go-hibp/hibp_test.go
Winni Neessen 179cd36d7f
#27: Implement NTLM hash support for PwnedPassAPI
This PR implements support for NTLM hashes as announced by Troy Hunt:
https://s.pebcak.de/@troyhunt@infosec.exchange/109833758367903768

For this we needed to be able to calculate MD4 hashes, as NTLM basically is calculated like this: `MD4(UTF-16LE(pw))`. For this we ported the official golang.org/x/crypto/md4 package, so we can still claim that "only depends on Go stdlib"

A new Client option has been introduced: `WithPwnedNTLMHash`. If the client is initalized with this option, all generic methods (`ListHashesPassword` and `CheckPassword`) will  operate on NTLM hashes.

Additionally, there are now equivalent methods for checking passwords and listing hashes for NTLM: `CheckNTLM` and `ListHashesNTLM`
2023-02-09 17:07:20 +01:00

125 lines
3.8 KiB
Go

package hibp
import (
"fmt"
"net/http"
"os"
"testing"
"time"
)
// TestNew tests the New() function
func TestNew(t *testing.T) {
hc := New()
if *hc.PwnedPassAPI.hibp != hc {
t.Errorf("hibp client creation failed")
}
}
// TestNewWithNil tests the New() function with a nil option
func TestNewWithNil(t *testing.T) {
hc := New(nil)
if *hc.PwnedPassAPI.hibp != hc {
t.Errorf("hibp client creation failed")
}
}
// TestNewWithHttpTimeout tests the New() function with the http timeout option
func TestNewWithHttpTimeout(t *testing.T) {
hc := New(WithHTTPTimeout(time.Second * 10))
if hc.to != time.Second*10 {
t.Errorf("hibp client timeout option was not set properly. Expected %d, got: %d",
time.Second*10, hc.to)
}
}
// TestNewWithPwnedPadding tests the New() function with the PwnedPadding option
func TestNewWithPwnedPadding(t *testing.T) {
hc := New(WithPwnedPadding())
if !hc.PwnedPassAPIOpts.WithPadding {
t.Errorf("hibp client pwned padding option was not set properly. Expected %t, got: %t",
true, hc.PwnedPassAPIOpts.WithPadding)
}
}
// TestNewWithPwnedNTLMHash tests the New() function with the PwnedPadding option
func TestNewWithPwnedNTLMHash(t *testing.T) {
hc := New(WithPwnedNTLMHash())
if hc.PwnedPassAPIOpts.HashMode != HashModeNTLM {
t.Errorf("hibp client NTLM hash mode option was not set properly. Expected %d, got: %d",
HashModeNTLM, hc.PwnedPassAPIOpts.HashMode)
}
hc = New()
if hc.PwnedPassAPIOpts.HashMode != HashModeSHA1 {
t.Errorf("hibp client SHA-1 hash mode option was not set properly. Expected %d, got: %d",
HashModeSHA1, hc.PwnedPassAPIOpts.HashMode)
}
}
// TestNewWithApiKey tests the New() function with the API key set
func TestNewWithApiKey(t *testing.T) {
apiKey := os.Getenv("HIBP_API_KEY")
hc := New(WithAPIKey(apiKey), WithRateLimitSleep())
if hc.ak != apiKey {
t.Errorf("hibp client API key was not set properly. Expected %s, got: %s",
apiKey, hc.ak)
}
}
// TestNewWithUserAgent tests the New() function with a custom user agent
func TestNewWithUserAgent(t *testing.T) {
hc := New()
if hc.ua != DefaultUserAgent {
t.Errorf("hibp client default user agent was not set properly. Expected %s, got: %s",
DefaultUserAgent, hc.ua)
}
custUA := fmt.Sprintf("customUA v%s", Version)
hc = New(WithUserAgent(custUA))
if hc.ua != custUA {
t.Errorf("hibp client custom user agent was not set properly. Expected %s, got: %s",
custUA, hc.ua)
}
hc = New(WithUserAgent(""))
if hc.ua != DefaultUserAgent {
t.Errorf("hibp client custom user agent was not set properly. Expected %s, got: %s",
DefaultUserAgent, hc.ua)
}
}
func TestClient_HTTPReq(t *testing.T) {
u1 := "this://is.invalid.tld/with/invalid/chars/" + string([]byte{0x7f})
u2 := "this://is.invalid.tld/"
hc := New()
_, err := hc.HTTPReq(http.MethodGet, u1, map[string]string{"foo": "bar"})
if err == nil {
t.Errorf("HTTP GET request was supposed to fail, but didn't")
}
_, err = hc.HTTPReq("äöü", u2, map[string]string{"foo": "bar"})
if err == nil {
t.Errorf("HTTP GET request was supposed to fail, but didn't")
}
_, err = hc.HTTPReq("POST", u2, map[string]string{"foo": "bar"})
if err != nil {
t.Errorf("HTTP POST request failed: %s", err)
}
}
func TestClient_HTTPResBody(t *testing.T) {
u1 := "this://is.invalid.tld/with/invalid/chars/" + string([]byte{0x7f})
u2 := "this://is.invalid.tld/"
hc := New()
_, _, err := hc.HTTPResBody(http.MethodGet, u1, map[string]string{"foo": "bar"})
if err == nil {
t.Errorf("HTTP GET request was supposed to fail, but didn't")
}
_, _, err = hc.HTTPResBody("äöü", u2, map[string]string{"foo": "bar"})
if err == nil {
t.Errorf("HTTP GET request was supposed to fail, but didn't")
}
_, _, err = hc.HTTPResBody("POST", u2, map[string]string{"foo": "bar"})
if err == nil {
t.Errorf("HTTP POST request was supposed to fail, but didn't")
}
}