go-crypt/crypt/hash_test.go
Claude 8498ecf890
feat: extract crypto/security packages from core/go
ChaCha20-Poly1305, AES-256-GCM, Argon2 key derivation, OpenPGP
challenge-response auth, and trust tier policy engine.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-16 15:25:54 +00:00

50 lines
1.1 KiB
Go

package crypt
import (
"testing"
"github.com/stretchr/testify/assert"
"golang.org/x/crypto/bcrypt"
)
func TestHashPassword_Good(t *testing.T) {
password := "my-secure-password"
hash, err := HashPassword(password)
assert.NoError(t, err)
assert.NotEmpty(t, hash)
assert.Contains(t, hash, "$argon2id$")
match, err := VerifyPassword(password, hash)
assert.NoError(t, err)
assert.True(t, match)
}
func TestVerifyPassword_Bad(t *testing.T) {
password := "my-secure-password"
wrongPassword := "wrong-password"
hash, err := HashPassword(password)
assert.NoError(t, err)
match, err := VerifyPassword(wrongPassword, hash)
assert.NoError(t, err)
assert.False(t, match)
}
func TestHashBcrypt_Good(t *testing.T) {
password := "bcrypt-test-password"
hash, err := HashBcrypt(password, bcrypt.DefaultCost)
assert.NoError(t, err)
assert.NotEmpty(t, hash)
match, err := VerifyBcrypt(password, hash)
assert.NoError(t, err)
assert.True(t, match)
// Wrong password should not match
match, err = VerifyBcrypt("wrong-password", hash)
assert.NoError(t, err)
assert.False(t, match)
}