summaryrefslogtreecommitdiffstats
path: root/dependencies/pkg/mod/github.com/mattn/go-sqlite3@v1.14.16/sqlite3_func_crypt_test.go
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--dependencies/pkg/mod/github.com/mattn/go-sqlite3@v1.14.16/sqlite3_func_crypt_test.go57
1 files changed, 57 insertions, 0 deletions
diff --git a/dependencies/pkg/mod/github.com/mattn/go-sqlite3@v1.14.16/sqlite3_func_crypt_test.go b/dependencies/pkg/mod/github.com/mattn/go-sqlite3@v1.14.16/sqlite3_func_crypt_test.go
new file mode 100644
index 0000000..0329ca8
--- /dev/null
+++ b/dependencies/pkg/mod/github.com/mattn/go-sqlite3@v1.14.16/sqlite3_func_crypt_test.go
@@ -0,0 +1,57 @@
+// Copyright (C) 2018 G.J.R. Timmer <gjr.timmer@gmail.com>.
+//
+// Use of this source code is governed by an MIT-style
+// license that can be found in the LICENSE file.
+
+package sqlite3
+
+import (
+ "fmt"
+ "strings"
+ "testing"
+)
+
+// TestCryptEncoders to increase coverage
+func TestCryptEncoders(t *testing.T) {
+ tests := []struct {
+ enc string
+ salt string
+ expected string
+ }{
+ {"sha1", "", "d033e22ae348aeb5660fc2140aec35850c4da997"},
+ {"sha256", "", "8c6976e5b5410415bde908bd4dee15dfb167a9c873fc4bb8a81f6f2ab448a918"},
+ {"sha384", "", "9ca694a90285c034432c9550421b7b9dbd5c0f4b6673f05f6dbce58052ba20e4248041956ee8c9a2ec9f10290cdc0782"},
+ {"sha512", "", "c7ad44cbad762a5da0a452f9e854fdc1e0e7a52a38015f23f3eab1d80b931dd472634dfac71cd34ebc35d16ab7fb8a90c81f975113d6c7538dc69dd8de9077ec"},
+ {"ssha1", "salt", "9bc7aa55f08fdad935c3f8362d3f48bcf70eb280"},
+ {"ssha256", "salt", "f9a81477552594c79f2abc3fc099daa896a6e3a3590a55ffa392b6000412e80b"},
+ {"ssha384", "salt", "9ed776b477fcfc1b5e584989e8d770f5e17d98a7643546a63c2b07d4ab00f1348f6b8e73103d3a23554f727136e8c215"},
+ {"ssha512", "salt", "3c4a79782143337be4492be072abcfe979dd703c00541a8c39a0f3df4bab2029c050cf46fddc47090b5b04ac537b3e78189e3de16e601e859f95c51ac9f6dafb"},
+ }
+
+ for _, e := range tests {
+ var fn func(pass []byte, hash interface{}) []byte
+ switch e.enc {
+ case "sha1":
+ fn = CryptEncoderSHA1
+ case "ssha1":
+ fn = CryptEncoderSSHA1(e.salt)
+ case "sha256":
+ fn = CryptEncoderSHA256
+ case "ssha256":
+ fn = CryptEncoderSSHA256(e.salt)
+ case "sha384":
+ fn = CryptEncoderSHA384
+ case "ssha384":
+ fn = CryptEncoderSSHA384(e.salt)
+ case "sha512":
+ fn = CryptEncoderSHA512
+ case "ssha512":
+ fn = CryptEncoderSSHA512(e.salt)
+ }
+
+ h := fn([]byte("admin"), nil)
+ if strings.Compare(fmt.Sprintf("%x", h), e.expected) != 0 {
+ t.Fatalf("Invalid %s hash: expected: %s; got: %x", strings.ToUpper(e.enc), e.expected, h)
+ }
+ }
+}