mirror of
https://gitlab.com/veilid/veilid.git
synced 2024-10-01 01:26:08 -04:00
35 lines
1.1 KiB
Dart
35 lines
1.1 KiB
Dart
import 'dart:convert';
|
|
|
|
import 'package:flutter_test/flutter_test.dart';
|
|
import 'package:veilid/veilid.dart';
|
|
|
|
Future<void> testBestCryptoSystem() async {
|
|
final cs = await Veilid.instance.bestCryptoSystem();
|
|
expect(await cs.defaultSaltLength(), equals(16));
|
|
}
|
|
|
|
Future<void> testGetCryptoSystem() async {
|
|
final cs = await Veilid.instance.getCryptoSystem(cryptoKindVLD0);
|
|
expect(await cs.defaultSaltLength(), equals(16));
|
|
}
|
|
|
|
Future<void> testGetCryptoSystemInvalid() async {
|
|
await expectLater(
|
|
() async => await Veilid.instance.getCryptoSystem(cryptoKindNONE),
|
|
throwsA(isA<VeilidAPIException>()));
|
|
}
|
|
|
|
Future<void> testHashAndVerifyPassword() async {
|
|
final cs = await Veilid.instance.bestCryptoSystem();
|
|
final nonce = await cs.randomNonce();
|
|
final salt = nonce.decode();
|
|
|
|
// Password match
|
|
final phash = await cs.hashPassword(utf8.encode("abc123"), salt);
|
|
expect(await cs.verifyPassword(utf8.encode("abc123"), phash), isTrue);
|
|
|
|
// Password mismatch
|
|
await cs.hashPassword(utf8.encode("abc1234"), salt);
|
|
expect(await cs.verifyPassword(utf8.encode("abc1235"), phash), isFalse);
|
|
}
|