1
0
Fork 0
mirror of https://github.com/Luzifer/password.git synced 2024-11-10 02:10:00 +00:00
password/lib/generator_test.go

137 lines
3.7 KiB
Go
Raw Normal View History

2015-05-02 13:03:27 +00:00
package securepassword
import "testing"
func TestInsecurePasswords(t *testing.T) {
passwords := map[string]string{
"8452028337962356": "Password with only numeric characters was accepted.",
"adfgjadrgdagasdf": "Password with only lowercase characters was accepted.",
"ASEFSTDHQAEGFADF": "Password with only uppercase characters was accepted.",
"135fach74nc94bd6": "Password without uppercase characters was accepted.",
"235JGOA0YTVKS46S": "Password without lowercase characters was accepted.",
"cKTn5mQXfasdS6qy": "Password with pattern asd was accepted.",
"cKTn5mQXfdsaS6qy": "Password with pattern dsa was accepted.",
"cKTn5mQXf345S6qy": "Password with pattern 345 was accepted.",
"cKTn5mQXf987S6qy": "Password with pattern 987 was accepted.",
"cKTn5mQXfabcS6qy": "Password with pattern abc was accepted.",
"cKTn5mQXfcbaS6qy": "Password with pattern cba was accepted.",
"cKTn5mQXfABCS6qy": "Password with pattern ABC was accepted.",
"cKTn5mQXfONMS6qy": "Password with pattern ONM was accepted.",
"Gncj5zzK29Dvx92h": "Password with character repetition was accepted",
"Gncj5%%K29Dvx92h": "Password with character repetition was accepted",
"Gncj55%K29Dvx92h": "Password with character repetition was accepted",
}
for password, errorMessage := range passwords {
if NewSecurePassword().CheckPasswordSecurity(password, false) {
t.Error(errorMessage)
}
}
}
func TestSecurePasswords(t *testing.T) {
passwords := []string{
"6e1GZ6V2empWAky5Z13a",
"DLHZA2zfWor1XUoJYvFR",
"sMf3uNf2E1pxPFMymah5",
"prb4tX1vtyVL7R316dKU",
"7bWc9C1ciL62h5u26Z9g",
}
for _, password := range passwords {
if !NewSecurePassword().CheckPasswordSecurity(password, false) {
t.Errorf("Password was rejected: %s", password)
}
}
}
func TestPasswordWithoutSpecialCharaterFail(t *testing.T) {
passwords := []string{
"6e1GZ6V2empWAky5Z13a",
"DLHZA2zfWor1XUoJYvFR",
"sMf3uNf2E1pxPFMymah5",
"prb4tX1vtyVL7R316dKU",
"7bWc9C1ciL62h5u26Z9g",
}
for _, password := range passwords {
if NewSecurePassword().CheckPasswordSecurity(password, true) {
t.Errorf("Password was accepted: %s", password)
}
}
}
func TestSecurePasswordWithSpecialCharacter(t *testing.T) {
passwords := []string{
`a*5S(+zQ9=<J~bH}!F])`,
`9?)k1Ge?[F}5w{#$Ho(6`,
`LRrot)%qVH!>3%/1MiNr`,
`/K}.]C4-a/{,39r$"(D+`,
`9dk#:@xjPd_m$:F"}>Cj`,
}
for _, password := range passwords {
if !NewSecurePassword().CheckPasswordSecurity(password, true) {
t.Errorf("Password was rejected: %s", password)
}
}
}
func BenchmarkGeneratePasswords8Char(b *testing.B) {
pwd := NewSecurePassword()
for i := 0; i < b.N; i++ {
pwd.GeneratePassword(8, false)
}
}
func BenchmarkGeneratePasswords8CharSpecial(b *testing.B) {
pwd := NewSecurePassword()
for i := 0; i < b.N; i++ {
pwd.GeneratePassword(8, true)
}
}
func BenchmarkGeneratePasswords16Char(b *testing.B) {
pwd := NewSecurePassword()
for i := 0; i < b.N; i++ {
pwd.GeneratePassword(16, false)
}
}
func BenchmarkGeneratePasswords16CharSpecial(b *testing.B) {
pwd := NewSecurePassword()
for i := 0; i < b.N; i++ {
pwd.GeneratePassword(16, true)
}
}
func BenchmarkGeneratePasswords32Char(b *testing.B) {
pwd := NewSecurePassword()
for i := 0; i < b.N; i++ {
pwd.GeneratePassword(32, false)
}
}
func BenchmarkGeneratePasswords32CharSpecial(b *testing.B) {
pwd := NewSecurePassword()
for i := 0; i < b.N; i++ {
pwd.GeneratePassword(32, true)
}
}
func BenchmarkGeneratePasswords128Char(b *testing.B) {
pwd := NewSecurePassword()
for i := 0; i < b.N; i++ {
pwd.GeneratePassword(128, false)
}
}
func BenchmarkGeneratePasswords128CharSpecial(b *testing.B) {
pwd := NewSecurePassword()
for i := 0; i < b.N; i++ {
pwd.GeneratePassword(128, true)
}
}