19 declare(strict_types=1);
29 $this->assertInstanceOf(ilArgon2idPasswordEncoder::class, $encoder);
31 if (!$encoder->isSupportedByRuntime()) {
32 $this->markTestSkipped(
'Argon2id is not supported by the runtime.');
45 $this->assertTrue($encoder->
isPasswordValid($encoded_password, self::PASSWORD,
''));
46 $this->assertFalse($encoder->
isPasswordValid($encoded_password, self::WRONG_PASSWORD,
''));
56 $this->expectException(ilPasswordException::class);
66 $this->assertFalse($encoder->
isPasswordValid(
'encoded', str_repeat(
'a', 5000),
''));
74 $this->assertSame(
'argon2id', $encoder->
getName());
90 $raw = self::PASSWORD;
getName()
Returns a unique name/id of the concrete password encoder.
setTimeCost(int $time_cost)
testPasswordVerificationShouldFailIfTheRawPasswordExceedsTheSupportedLength(ilArgon2idPasswordEncoder $encoder)
testInstanceCanBeCreated
isPasswordValid(string $encoded, string $raw, string $salt)
Checks a raw password against an encoded password.
testEncoderDoesNotRelyOnSalts(ilArgon2idPasswordEncoder $encoder)
testInstanceCanBeCreated
requiresSalt()
Returns whether the encoder requires a salt.
requiresReencoding(string $encoded)
Returns whether the encoded password needs to be re-encoded.
setMemoryCost(int $memory_costs)
testExceptionIsRaisedIfThePasswordExceedsTheSupportedLengthOnEncoding(ilArgon2idPasswordEncoder $encoder)
testInstanceCanBeCreated
testReencodingIsDetectedWhenNecessary(ilArgon2idPasswordEncoder $encoder)
testInstanceCanBeCreated
testPasswordShouldBeCorrectlyEncodedAndVerified(ilArgon2idPasswordEncoder $encoder)
testInstanceCanBeCreated
testNameShouldBeArgon2id(ilArgon2idPasswordEncoder $encoder)
testInstanceCanBeCreated
testInstanceCanBeCreated()
encodePassword(string $raw, string $salt)
Encodes the raw password.