mirror of
https://github.com/python/cpython.git
synced 2024-12-23 08:44:20 +08:00
110 lines
4.0 KiB
Python
110 lines
4.0 KiB
Python
import sys
|
|
import unittest
|
|
|
|
|
|
try:
|
|
import crypt
|
|
IMPORT_ERROR = None
|
|
except ImportError as ex:
|
|
if sys.platform != 'win32':
|
|
raise unittest.SkipTest(str(ex))
|
|
crypt = None
|
|
IMPORT_ERROR = str(ex)
|
|
|
|
|
|
@unittest.skipUnless(sys.platform == 'win32', 'This should only run on windows')
|
|
@unittest.skipIf(crypt, 'import succeeded')
|
|
class TestWhyCryptDidNotImport(unittest.TestCase):
|
|
|
|
def test_import_failure_message(self):
|
|
self.assertIn('not supported', IMPORT_ERROR)
|
|
|
|
|
|
@unittest.skipUnless(crypt, 'crypt module is required')
|
|
class CryptTestCase(unittest.TestCase):
|
|
|
|
def test_crypt(self):
|
|
cr = crypt.crypt('mypassword')
|
|
cr2 = crypt.crypt('mypassword', cr)
|
|
self.assertEqual(cr2, cr)
|
|
cr = crypt.crypt('mypassword', 'ab')
|
|
if cr is not None:
|
|
cr2 = crypt.crypt('mypassword', cr)
|
|
self.assertEqual(cr2, cr)
|
|
|
|
def test_salt(self):
|
|
self.assertEqual(len(crypt._saltchars), 64)
|
|
for method in crypt.methods:
|
|
salt = crypt.mksalt(method)
|
|
self.assertIn(len(salt) - method.salt_chars, {0, 1, 3, 4, 6, 7})
|
|
if method.ident:
|
|
self.assertIn(method.ident, salt[:len(salt)-method.salt_chars])
|
|
|
|
def test_saltedcrypt(self):
|
|
for method in crypt.methods:
|
|
cr = crypt.crypt('assword', method)
|
|
self.assertEqual(len(cr), method.total_size)
|
|
cr2 = crypt.crypt('assword', cr)
|
|
self.assertEqual(cr2, cr)
|
|
cr = crypt.crypt('assword', crypt.mksalt(method))
|
|
self.assertEqual(len(cr), method.total_size)
|
|
|
|
def test_methods(self):
|
|
self.assertTrue(len(crypt.methods) >= 1)
|
|
if sys.platform.startswith('openbsd'):
|
|
self.assertEqual(crypt.methods, [crypt.METHOD_BLOWFISH])
|
|
else:
|
|
self.assertEqual(crypt.methods[-1], crypt.METHOD_CRYPT)
|
|
|
|
@unittest.skipUnless(
|
|
crypt
|
|
and (
|
|
crypt.METHOD_SHA256 in crypt.methods or crypt.METHOD_SHA512 in crypt.methods
|
|
),
|
|
'requires support of SHA-2',
|
|
)
|
|
def test_sha2_rounds(self):
|
|
for method in (crypt.METHOD_SHA256, crypt.METHOD_SHA512):
|
|
for rounds in 1000, 10_000, 100_000:
|
|
salt = crypt.mksalt(method, rounds=rounds)
|
|
self.assertIn('$rounds=%d$' % rounds, salt)
|
|
self.assertEqual(len(salt) - method.salt_chars,
|
|
11 + len(str(rounds)))
|
|
cr = crypt.crypt('mypassword', salt)
|
|
self.assertTrue(cr)
|
|
cr2 = crypt.crypt('mypassword', cr)
|
|
self.assertEqual(cr2, cr)
|
|
|
|
@unittest.skipUnless(
|
|
crypt and crypt.METHOD_BLOWFISH in crypt.methods, 'requires support of Blowfish'
|
|
)
|
|
def test_blowfish_rounds(self):
|
|
for log_rounds in range(4, 11):
|
|
salt = crypt.mksalt(crypt.METHOD_BLOWFISH, rounds=1 << log_rounds)
|
|
self.assertIn('$%02d$' % log_rounds, salt)
|
|
self.assertIn(len(salt) - crypt.METHOD_BLOWFISH.salt_chars, {6, 7})
|
|
cr = crypt.crypt('mypassword', salt)
|
|
self.assertTrue(cr)
|
|
cr2 = crypt.crypt('mypassword', cr)
|
|
self.assertEqual(cr2, cr)
|
|
|
|
def test_invalid_rounds(self):
|
|
for method in (crypt.METHOD_SHA256, crypt.METHOD_SHA512,
|
|
crypt.METHOD_BLOWFISH):
|
|
with self.assertRaises(TypeError):
|
|
crypt.mksalt(method, rounds='4096')
|
|
with self.assertRaises(TypeError):
|
|
crypt.mksalt(method, rounds=4096.0)
|
|
for rounds in (0, 1, -1, 1<<999):
|
|
with self.assertRaises(ValueError):
|
|
crypt.mksalt(method, rounds=rounds)
|
|
with self.assertRaises(ValueError):
|
|
crypt.mksalt(crypt.METHOD_BLOWFISH, rounds=1000)
|
|
for method in (crypt.METHOD_CRYPT, crypt.METHOD_MD5):
|
|
with self.assertRaisesRegex(ValueError, 'support'):
|
|
crypt.mksalt(method, rounds=4096)
|
|
|
|
|
|
if __name__ == "__main__":
|
|
unittest.main()
|