"$2a$04$xgZtlonpAHSU/njOCdKztOPuPFzCNVpB4LGicO4/OGgHv.uKHkwsS"),
+ (b"dEe6XfVGrrfSH", b"$2a$04$2Siw3Nv3Q/gTOIPetAyPr.", b"$2a$04$2Siw3Nv3Q/gTOIPetAyPr.GNj3aO0lb1E5E9UumYGKjP9BYqlNWJe"),
+ (b"cTT0EAFdwJiLn", b"$2a$04$7/Qj7Kd8BcSahPO4khB8me", b"$2a$04$7/Qj7Kd8BcSahPO4khB8me4ssDJCW3r4OGYqPF87jxtrSyPj5cS5m"),
+ (b"J8eHUDuxBB520", b"$2a$04$VvlCUKbTMjaxaYJ.k5juoe", b"$2a$04$VvlCUKbTMjaxaYJ.k5juoecpG/7IzcH1AkmqKi.lIZMVIOLClWAk."),
+])
+def test_hashpw_new(password, salt, expected):
+ assert bcrypt.hashpw(password, salt) == expected
+
+
+@pytest.mark.parametrize(("password", "hashed"), [
+ (b"Kk4DQuMMfZL9o", b"$2a$04$cVWp4XaNU8a4v1uMRum2SO026BWLIoQMD/TXg5uZV.0P.uO8m3YEm"),
+ (b"9IeRXmnGxMYbs", b"$2a$04$pQ7gRO7e6wx/936oXhNjrOUNOHL1D0h1N2IDbJZYs.1ppzSof6SPy"),
+ (b"xVQVbwa1S0M8r", b"$2a$04$SQe9knOzepOVKoYXo9xTteNYr6MBwVz4tpriJVe3PNgYufGIsgKcW"),
+ (b"Zfgr26LWd22Za", b"$2a$04$eH8zX.q5Q.j2hO1NkVYJQOM6KxntS/ow3.YzVmFrE4t//CoF4fvne"),
+ (b"Tg4daC27epFBE", b"$2a$04$ahiTdwRXpUG2JLRcIznxc.s1.ydaPGD372bsGs8NqyYjLY1inG5n2"),
+ (b"xhQPMmwh5ALzW", b"$2a$04$nQn78dV0hGHf5wUBe0zOFu8n07ZbWWOKoGasZKRspZxtt.vBRNMIy"),
+ (b"59je8h5Gj71tg", b"$2a$04$cvXudZ5ugTg95W.rOjMITuM1jC0piCl3zF5cmGhzCibHZrNHkmckG"),
+ (b"wT4fHJa2N9WSW", b"$2a$04$YYjtiq4Uh88yUsExO0RNTuEJ.tZlsONac16A8OcLHleWFjVawfGvO"),
+ (b"uSgFRnQdOgm4S", b"$2a$04$WLTjgY/pZSyqX/fbMbJzf.qxCeTMQOzgL.CimRjMHtMxd/VGKojMu"),
+ (b"tEPtJZXur16Vg", b"$2a$04$2moPs/x/wnCfeQ5pCheMcuSJQ/KYjOZG780UjA/SiR.KsYWNrC7SG"),
+ (b"vvho8C6nlVf9K", b"$2a$04$HrEYC/AQ2HS77G78cQDZQ.r44WGcruKw03KHlnp71yVQEwpsi3xl2"),
+ (b"5auCCY9by0Ruf", b"$2a$04$vVYgSTfB8KVbmhbZE/k3R.ux9A0lJUM4CZwCkHI9fifke2.rTF7MG"),
+ (b"GtTkR6qn2QOZW", b"$2a$04$JfoNrR8.doieoI8..F.C1OQgwE3uTeuardy6lw0AjALUzOARoyf2m"),
+ (b"zKo8vdFSnjX0f", b"$2a$04$HP3I0PUs7KBEzMBNFw7o3O7f/uxaZU7aaDot1quHMgB2yrwBXsgyy"),
+ (b"I9VfYlacJiwiK", b"$2a$04$xnFVhJsTzsFBTeP3PpgbMeMREb6rdKV9faW54Sx.yg9plf4jY8qT6"),
+ (b"VFPO7YXnHQbQO", b"$2a$04$WQp9.igoLqVr6Qk70mz6xuRxE0RttVXXdukpR9N54x17ecad34ZF6"),
+ (b"VDx5BdxfxstYk", b"$2a$04$xgZtlonpAHSU/njOCdKztOPuPFzCNVpB4LGicO4/OGgHv.uKHkwsS"),
+ (b"dEe6XfVGrrfSH", b"$2a$04$2Siw3Nv3Q/gTOIPetAyPr.GNj3aO0lb1E5E9UumYGKjP9BYqlNWJe"),
+ (b"cTT0EAFdwJiLn", b"$2a$04$7/Qj7Kd8BcSahPO4khB8me4ssDJCW3r4OGYqPF87jxtrSyPj5cS5m"),
+ (b"J8eHUDuxBB520", b"$2a$04$VvlCUKbTMjaxaYJ.k5juoecpG/7IzcH1AkmqKi.lIZMVIOLClWAk."),
+])
+def test_hashpw_existing(password, hashed):
+ assert bcrypt.hashpw(password, hashed) == hashed
+
+
+def test_hashpw_invalid():
+ with pytest.raises(ValueError):
+ bcrypt.hashpw(b"password", b"$2z$04$cVWp4XaNU8a4v1uMRum2SO")