diff options
Diffstat (limited to 'internal/authentication/password_hash_test.go')
| -rw-r--r-- | internal/authentication/password_hash_test.go | 14 |
1 files changed, 10 insertions, 4 deletions
diff --git a/internal/authentication/password_hash_test.go b/internal/authentication/password_hash_test.go index b169cb465..9017cee00 100644 --- a/internal/authentication/password_hash_test.go +++ b/internal/authentication/password_hash_test.go @@ -47,10 +47,13 @@ func TestShouldHashArgon2idPassword(t *testing.T) { // This checks the method of hashing (for argon2id) supports all the characters we allow in Authelia's hash function. func TestArgon2idHashSaltValidValues(t *testing.T) { + var err error + + var hash string + data := string(HashingPossibleSaltCharacters) datas := utils.SliceString(data, 16) - var hash string - var err error + for _, salt := range datas { hash, err = HashPassword("password", salt, HashingAlgorithmArgon2id, 1, 8, 1, 32, 16) assert.NoError(t, err) @@ -60,10 +63,13 @@ func TestArgon2idHashSaltValidValues(t *testing.T) { // This checks the method of hashing (for sha512) supports all the characters we allow in Authelia's hash function. func TestSHA512HashSaltValidValues(t *testing.T) { + var err error + + var hash string + data := string(HashingPossibleSaltCharacters) datas := utils.SliceString(data, 16) - var hash string - var err error + for _, salt := range datas { hash, err = HashPassword("password", salt, HashingAlgorithmSHA512, 1000, 0, 0, 0, 16) assert.NoError(t, err) |
