/* * (C) 2014,2015 Jack Lloyd * * Botan is released under the Simplified BSD License (see license.txt) */ #include "tests.h" #if defined(BOTAN_HAS_BCRYPT) #include #endif #if defined(BOTAN_HAS_PASSHASH9) #include #endif namespace Botan_Tests { namespace { #if defined(BOTAN_HAS_BCRYPT) class Bcrypt_Tests final : public Text_Based_Test { public: Bcrypt_Tests() : Text_Based_Test("bcrypt.vec", "Password,Passhash") {} Test::Result run_one_test(const std::string&, const VarMap& vars) override { // Encoded as binary so we can test binary inputs const std::vector password_vec = get_req_bin(vars, "Password"); const std::string password(reinterpret_cast(password_vec.data()), password_vec.size()); const std::string passhash = get_req_str(vars, "Passhash"); Test::Result result("bcrypt"); result.test_eq("correct hash accepted", Botan::check_bcrypt(password, passhash), true); // self-test low levels for each test password for(uint16_t level = 4; level <= 6; ++level) { const std::string gen_hash = generate_bcrypt(password, Test::rng(), level); result.test_eq("generated hash accepted", Botan::check_bcrypt(password, gen_hash), true); } return result; } std::vector run_final_tests() override { Test::Result result("bcrypt"); uint64_t start = Test::timestamp(); const std::string password = "ag00d1_2BE5ur3"; const uint16_t max_level = (Test::run_long_tests() ? 15 : 10); for(uint16_t level = 4; level <= max_level; ++level) { const std::string gen_hash = generate_bcrypt(password, Test::rng(), level); result.test_eq("generated hash accepted", Botan::check_bcrypt(password, gen_hash), true); } result.set_ns_consumed(Test::timestamp() - start); return {result}; } }; BOTAN_REGISTER_TEST("bcrypt", Bcrypt_Tests); #endif #if defined(BOTAN_HAS_PASSHASH9) class Passhash9_Tests final : public Text_Based_Test { public: Passhash9_Tests() : Text_Based_Test("passhash9.vec", "Password,Passhash,PRF") {} Test::Result run_one_test(const std::string&, const VarMap& vars) override { // Encoded as binary so we can test binary inputs const std::vector password_vec = get_req_bin(vars, "Password"); const std::string password(reinterpret_cast(password_vec.data()), password_vec.size()); const std::string passhash = get_req_str(vars, "Passhash"); const std::size_t prf = get_req_sz(vars, "PRF"); Test::Result result("passhash9"); if(Botan::is_passhash9_alg_supported(uint8_t(prf))) { result.test_eq("correct hash accepted", Botan::check_passhash9(password, passhash), true); } for(uint8_t alg_id = 0; alg_id <= 4; ++alg_id) { if(Botan::is_passhash9_alg_supported(alg_id)) { const std::string gen_hash = Botan::generate_passhash9(password, Test::rng(), 2, alg_id); if(!result.test_eq("generated hash accepted", Botan::check_passhash9(password, gen_hash), true)) { result.test_note("hash was " + gen_hash); } } } const uint16_t max_level = (Test::run_long_tests() ? 14 : 8); for(uint16_t level = 1; level <= max_level; ++level) { const uint8_t alg_id = 1; // default used by generate_passhash9() if(Botan::is_passhash9_alg_supported(alg_id)) { const std::string gen_hash = Botan::generate_passhash9(password, Test::rng(), level, alg_id); if(!result.test_eq("generated hash accepted", Botan::check_passhash9(password, gen_hash), true)) { result.test_note("hash was " + gen_hash); } } } return result; } }; BOTAN_REGISTER_TEST("passhash9", Passhash9_Tests); #endif } }