Instead of lengthy blurbs, switch to single-line, machine-readable standardized (https://spdx.dev) license identifiers. The Linux kernel switched long ago, so there is strong precedent. Three cases are handled: AGPL-only, Apache-only, and dual licensed. For the latter case, I chose (AGPL-3.0-or-later and Apache-2.0), reasoning that our changes are extensive enough to apply our license. The changes we applied mechanically with a script, except to licenses/README.md. Closes #9937
61 lines
1.6 KiB
C++
61 lines
1.6 KiB
C++
/*
|
|
* Copyright (C) 2018-present ScyllaDB
|
|
*/
|
|
|
|
/*
|
|
* SPDX-License-Identifier: AGPL-3.0-or-later
|
|
*/
|
|
|
|
#define BOOST_TEST_MODULE core
|
|
|
|
#include <array>
|
|
#include <random>
|
|
#include <unordered_set>
|
|
|
|
#include "auth/passwords.hh"
|
|
|
|
#include <boost/test/unit_test.hpp>
|
|
#include <seastar/core/sstring.hh>
|
|
|
|
#include "seastarx.hh"
|
|
|
|
static auto rng_for_salt = std::default_random_engine(std::random_device{}());
|
|
|
|
//
|
|
// The same password hashed multiple times will result in different strings because the salt will be different.
|
|
//
|
|
BOOST_AUTO_TEST_CASE(passwords_are_salted) {
|
|
const char* const cleartext = "my_excellent_password";
|
|
std::unordered_set<sstring> observed_passwords{};
|
|
|
|
for (int i = 0; i < 10; ++i) {
|
|
const sstring e = auth::passwords::hash(cleartext, rng_for_salt);
|
|
BOOST_REQUIRE(!observed_passwords.contains(e));
|
|
observed_passwords.insert(e);
|
|
}
|
|
}
|
|
|
|
//
|
|
// A hashed password will authenticate against the same password in cleartext.
|
|
//
|
|
BOOST_AUTO_TEST_CASE(correct_passwords_authenticate) {
|
|
// Common passwords.
|
|
std::array<const char*, 3> passwords{
|
|
"12345",
|
|
"1_am_the_greatest!",
|
|
"password1"
|
|
};
|
|
|
|
for (const char* p : passwords) {
|
|
BOOST_REQUIRE(auth::passwords::check(p, auth::passwords::hash(p, rng_for_salt)));
|
|
}
|
|
}
|
|
|
|
//
|
|
// A hashed password that does not match the password in cleartext does not authenticate.
|
|
//
|
|
BOOST_AUTO_TEST_CASE(incorrect_passwords_do_not_authenticate) {
|
|
const sstring hashed_password = auth::passwords::hash("actual_password", rng_for_salt);
|
|
BOOST_REQUIRE(!auth::passwords::check("password_guess", hashed_password));
|
|
}
|