summaryrefslogtreecommitdiff
path: root/rt/t/api/password-types.t
diff options
context:
space:
mode:
Diffstat (limited to 'rt/t/api/password-types.t')
-rw-r--r--rt/t/api/password-types.t16
1 files changed, 14 insertions, 2 deletions
diff --git a/rt/t/api/password-types.t b/rt/t/api/password-types.t
index 4cb6342..9eeded4 100644
--- a/rt/t/api/password-types.t
+++ b/rt/t/api/password-types.t
@@ -4,17 +4,29 @@ use warnings;
use RT::Test;
use Digest::MD5;
-my $default = "sha512";
+my $default = "bcrypt";
my $root = RT::User->new(RT->SystemUser);
$root->Load("root");
-# Salted SHA-512 (default)
+# bcrypt (default)
my $old = $root->__Value("Password");
like($old, qr/^\!$default\!/, "Stored as salted $default");
ok($root->IsPassword("password"));
is($root->__Value("Password"), $old, "Unchanged after password check");
+# bcrypt (smaller number of rounds)
+my $salt = Crypt::Eksblowfish::Bcrypt::en_base64("a"x16);
+$root->_Set( Field => "Password", Value => RT::User->_GeneratePassword_bcrypt("smaller", 6, $salt) );
+like($root->__Value("Password"), qr/^\!$default\!06\!/, "Stored with a smaller number of rounds");
+ok($root->IsPassword("smaller"), "Smaller number of bcrypt rounds works");
+like($root->__Value("Password"), qr/^\!$default\!10\!/, "And is now upgraded to salted $default");
+
+# Salted SHA-512, one round
+$root->_Set( Field => "Password", Value => RT::User->_GeneratePassword_sha512("other", "salt") );
+ok($root->IsPassword("other"), "SHA-512 password works");
+like($root->__Value("Password"), qr/^\!$default\!/, "And is now upgraded to salted $default");
+
# Crypt
$root->_Set( Field => "Password", Value => crypt("something", "salt"));
ok($root->IsPassword("something"), "crypt()ed password works");