2018-01-27 04:53:43 -04:00
|
|
|
import binascii
|
2013-11-24 18:14:16 -04:00
|
|
|
import functools
|
2001-09-11 12:54:16 -03:00
|
|
|
import hmac
|
2007-11-06 16:51:31 -04:00
|
|
|
import hashlib
|
2001-11-02 17:49:59 -04:00
|
|
|
import unittest
|
2018-01-27 04:53:43 -04:00
|
|
|
import unittest.mock
|
2007-11-06 16:51:31 -04:00
|
|
|
import warnings
|
2001-11-02 17:49:59 -04:00
|
|
|
|
2021-05-27 03:43:52 -03:00
|
|
|
from test.support import hashlib_helper, check_disallow_instantiation
|
2019-09-25 11:30:20 -03:00
|
|
|
|
2020-05-27 16:50:06 -03:00
|
|
|
from _operator import _compare_digest as operator_compare_digest
|
|
|
|
|
2020-05-17 08:49:10 -03:00
|
|
|
try:
|
2021-03-27 10:55:03 -03:00
|
|
|
import _hashlib as _hashopenssl
|
2020-05-17 08:49:10 -03:00
|
|
|
from _hashlib import HMAC as C_HMAC
|
|
|
|
from _hashlib import hmac_new as c_hmac_new
|
2020-05-27 16:50:06 -03:00
|
|
|
from _hashlib import compare_digest as openssl_compare_digest
|
2020-05-17 08:49:10 -03:00
|
|
|
except ImportError:
|
2021-03-27 10:55:03 -03:00
|
|
|
_hashopenssl = None
|
2020-05-17 08:49:10 -03:00
|
|
|
C_HMAC = None
|
|
|
|
c_hmac_new = None
|
2020-05-27 16:50:06 -03:00
|
|
|
openssl_compare_digest = None
|
2020-05-17 08:49:10 -03:00
|
|
|
|
2021-03-27 10:55:03 -03:00
|
|
|
try:
|
|
|
|
import _sha256 as sha256_module
|
|
|
|
except ImportError:
|
|
|
|
sha256_module = None
|
|
|
|
|
2013-11-24 18:14:16 -04:00
|
|
|
|
|
|
|
def ignore_warning(func):
|
|
|
|
@functools.wraps(func)
|
|
|
|
def wrapper(*args, **kwargs):
|
|
|
|
with warnings.catch_warnings():
|
|
|
|
warnings.filterwarnings("ignore",
|
2018-05-22 19:55:31 -03:00
|
|
|
category=DeprecationWarning)
|
2013-11-24 18:14:16 -04:00
|
|
|
return func(*args, **kwargs)
|
|
|
|
return wrapper
|
|
|
|
|
|
|
|
|
2001-11-02 17:49:59 -04:00
|
|
|
class TestVectorsTestCase(unittest.TestCase):
|
2002-08-22 16:38:14 -03:00
|
|
|
|
2021-03-27 10:55:03 -03:00
|
|
|
def assert_hmac_internals(
|
|
|
|
self, h, digest, hashname, digest_size, block_size
|
2020-05-17 08:49:10 -03:00
|
|
|
):
|
|
|
|
self.assertEqual(h.hexdigest().upper(), digest.upper())
|
|
|
|
self.assertEqual(h.digest(), binascii.unhexlify(digest))
|
|
|
|
self.assertEqual(h.name, f"hmac-{hashname}")
|
|
|
|
self.assertEqual(h.digest_size, digest_size)
|
|
|
|
self.assertEqual(h.block_size, block_size)
|
|
|
|
|
2021-03-27 10:55:03 -03:00
|
|
|
def assert_hmac(
|
|
|
|
self, key, data, digest, hashfunc, hashname, digest_size, block_size
|
|
|
|
):
|
|
|
|
h = hmac.HMAC(key, data, digestmod=hashfunc)
|
|
|
|
self.assert_hmac_internals(
|
|
|
|
h, digest, hashname, digest_size, block_size
|
|
|
|
)
|
|
|
|
|
2020-05-17 08:49:10 -03:00
|
|
|
h = hmac.HMAC(key, data, digestmod=hashname)
|
2021-03-27 10:55:03 -03:00
|
|
|
self.assert_hmac_internals(
|
|
|
|
h, digest, hashname, digest_size, block_size
|
|
|
|
)
|
2020-05-17 08:49:10 -03:00
|
|
|
|
|
|
|
h = hmac.HMAC(key, digestmod=hashname)
|
|
|
|
h2 = h.copy()
|
|
|
|
h2.update(b"test update")
|
|
|
|
h.update(data)
|
|
|
|
self.assertEqual(h.hexdigest().upper(), digest.upper())
|
|
|
|
|
|
|
|
h = hmac.new(key, data, digestmod=hashname)
|
2021-03-27 10:55:03 -03:00
|
|
|
self.assert_hmac_internals(
|
|
|
|
h, digest, hashname, digest_size, block_size
|
|
|
|
)
|
2020-05-17 08:49:10 -03:00
|
|
|
|
|
|
|
h = hmac.new(key, None, digestmod=hashname)
|
|
|
|
h.update(data)
|
|
|
|
self.assertEqual(h.hexdigest().upper(), digest.upper())
|
|
|
|
|
|
|
|
h = hmac.new(key, digestmod=hashname)
|
|
|
|
h.update(data)
|
|
|
|
self.assertEqual(h.hexdigest().upper(), digest.upper())
|
|
|
|
|
|
|
|
h = hmac.new(key, data, digestmod=hashfunc)
|
|
|
|
self.assertEqual(h.hexdigest().upper(), digest.upper())
|
|
|
|
|
|
|
|
self.assertEqual(
|
|
|
|
hmac.digest(key, data, digest=hashname),
|
|
|
|
binascii.unhexlify(digest)
|
|
|
|
)
|
|
|
|
self.assertEqual(
|
|
|
|
hmac.digest(key, data, digest=hashfunc),
|
|
|
|
binascii.unhexlify(digest)
|
|
|
|
)
|
2021-03-27 10:55:03 -03:00
|
|
|
|
|
|
|
h = hmac.HMAC.__new__(hmac.HMAC)
|
|
|
|
h._init_old(key, data, digestmod=hashname)
|
|
|
|
self.assert_hmac_internals(
|
|
|
|
h, digest, hashname, digest_size, block_size
|
|
|
|
)
|
2001-11-02 17:49:59 -04:00
|
|
|
|
2020-05-17 08:49:10 -03:00
|
|
|
if c_hmac_new is not None:
|
|
|
|
h = c_hmac_new(key, data, digestmod=hashname)
|
2021-03-27 10:55:03 -03:00
|
|
|
self.assert_hmac_internals(
|
|
|
|
h, digest, hashname, digest_size, block_size
|
|
|
|
)
|
2013-11-20 12:35:06 -04:00
|
|
|
|
2020-05-17 08:49:10 -03:00
|
|
|
h = c_hmac_new(key, digestmod=hashname)
|
|
|
|
h2 = h.copy()
|
|
|
|
h2.update(b"test update")
|
|
|
|
h.update(data)
|
2003-05-27 13:16:41 -03:00
|
|
|
self.assertEqual(h.hexdigest().upper(), digest.upper())
|
2013-11-20 12:35:06 -04:00
|
|
|
|
2021-03-27 10:55:03 -03:00
|
|
|
func = getattr(_hashopenssl, f"openssl_{hashname}")
|
|
|
|
h = c_hmac_new(key, data, digestmod=func)
|
|
|
|
self.assert_hmac_internals(
|
|
|
|
h, digest, hashname, digest_size, block_size
|
|
|
|
)
|
|
|
|
|
|
|
|
h = hmac.HMAC.__new__(hmac.HMAC)
|
|
|
|
h._init_hmac(key, data, digestmod=hashname)
|
|
|
|
self.assert_hmac_internals(
|
|
|
|
h, digest, hashname, digest_size, block_size
|
|
|
|
)
|
|
|
|
|
2020-05-17 08:49:10 -03:00
|
|
|
@hashlib_helper.requires_hashdigest('md5', openssl=True)
|
|
|
|
def test_md5_vectors(self):
|
|
|
|
# Test the HMAC module against test vectors from the RFC.
|
|
|
|
|
|
|
|
def md5test(key, data, digest):
|
2021-03-27 10:55:03 -03:00
|
|
|
self.assert_hmac(
|
2020-05-17 08:49:10 -03:00
|
|
|
key, data, digest,
|
|
|
|
hashfunc=hashlib.md5,
|
|
|
|
hashname="md5",
|
|
|
|
digest_size=16,
|
|
|
|
block_size=64
|
2018-01-27 04:53:43 -04:00
|
|
|
)
|
2001-11-02 17:49:59 -04:00
|
|
|
|
2007-07-10 10:35:52 -03:00
|
|
|
md5test(b"\x0b" * 16,
|
|
|
|
b"Hi There",
|
2001-11-02 17:49:59 -04:00
|
|
|
"9294727A3638BB1C13F48EF8158BFC9D")
|
|
|
|
|
2007-07-10 10:35:52 -03:00
|
|
|
md5test(b"Jefe",
|
|
|
|
b"what do ya want for nothing?",
|
2001-11-02 17:49:59 -04:00
|
|
|
"750c783e6ab0b503eaa86e310a5db738")
|
|
|
|
|
2007-07-10 10:35:52 -03:00
|
|
|
md5test(b"\xaa" * 16,
|
|
|
|
b"\xdd" * 50,
|
2001-11-02 17:49:59 -04:00
|
|
|
"56be34521d144c88dbb8c733f0e8b3f6")
|
|
|
|
|
2007-08-27 14:23:59 -03:00
|
|
|
md5test(bytes(range(1, 26)),
|
2007-07-10 10:35:52 -03:00
|
|
|
b"\xcd" * 50,
|
2003-05-27 13:16:41 -03:00
|
|
|
"697eaf0aca3a3aea3a75164746ffaa79")
|
|
|
|
|
2007-08-27 14:23:59 -03:00
|
|
|
md5test(b"\x0C" * 16,
|
|
|
|
b"Test With Truncation",
|
2003-05-27 13:16:41 -03:00
|
|
|
"56461ef2342edc00f9bab995690efd4c")
|
|
|
|
|
2007-07-10 10:35:52 -03:00
|
|
|
md5test(b"\xaa" * 80,
|
2007-08-27 14:23:59 -03:00
|
|
|
b"Test Using Larger Than Block-Size Key - Hash Key First",
|
2003-05-27 13:16:41 -03:00
|
|
|
"6b1ab7fe4bd7bf8f0b62e6ce61b9d0cd")
|
|
|
|
|
2007-07-10 10:35:52 -03:00
|
|
|
md5test(b"\xaa" * 80,
|
2007-08-27 14:23:59 -03:00
|
|
|
(b"Test Using Larger Than Block-Size Key "
|
|
|
|
b"and Larger Than One Block-Size Data"),
|
2003-05-27 13:16:41 -03:00
|
|
|
"6f630fad67cda0ee1fb1f562db3aa53e")
|
|
|
|
|
2020-04-28 22:11:29 -03:00
|
|
|
@hashlib_helper.requires_hashdigest('sha1', openssl=True)
|
2003-05-27 13:16:41 -03:00
|
|
|
def test_sha_vectors(self):
|
|
|
|
def shatest(key, data, digest):
|
2021-03-27 10:55:03 -03:00
|
|
|
self.assert_hmac(
|
2020-05-17 08:49:10 -03:00
|
|
|
key, data, digest,
|
|
|
|
hashfunc=hashlib.sha1,
|
|
|
|
hashname="sha1",
|
|
|
|
digest_size=20,
|
|
|
|
block_size=64
|
2018-01-27 04:53:43 -04:00
|
|
|
)
|
|
|
|
|
2007-07-10 10:35:52 -03:00
|
|
|
shatest(b"\x0b" * 20,
|
|
|
|
b"Hi There",
|
2003-05-27 13:16:41 -03:00
|
|
|
"b617318655057264e28bc0b6fb378c8ef146be00")
|
|
|
|
|
2007-07-10 10:35:52 -03:00
|
|
|
shatest(b"Jefe",
|
|
|
|
b"what do ya want for nothing?",
|
2003-05-27 13:16:41 -03:00
|
|
|
"effcdf6ae5eb2fa2d27416d5f184df9c259a7c79")
|
|
|
|
|
2007-07-10 10:35:52 -03:00
|
|
|
shatest(b"\xAA" * 20,
|
|
|
|
b"\xDD" * 50,
|
2003-05-27 13:16:41 -03:00
|
|
|
"125d7342b9ac11cd91a39af48aa17b4f63f175d3")
|
|
|
|
|
2007-07-10 10:35:52 -03:00
|
|
|
shatest(bytes(range(1, 26)),
|
|
|
|
b"\xCD" * 50,
|
2003-05-27 13:16:41 -03:00
|
|
|
"4c9007f4026250c6bc8414f9bf50c86c2d7235da")
|
|
|
|
|
2007-08-27 14:23:59 -03:00
|
|
|
shatest(b"\x0C" * 20,
|
|
|
|
b"Test With Truncation",
|
2003-05-27 13:16:41 -03:00
|
|
|
"4c1a03424b55e07fe7f27be1d58bb9324a9a5a04")
|
|
|
|
|
2007-07-10 10:35:52 -03:00
|
|
|
shatest(b"\xAA" * 80,
|
|
|
|
b"Test Using Larger Than Block-Size Key - Hash Key First",
|
2003-05-27 13:16:41 -03:00
|
|
|
"aa4ae5e15272d00e95705637ce8a3b55ed402112")
|
|
|
|
|
2007-07-10 10:35:52 -03:00
|
|
|
shatest(b"\xAA" * 80,
|
|
|
|
(b"Test Using Larger Than Block-Size Key "
|
|
|
|
b"and Larger Than One Block-Size Data"),
|
2003-05-27 13:16:41 -03:00
|
|
|
"e8e99d0f45237d786d6bbaa7965c7808bbff1a91")
|
|
|
|
|
2013-11-20 12:35:06 -04:00
|
|
|
def _rfc4231_test_cases(self, hashfunc, hash_name, digest_size, block_size):
|
2007-11-06 16:51:31 -04:00
|
|
|
def hmactest(key, data, hexdigests):
|
2020-05-17 08:49:10 -03:00
|
|
|
digest = hexdigests[hashfunc]
|
|
|
|
|
2021-03-27 10:55:03 -03:00
|
|
|
self.assert_hmac(
|
2020-05-17 08:49:10 -03:00
|
|
|
key, data, digest,
|
|
|
|
hashfunc=hashfunc,
|
|
|
|
hashname=hash_name,
|
|
|
|
digest_size=digest_size,
|
|
|
|
block_size=block_size
|
2018-01-27 04:53:43 -04:00
|
|
|
)
|
2007-11-06 16:51:31 -04:00
|
|
|
|
|
|
|
# 4.2. Test Case 1
|
|
|
|
hmactest(key = b'\x0b'*20,
|
|
|
|
data = b'Hi There',
|
|
|
|
hexdigests = {
|
|
|
|
hashlib.sha224: '896fb1128abbdf196832107cd49df33f'
|
|
|
|
'47b4b1169912ba4f53684b22',
|
|
|
|
hashlib.sha256: 'b0344c61d8db38535ca8afceaf0bf12b'
|
|
|
|
'881dc200c9833da726e9376c2e32cff7',
|
|
|
|
hashlib.sha384: 'afd03944d84895626b0825f4ab46907f'
|
|
|
|
'15f9dadbe4101ec682aa034c7cebc59c'
|
|
|
|
'faea9ea9076ede7f4af152e8b2fa9cb6',
|
|
|
|
hashlib.sha512: '87aa7cdea5ef619d4ff0b4241a1d6cb0'
|
|
|
|
'2379f4e2ce4ec2787ad0b30545e17cde'
|
|
|
|
'daa833b7d6b8a702038b274eaea3f4e4'
|
|
|
|
'be9d914eeb61f1702e696c203a126854',
|
|
|
|
})
|
|
|
|
|
|
|
|
# 4.3. Test Case 2
|
|
|
|
hmactest(key = b'Jefe',
|
|
|
|
data = b'what do ya want for nothing?',
|
|
|
|
hexdigests = {
|
|
|
|
hashlib.sha224: 'a30e01098bc6dbbf45690f3a7e9e6d0f'
|
|
|
|
'8bbea2a39e6148008fd05e44',
|
|
|
|
hashlib.sha256: '5bdcc146bf60754e6a042426089575c7'
|
|
|
|
'5a003f089d2739839dec58b964ec3843',
|
|
|
|
hashlib.sha384: 'af45d2e376484031617f78d2b58a6b1b'
|
|
|
|
'9c7ef464f5a01b47e42ec3736322445e'
|
|
|
|
'8e2240ca5e69e2c78b3239ecfab21649',
|
|
|
|
hashlib.sha512: '164b7a7bfcf819e2e395fbe73b56e0a3'
|
|
|
|
'87bd64222e831fd610270cd7ea250554'
|
|
|
|
'9758bf75c05a994a6d034f65f8f0e6fd'
|
|
|
|
'caeab1a34d4a6b4b636e070a38bce737',
|
|
|
|
})
|
|
|
|
|
|
|
|
# 4.4. Test Case 3
|
|
|
|
hmactest(key = b'\xaa'*20,
|
|
|
|
data = b'\xdd'*50,
|
|
|
|
hexdigests = {
|
|
|
|
hashlib.sha224: '7fb3cb3588c6c1f6ffa9694d7d6ad264'
|
|
|
|
'9365b0c1f65d69d1ec8333ea',
|
|
|
|
hashlib.sha256: '773ea91e36800e46854db8ebd09181a7'
|
|
|
|
'2959098b3ef8c122d9635514ced565fe',
|
|
|
|
hashlib.sha384: '88062608d3e6ad8a0aa2ace014c8a86f'
|
|
|
|
'0aa635d947ac9febe83ef4e55966144b'
|
|
|
|
'2a5ab39dc13814b94e3ab6e101a34f27',
|
|
|
|
hashlib.sha512: 'fa73b0089d56a284efb0f0756c890be9'
|
|
|
|
'b1b5dbdd8ee81a3655f83e33b2279d39'
|
|
|
|
'bf3e848279a722c806b485a47e67c807'
|
|
|
|
'b946a337bee8942674278859e13292fb',
|
|
|
|
})
|
|
|
|
|
|
|
|
# 4.5. Test Case 4
|
|
|
|
hmactest(key = bytes(x for x in range(0x01, 0x19+1)),
|
|
|
|
data = b'\xcd'*50,
|
|
|
|
hexdigests = {
|
|
|
|
hashlib.sha224: '6c11506874013cac6a2abc1bb382627c'
|
|
|
|
'ec6a90d86efc012de7afec5a',
|
|
|
|
hashlib.sha256: '82558a389a443c0ea4cc819899f2083a'
|
|
|
|
'85f0faa3e578f8077a2e3ff46729665b',
|
|
|
|
hashlib.sha384: '3e8a69b7783c25851933ab6290af6ca7'
|
|
|
|
'7a9981480850009cc5577c6e1f573b4e'
|
|
|
|
'6801dd23c4a7d679ccf8a386c674cffb',
|
|
|
|
hashlib.sha512: 'b0ba465637458c6990e5a8c5f61d4af7'
|
|
|
|
'e576d97ff94b872de76f8050361ee3db'
|
|
|
|
'a91ca5c11aa25eb4d679275cc5788063'
|
|
|
|
'a5f19741120c4f2de2adebeb10a298dd',
|
|
|
|
})
|
|
|
|
|
|
|
|
# 4.7. Test Case 6
|
|
|
|
hmactest(key = b'\xaa'*131,
|
|
|
|
data = b'Test Using Larger Than Block-Siz'
|
|
|
|
b'e Key - Hash Key First',
|
|
|
|
hexdigests = {
|
|
|
|
hashlib.sha224: '95e9a0db962095adaebe9b2d6f0dbce2'
|
|
|
|
'd499f112f2d2b7273fa6870e',
|
|
|
|
hashlib.sha256: '60e431591ee0b67f0d8a26aacbf5b77f'
|
|
|
|
'8e0bc6213728c5140546040f0ee37f54',
|
|
|
|
hashlib.sha384: '4ece084485813e9088d2c63a041bc5b4'
|
|
|
|
'4f9ef1012a2b588f3cd11f05033ac4c6'
|
|
|
|
'0c2ef6ab4030fe8296248df163f44952',
|
|
|
|
hashlib.sha512: '80b24263c7c1a3ebb71493c1dd7be8b4'
|
|
|
|
'9b46d1f41b4aeec1121b013783f8f352'
|
|
|
|
'6b56d037e05f2598bd0fd2215d6a1e52'
|
|
|
|
'95e64f73f63f0aec8b915a985d786598',
|
|
|
|
})
|
|
|
|
|
|
|
|
# 4.8. Test Case 7
|
|
|
|
hmactest(key = b'\xaa'*131,
|
|
|
|
data = b'This is a test using a larger th'
|
|
|
|
b'an block-size key and a larger t'
|
|
|
|
b'han block-size data. The key nee'
|
|
|
|
b'ds to be hashed before being use'
|
|
|
|
b'd by the HMAC algorithm.',
|
|
|
|
hexdigests = {
|
|
|
|
hashlib.sha224: '3a854166ac5d9f023f54d517d0b39dbd'
|
|
|
|
'946770db9c2b95c9f6f565d1',
|
|
|
|
hashlib.sha256: '9b09ffa71b942fcb27635fbcd5b0e944'
|
|
|
|
'bfdc63644f0713938a7f51535c3a35e2',
|
|
|
|
hashlib.sha384: '6617178e941f020d351e2f254e8fd32c'
|
|
|
|
'602420feb0b8fb9adccebb82461e99c5'
|
|
|
|
'a678cc31e799176d3860e6110c46523e',
|
|
|
|
hashlib.sha512: 'e37b6a775dc87dbaa4dfa9f96e5e3ffd'
|
|
|
|
'debd71f8867289865df5a32d20cdc944'
|
|
|
|
'b6022cac3c4982b10d5eeb55c3e4de15'
|
|
|
|
'134676fb6de0446065c97440fa8c6a58',
|
|
|
|
})
|
|
|
|
|
2020-04-28 22:11:29 -03:00
|
|
|
@hashlib_helper.requires_hashdigest('sha224', openssl=True)
|
2007-11-06 16:51:31 -04:00
|
|
|
def test_sha224_rfc4231(self):
|
2013-11-20 12:35:06 -04:00
|
|
|
self._rfc4231_test_cases(hashlib.sha224, 'sha224', 28, 64)
|
2007-11-06 16:51:31 -04:00
|
|
|
|
2020-04-28 22:11:29 -03:00
|
|
|
@hashlib_helper.requires_hashdigest('sha256', openssl=True)
|
2007-11-06 16:51:31 -04:00
|
|
|
def test_sha256_rfc4231(self):
|
2013-11-20 12:35:06 -04:00
|
|
|
self._rfc4231_test_cases(hashlib.sha256, 'sha256', 32, 64)
|
2007-11-06 16:51:31 -04:00
|
|
|
|
2020-04-28 22:11:29 -03:00
|
|
|
@hashlib_helper.requires_hashdigest('sha384', openssl=True)
|
2007-11-06 16:51:31 -04:00
|
|
|
def test_sha384_rfc4231(self):
|
2013-11-20 12:35:06 -04:00
|
|
|
self._rfc4231_test_cases(hashlib.sha384, 'sha384', 48, 128)
|
2007-11-06 16:51:31 -04:00
|
|
|
|
2020-04-28 22:11:29 -03:00
|
|
|
@hashlib_helper.requires_hashdigest('sha512', openssl=True)
|
2007-11-06 16:51:31 -04:00
|
|
|
def test_sha512_rfc4231(self):
|
2013-11-20 12:35:06 -04:00
|
|
|
self._rfc4231_test_cases(hashlib.sha512, 'sha512', 64, 128)
|
2007-11-06 16:51:31 -04:00
|
|
|
|
2020-04-28 22:11:29 -03:00
|
|
|
@hashlib_helper.requires_hashdigest('sha256')
|
2007-11-06 16:51:31 -04:00
|
|
|
def test_legacy_block_size_warnings(self):
|
|
|
|
class MockCrazyHash(object):
|
|
|
|
"""Ain't no block_size attribute here."""
|
|
|
|
def __init__(self, *args):
|
2019-09-25 11:30:20 -03:00
|
|
|
self._x = hashlib.sha256(*args)
|
2007-11-06 16:51:31 -04:00
|
|
|
self.digest_size = self._x.digest_size
|
|
|
|
def update(self, v):
|
|
|
|
self._x.update(v)
|
|
|
|
def digest(self):
|
|
|
|
return self._x.digest()
|
|
|
|
|
2008-09-08 22:52:27 -03:00
|
|
|
with warnings.catch_warnings():
|
Merged revisions 61644,61646-61647,61649-61652,61656-61658,61663,61665,61667 via svnmerge from
svn+ssh://pythondev@svn.python.org/python/trunk
........
r61644 | trent.nelson | 2008-03-19 22:51:16 +0100 (Mi, 19 Mär 2008) | 1 line
Force a clean of the tcltk/tcltk64 directories now that we've completely changed the tcl/tk build environment.
........
r61646 | gregory.p.smith | 2008-03-19 23:23:51 +0100 (Mi, 19 Mär 2008) | 2 lines
Improve the error message when the CRCs don't match.
........
r61647 | trent.nelson | 2008-03-19 23:41:10 +0100 (Mi, 19 Mär 2008) | 1 line
Comment out tcltk/tcltk64 removal.
........
r61649 | raymond.hettinger | 2008-03-19 23:47:48 +0100 (Mi, 19 Mär 2008) | 1 line
Remove unnecessary traceback save/restore pair.
........
r61650 | trent.nelson | 2008-03-19 23:51:42 +0100 (Mi, 19 Mär 2008) | 1 line
Bump the SIGALM delay from 3 seconds to 20 seconds, mainly in an effort to see if it fixes the alarm failures in this test experienced by some of the buildbots.
........
r61651 | brett.cannon | 2008-03-20 00:01:17 +0100 (Do, 20 Mär 2008) | 5 lines
Make sure that the warnings filter is not reset or changed beyond the current
running test file.
Closes issue2407. Thanks Jerry Seutter.
........
r61652 | gregory.p.smith | 2008-03-20 00:03:25 +0100 (Do, 20 Mär 2008) | 10 lines
Prevent ioctl op codes from being sign extended from int to unsigned long
when used on platforms that actually define ioctl as taking an unsigned long.
(the BSDs and OS X / Darwin)
Adds a unittest for fcntl.ioctl that tests what happens with both positive and
negative numbers.
This was done because of issue1471 but I'm not able to reproduce -that- problem
in the first place on Linux 32bit or 64bit or OS X 10.4 & 10.5 32bit or 64 bit.
........
r61656 | sean.reifschneider | 2008-03-20 01:46:50 +0100 (Do, 20 Mär 2008) | 2 lines
Issue #2143: Fix embedded readline() hang on SSL socket EOF.
........
r61657 | sean.reifschneider | 2008-03-20 01:50:07 +0100 (Do, 20 Mär 2008) | 2 lines
Forgot to add NEWS item about smtplib SSL readline hang fix.
........
r61658 | trent.nelson | 2008-03-20 01:58:44 +0100 (Do, 20 Mär 2008) | 1 line
Revert r61650; the intent of this commit was to try and address alarm failures on some of the build slaves. As Neal points out, it's called after test_main(), so it's not going to factor into the test when run via regrtest.py (and removes the original functionality that Jeffrey wanted that would kill the test if it took longer than 3 seconds to run when executing it directly during development).
........
r61663 | sean.reifschneider | 2008-03-20 04:20:48 +0100 (Do, 20 Mär 2008) | 2 lines
Issue 2188: Documentation hint about disabling proxy detection.
........
r61665 | gregory.p.smith | 2008-03-20 06:41:53 +0100 (Do, 20 Mär 2008) | 7 lines
Attempt to fix the Solaris Sparc 10 buildbot. It was failing with an invalid
argument error on ioctl. This was caused by the added test_fcntl ioctl test
that hard coded 0 as the fd to use. Without a terminal, this fails on solaris.
(it passed from the command line on sol 10, both 32 and 64 bit)
Also, test_ioctl exists so I moved the test into there where it belongs.
........
r61667 | georg.brandl | 2008-03-20 08:25:55 +0100 (Do, 20 Mär 2008) | 2 lines
#2383: remove obsolete XXX comment in stat.py.
........
2008-03-20 07:49:03 -03:00
|
|
|
warnings.simplefilter('error', RuntimeWarning)
|
(partially)
Merged revisions 79534,79537,79539,79558,79606 via svnmerge from
svn+ssh://pythondev@svn.python.org/python/trunk
........
r79534 | florent.xicluna | 2010-03-31 23:21:54 +0200 (mer, 31 mar 2010) | 2 lines
Fix test for xml.etree when using a non-ascii path. And use check_warnings instead of catch_warnings.
........
r79537 | florent.xicluna | 2010-03-31 23:40:32 +0200 (mer, 31 mar 2010) | 2 lines
Fix typo
........
r79539 | florent.xicluna | 2010-04-01 00:01:03 +0200 (jeu, 01 avr 2010) | 2 lines
Replace catch_warnings with check_warnings when it makes sense. Use assertRaises context manager to simplify some tests.
........
r79558 | florent.xicluna | 2010-04-01 20:17:09 +0200 (jeu, 01 avr 2010) | 2 lines
#7092: Fix some -3 warnings, and fix Lib/platform.py when the path contains a double-quote.
........
r79606 | florent.xicluna | 2010-04-02 19:26:42 +0200 (ven, 02 avr 2010) | 2 lines
Backport some robotparser test and skip the test if the external resource is not available.
........
2010-04-02 15:52:12 -03:00
|
|
|
with self.assertRaises(RuntimeWarning):
|
2007-11-06 16:51:31 -04:00
|
|
|
hmac.HMAC(b'a', b'b', digestmod=MockCrazyHash)
|
|
|
|
self.fail('Expected warning about missing block_size')
|
|
|
|
|
|
|
|
MockCrazyHash.block_size = 1
|
(partially)
Merged revisions 79534,79537,79539,79558,79606 via svnmerge from
svn+ssh://pythondev@svn.python.org/python/trunk
........
r79534 | florent.xicluna | 2010-03-31 23:21:54 +0200 (mer, 31 mar 2010) | 2 lines
Fix test for xml.etree when using a non-ascii path. And use check_warnings instead of catch_warnings.
........
r79537 | florent.xicluna | 2010-03-31 23:40:32 +0200 (mer, 31 mar 2010) | 2 lines
Fix typo
........
r79539 | florent.xicluna | 2010-04-01 00:01:03 +0200 (jeu, 01 avr 2010) | 2 lines
Replace catch_warnings with check_warnings when it makes sense. Use assertRaises context manager to simplify some tests.
........
r79558 | florent.xicluna | 2010-04-01 20:17:09 +0200 (jeu, 01 avr 2010) | 2 lines
#7092: Fix some -3 warnings, and fix Lib/platform.py when the path contains a double-quote.
........
r79606 | florent.xicluna | 2010-04-02 19:26:42 +0200 (ven, 02 avr 2010) | 2 lines
Backport some robotparser test and skip the test if the external resource is not available.
........
2010-04-02 15:52:12 -03:00
|
|
|
with self.assertRaises(RuntimeWarning):
|
2007-11-06 16:51:31 -04:00
|
|
|
hmac.HMAC(b'a', b'b', digestmod=MockCrazyHash)
|
|
|
|
self.fail('Expected warning about small block_size')
|
|
|
|
|
2018-09-10 15:10:01 -03:00
|
|
|
def test_with_digestmod_no_default(self):
|
2019-10-18 00:30:42 -03:00
|
|
|
"""The digestmod parameter is required as of Python 3.8."""
|
|
|
|
with self.assertRaisesRegex(TypeError, r'required.*digestmod'):
|
2013-11-20 12:23:06 -04:00
|
|
|
key = b"\x0b" * 16
|
|
|
|
data = b"Hi There"
|
2018-09-10 15:10:01 -03:00
|
|
|
hmac.HMAC(key, data, digestmod=None)
|
2019-10-18 00:30:42 -03:00
|
|
|
with self.assertRaisesRegex(TypeError, r'required.*digestmod'):
|
|
|
|
hmac.new(key, data)
|
|
|
|
with self.assertRaisesRegex(TypeError, r'required.*digestmod'):
|
|
|
|
hmac.HMAC(key, msg=data, digestmod='')
|
2003-05-27 13:16:41 -03:00
|
|
|
|
2023-04-06 22:51:29 -03:00
|
|
|
def test_with_fallback(self):
|
|
|
|
cache = getattr(hashlib, '__builtin_constructor_cache')
|
|
|
|
try:
|
|
|
|
cache['foo'] = hashlib.sha256
|
|
|
|
hexdigest = hmac.digest(b'key', b'message', 'foo').hex()
|
|
|
|
expected = '6e9ef29b75fffc5b7abae527d58fdadb2fe42e7219011976917343065f58ed4a'
|
|
|
|
self.assertEqual(hexdigest, expected)
|
|
|
|
finally:
|
|
|
|
cache.pop('foo')
|
|
|
|
|
2019-09-25 11:30:20 -03:00
|
|
|
|
2001-11-02 17:49:59 -04:00
|
|
|
class ConstructorTestCase(unittest.TestCase):
|
2002-08-22 16:38:14 -03:00
|
|
|
|
2019-09-25 11:30:20 -03:00
|
|
|
expected = (
|
|
|
|
"6c845b47f52b3b47f6590c502db7825aad757bf4fadc8fa972f7cd2e76a5bdeb"
|
|
|
|
)
|
|
|
|
|
2020-04-28 22:11:29 -03:00
|
|
|
@hashlib_helper.requires_hashdigest('sha256')
|
2001-11-02 17:49:59 -04:00
|
|
|
def test_normal(self):
|
2002-08-22 16:38:14 -03:00
|
|
|
# Standard constructor call.
|
2001-11-02 17:49:59 -04:00
|
|
|
try:
|
2019-09-25 11:30:20 -03:00
|
|
|
hmac.HMAC(b"key", digestmod='sha256')
|
2013-11-24 18:14:16 -04:00
|
|
|
except Exception:
|
2001-11-02 17:49:59 -04:00
|
|
|
self.fail("Standard constructor call raised exception.")
|
|
|
|
|
2020-04-28 22:11:29 -03:00
|
|
|
@hashlib_helper.requires_hashdigest('sha256')
|
2012-06-30 12:27:56 -03:00
|
|
|
def test_with_str_key(self):
|
|
|
|
# Pass a key of type str, which is an error, because it expects a key
|
|
|
|
# of type bytes
|
|
|
|
with self.assertRaises(TypeError):
|
2019-09-25 11:30:20 -03:00
|
|
|
h = hmac.HMAC("key", digestmod='sha256')
|
2012-06-30 12:27:56 -03:00
|
|
|
|
2020-04-28 22:11:29 -03:00
|
|
|
@hashlib_helper.requires_hashdigest('sha256')
|
2012-06-30 12:27:56 -03:00
|
|
|
def test_dot_new_with_str_key(self):
|
|
|
|
# Pass a key of type str, which is an error, because it expects a key
|
|
|
|
# of type bytes
|
|
|
|
with self.assertRaises(TypeError):
|
2019-09-25 11:30:20 -03:00
|
|
|
h = hmac.new("key", digestmod='sha256')
|
2012-06-30 12:27:56 -03:00
|
|
|
|
2020-04-28 22:11:29 -03:00
|
|
|
@hashlib_helper.requires_hashdigest('sha256')
|
2001-11-02 17:49:59 -04:00
|
|
|
def test_withtext(self):
|
2002-08-22 16:38:14 -03:00
|
|
|
# Constructor call with text.
|
2001-11-02 17:49:59 -04:00
|
|
|
try:
|
2019-09-25 11:30:20 -03:00
|
|
|
h = hmac.HMAC(b"key", b"hash this!", digestmod='sha256')
|
2013-11-24 18:14:16 -04:00
|
|
|
except Exception:
|
2001-11-02 17:49:59 -04:00
|
|
|
self.fail("Constructor call with text argument raised exception.")
|
2019-09-25 11:30:20 -03:00
|
|
|
self.assertEqual(h.hexdigest(), self.expected)
|
2001-11-02 17:49:59 -04:00
|
|
|
|
2020-04-28 22:11:29 -03:00
|
|
|
@hashlib_helper.requires_hashdigest('sha256')
|
2013-07-01 08:08:42 -03:00
|
|
|
def test_with_bytearray(self):
|
|
|
|
try:
|
2013-11-24 18:14:16 -04:00
|
|
|
h = hmac.HMAC(bytearray(b"key"), bytearray(b"hash this!"),
|
2019-09-25 11:30:20 -03:00
|
|
|
digestmod="sha256")
|
2013-11-24 18:14:16 -04:00
|
|
|
except Exception:
|
2013-07-01 08:08:42 -03:00
|
|
|
self.fail("Constructor call with bytearray arguments raised exception.")
|
2019-12-03 11:35:54 -04:00
|
|
|
self.assertEqual(h.hexdigest(), self.expected)
|
2013-07-01 08:08:42 -03:00
|
|
|
|
2020-04-28 22:11:29 -03:00
|
|
|
@hashlib_helper.requires_hashdigest('sha256')
|
2013-07-01 08:08:42 -03:00
|
|
|
def test_with_memoryview_msg(self):
|
|
|
|
try:
|
2019-09-25 11:30:20 -03:00
|
|
|
h = hmac.HMAC(b"key", memoryview(b"hash this!"), digestmod="sha256")
|
2013-11-24 18:14:16 -04:00
|
|
|
except Exception:
|
2013-07-01 08:08:42 -03:00
|
|
|
self.fail("Constructor call with memoryview msg raised exception.")
|
2019-12-03 11:35:54 -04:00
|
|
|
self.assertEqual(h.hexdigest(), self.expected)
|
2013-07-01 08:08:42 -03:00
|
|
|
|
2020-04-28 22:11:29 -03:00
|
|
|
@hashlib_helper.requires_hashdigest('sha256')
|
2001-11-02 17:49:59 -04:00
|
|
|
def test_withmodule(self):
|
2002-08-22 16:38:14 -03:00
|
|
|
# Constructor call with text and digest module.
|
2001-11-02 17:49:59 -04:00
|
|
|
try:
|
2019-09-25 11:30:20 -03:00
|
|
|
h = hmac.HMAC(b"key", b"", hashlib.sha256)
|
2013-11-24 18:14:16 -04:00
|
|
|
except Exception:
|
2019-09-25 11:30:20 -03:00
|
|
|
self.fail("Constructor call with hashlib.sha256 raised exception.")
|
|
|
|
|
2020-05-17 08:49:10 -03:00
|
|
|
@unittest.skipUnless(C_HMAC is not None, 'need _hashlib')
|
|
|
|
def test_internal_types(self):
|
|
|
|
# internal types like _hashlib.C_HMAC are not constructable
|
2021-05-27 03:43:52 -03:00
|
|
|
check_disallow_instantiation(self, C_HMAC)
|
2021-05-02 04:47:45 -03:00
|
|
|
with self.assertRaisesRegex(TypeError, "immutable type"):
|
|
|
|
C_HMAC.value = None
|
|
|
|
|
2021-03-27 10:55:03 -03:00
|
|
|
@unittest.skipUnless(sha256_module is not None, 'need _sha256')
|
|
|
|
def test_with_sha256_module(self):
|
|
|
|
h = hmac.HMAC(b"key", b"hash this!", digestmod=sha256_module.sha256)
|
|
|
|
self.assertEqual(h.hexdigest(), self.expected)
|
|
|
|
self.assertEqual(h.name, "hmac-sha256")
|
|
|
|
|
|
|
|
digest = hmac.digest(b"key", b"hash this!", sha256_module.sha256)
|
|
|
|
self.assertEqual(digest, binascii.unhexlify(self.expected))
|
|
|
|
|
2001-11-13 17:51:26 -04:00
|
|
|
|
2001-11-02 17:49:59 -04:00
|
|
|
class SanityTestCase(unittest.TestCase):
|
2002-08-22 16:38:14 -03:00
|
|
|
|
2020-04-28 22:11:29 -03:00
|
|
|
@hashlib_helper.requires_hashdigest('sha256')
|
2001-11-02 17:49:59 -04:00
|
|
|
def test_exercise_all_methods(self):
|
2002-08-22 16:38:14 -03:00
|
|
|
# Exercising all methods once.
|
2001-11-02 17:49:59 -04:00
|
|
|
# This must not raise any exceptions
|
|
|
|
try:
|
2019-09-25 11:30:20 -03:00
|
|
|
h = hmac.HMAC(b"my secret key", digestmod="sha256")
|
2007-08-27 14:23:59 -03:00
|
|
|
h.update(b"compute the hash of this text!")
|
2020-05-17 08:49:10 -03:00
|
|
|
h.digest()
|
|
|
|
h.hexdigest()
|
|
|
|
h.copy()
|
2013-11-24 18:14:16 -04:00
|
|
|
except Exception:
|
2002-04-01 15:00:50 -04:00
|
|
|
self.fail("Exception raised during normal usage of HMAC class.")
|
2001-11-02 17:49:59 -04:00
|
|
|
|
2019-09-25 11:30:20 -03:00
|
|
|
|
2001-11-02 17:49:59 -04:00
|
|
|
class CopyTestCase(unittest.TestCase):
|
2002-08-22 16:38:14 -03:00
|
|
|
|
2020-04-28 22:11:29 -03:00
|
|
|
@hashlib_helper.requires_hashdigest('sha256')
|
2021-03-27 10:55:03 -03:00
|
|
|
def test_attributes_old(self):
|
2002-08-22 16:38:14 -03:00
|
|
|
# Testing if attributes are of same type.
|
2021-03-27 10:55:03 -03:00
|
|
|
h1 = hmac.HMAC.__new__(hmac.HMAC)
|
|
|
|
h1._init_old(b"key", b"msg", digestmod="sha256")
|
2001-11-02 17:49:59 -04:00
|
|
|
h2 = h1.copy()
|
2020-05-16 20:05:40 -03:00
|
|
|
self.assertEqual(type(h1._inner), type(h2._inner),
|
2001-11-02 17:49:59 -04:00
|
|
|
"Types of inner don't match.")
|
2020-05-16 20:05:40 -03:00
|
|
|
self.assertEqual(type(h1._outer), type(h2._outer),
|
2001-11-02 17:49:59 -04:00
|
|
|
"Types of outer don't match.")
|
|
|
|
|
2020-04-28 22:11:29 -03:00
|
|
|
@hashlib_helper.requires_hashdigest('sha256')
|
2021-03-27 10:55:03 -03:00
|
|
|
def test_realcopy_old(self):
|
2002-08-22 16:38:14 -03:00
|
|
|
# Testing if the copy method created a real copy.
|
2021-03-27 10:55:03 -03:00
|
|
|
h1 = hmac.HMAC.__new__(hmac.HMAC)
|
|
|
|
h1._init_old(b"key", b"msg", digestmod="sha256")
|
2001-11-02 17:49:59 -04:00
|
|
|
h2 = h1.copy()
|
2009-01-27 14:17:45 -04:00
|
|
|
# Using id() in case somebody has overridden __eq__/__ne__.
|
2009-06-30 20:06:06 -03:00
|
|
|
self.assertTrue(id(h1) != id(h2), "No real copy of the HMAC instance.")
|
2020-05-16 20:05:40 -03:00
|
|
|
self.assertTrue(id(h1._inner) != id(h2._inner),
|
2001-11-02 17:49:59 -04:00
|
|
|
"No real copy of the attribute 'inner'.")
|
2020-05-16 20:05:40 -03:00
|
|
|
self.assertTrue(id(h1._outer) != id(h2._outer),
|
2001-11-02 17:49:59 -04:00
|
|
|
"No real copy of the attribute 'outer'.")
|
2021-03-27 10:55:03 -03:00
|
|
|
self.assertIs(h1._hmac, None)
|
2020-05-16 20:05:40 -03:00
|
|
|
|
2021-03-27 10:55:03 -03:00
|
|
|
@unittest.skipIf(_hashopenssl is None, "test requires _hashopenssl")
|
2020-05-16 20:05:40 -03:00
|
|
|
@hashlib_helper.requires_hashdigest('sha256')
|
2021-03-27 10:55:03 -03:00
|
|
|
def test_realcopy_hmac(self):
|
|
|
|
h1 = hmac.HMAC.__new__(hmac.HMAC)
|
|
|
|
h1._init_hmac(b"key", b"msg", digestmod="sha256")
|
|
|
|
h2 = h1.copy()
|
|
|
|
self.assertTrue(id(h1._hmac) != id(h2._hmac))
|
2001-11-02 17:49:59 -04:00
|
|
|
|
2020-04-28 22:11:29 -03:00
|
|
|
@hashlib_helper.requires_hashdigest('sha256')
|
2001-11-02 17:49:59 -04:00
|
|
|
def test_equality(self):
|
2002-08-22 16:38:14 -03:00
|
|
|
# Testing if the copy has the same digests.
|
2019-09-25 11:30:20 -03:00
|
|
|
h1 = hmac.HMAC(b"key", digestmod="sha256")
|
2007-08-27 14:23:59 -03:00
|
|
|
h1.update(b"some random text")
|
2001-11-02 17:49:59 -04:00
|
|
|
h2 = h1.copy()
|
2007-07-11 09:20:59 -03:00
|
|
|
self.assertEqual(h1.digest(), h2.digest(),
|
2001-11-02 17:49:59 -04:00
|
|
|
"Digest of copy doesn't match original digest.")
|
2007-07-11 09:20:59 -03:00
|
|
|
self.assertEqual(h1.hexdigest(), h2.hexdigest(),
|
2001-11-02 17:49:59 -04:00
|
|
|
"Hexdigest of copy doesn't match original hexdigest.")
|
|
|
|
|
2020-05-17 08:49:10 -03:00
|
|
|
@hashlib_helper.requires_hashdigest('sha256')
|
|
|
|
def test_equality_new(self):
|
|
|
|
# Testing if the copy has the same digests with hmac.new().
|
|
|
|
h1 = hmac.new(b"key", digestmod="sha256")
|
|
|
|
h1.update(b"some random text")
|
|
|
|
h2 = h1.copy()
|
|
|
|
self.assertTrue(
|
|
|
|
id(h1) != id(h2), "No real copy of the HMAC instance."
|
|
|
|
)
|
|
|
|
self.assertEqual(h1.digest(), h2.digest(),
|
|
|
|
"Digest of copy doesn't match original digest.")
|
|
|
|
self.assertEqual(h1.hexdigest(), h2.hexdigest(),
|
|
|
|
"Hexdigest of copy doesn't match original hexdigest.")
|
|
|
|
|
|
|
|
|
2012-06-15 08:14:08 -03:00
|
|
|
class CompareDigestTestCase(unittest.TestCase):
|
2012-05-13 14:53:07 -03:00
|
|
|
|
2020-05-27 16:50:06 -03:00
|
|
|
def test_hmac_compare_digest(self):
|
|
|
|
self._test_compare_digest(hmac.compare_digest)
|
|
|
|
if openssl_compare_digest is not None:
|
|
|
|
self.assertIs(hmac.compare_digest, openssl_compare_digest)
|
|
|
|
else:
|
|
|
|
self.assertIs(hmac.compare_digest, operator_compare_digest)
|
|
|
|
|
|
|
|
def test_operator_compare_digest(self):
|
|
|
|
self._test_compare_digest(operator_compare_digest)
|
|
|
|
|
|
|
|
@unittest.skipIf(openssl_compare_digest is None, "test requires _hashlib")
|
|
|
|
def test_openssl_compare_digest(self):
|
|
|
|
self._test_compare_digest(openssl_compare_digest)
|
|
|
|
|
|
|
|
def _test_compare_digest(self, compare_digest):
|
2012-05-13 14:53:07 -03:00
|
|
|
# Testing input type exception handling
|
|
|
|
a, b = 100, 200
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertRaises(TypeError, compare_digest, a, b)
|
2012-06-15 08:14:08 -03:00
|
|
|
a, b = 100, b"foobar"
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertRaises(TypeError, compare_digest, a, b)
|
2012-06-15 08:14:08 -03:00
|
|
|
a, b = b"foobar", 200
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertRaises(TypeError, compare_digest, a, b)
|
2012-05-13 14:53:07 -03:00
|
|
|
a, b = "foobar", b"foobar"
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertRaises(TypeError, compare_digest, a, b)
|
2012-06-15 08:14:08 -03:00
|
|
|
a, b = b"foobar", "foobar"
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertRaises(TypeError, compare_digest, a, b)
|
2012-05-13 14:53:07 -03:00
|
|
|
|
2012-06-15 08:14:08 -03:00
|
|
|
# Testing bytes of different lengths
|
2012-05-13 14:53:07 -03:00
|
|
|
a, b = b"foobar", b"foo"
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertFalse(compare_digest(a, b))
|
2012-05-13 14:53:07 -03:00
|
|
|
a, b = b"\xde\xad\xbe\xef", b"\xde\xad"
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertFalse(compare_digest(a, b))
|
2012-05-13 14:53:07 -03:00
|
|
|
|
2012-06-15 08:14:08 -03:00
|
|
|
# Testing bytes of same lengths, different values
|
2012-05-13 14:53:07 -03:00
|
|
|
a, b = b"foobar", b"foobaz"
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertFalse(compare_digest(a, b))
|
2012-05-13 14:53:07 -03:00
|
|
|
a, b = b"\xde\xad\xbe\xef", b"\xab\xad\x1d\xea"
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertFalse(compare_digest(a, b))
|
2012-05-13 14:53:07 -03:00
|
|
|
|
2012-06-15 08:14:08 -03:00
|
|
|
# Testing bytes of same lengths, same values
|
2012-05-13 14:53:07 -03:00
|
|
|
a, b = b"foobar", b"foobar"
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertTrue(compare_digest(a, b))
|
2012-05-13 14:53:07 -03:00
|
|
|
a, b = b"\xde\xad\xbe\xef", b"\xde\xad\xbe\xef"
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertTrue(compare_digest(a, b))
|
2012-05-13 14:53:07 -03:00
|
|
|
|
2012-06-24 08:48:32 -03:00
|
|
|
# Testing bytearrays of same lengths, same values
|
|
|
|
a, b = bytearray(b"foobar"), bytearray(b"foobar")
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertTrue(compare_digest(a, b))
|
2012-06-24 08:48:32 -03:00
|
|
|
|
2019-08-30 17:21:19 -03:00
|
|
|
# Testing bytearrays of different lengths
|
2012-06-24 08:48:32 -03:00
|
|
|
a, b = bytearray(b"foobar"), bytearray(b"foo")
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertFalse(compare_digest(a, b))
|
2012-06-24 08:48:32 -03:00
|
|
|
|
|
|
|
# Testing bytearrays of same lengths, different values
|
|
|
|
a, b = bytearray(b"foobar"), bytearray(b"foobaz")
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertFalse(compare_digest(a, b))
|
2012-06-24 08:48:32 -03:00
|
|
|
|
|
|
|
# Testing byte and bytearray of same lengths, same values
|
|
|
|
a, b = bytearray(b"foobar"), b"foobar"
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertTrue(compare_digest(a, b))
|
|
|
|
self.assertTrue(compare_digest(b, a))
|
2012-06-24 08:48:32 -03:00
|
|
|
|
2019-08-30 17:21:19 -03:00
|
|
|
# Testing byte bytearray of different lengths
|
2012-06-24 08:48:32 -03:00
|
|
|
a, b = bytearray(b"foobar"), b"foo"
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertFalse(compare_digest(a, b))
|
|
|
|
self.assertFalse(compare_digest(b, a))
|
2012-06-24 08:48:32 -03:00
|
|
|
|
|
|
|
# Testing byte and bytearray of same lengths, different values
|
|
|
|
a, b = bytearray(b"foobar"), b"foobaz"
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertFalse(compare_digest(a, b))
|
|
|
|
self.assertFalse(compare_digest(b, a))
|
2012-06-24 08:48:32 -03:00
|
|
|
|
|
|
|
# Testing str of same lengths
|
|
|
|
a, b = "foobar", "foobar"
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertTrue(compare_digest(a, b))
|
2012-06-24 08:48:32 -03:00
|
|
|
|
2019-08-30 17:21:19 -03:00
|
|
|
# Testing str of different lengths
|
2012-06-24 08:48:32 -03:00
|
|
|
a, b = "foo", "foobar"
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertFalse(compare_digest(a, b))
|
2012-06-24 08:48:32 -03:00
|
|
|
|
|
|
|
# Testing bytes of same lengths, different values
|
|
|
|
a, b = "foobar", "foobaz"
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertFalse(compare_digest(a, b))
|
2012-06-24 08:48:32 -03:00
|
|
|
|
|
|
|
# Testing error cases
|
|
|
|
a, b = "foobar", b"foobar"
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertRaises(TypeError, compare_digest, a, b)
|
2012-06-24 08:48:32 -03:00
|
|
|
a, b = b"foobar", "foobar"
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertRaises(TypeError, compare_digest, a, b)
|
2012-06-24 08:48:32 -03:00
|
|
|
a, b = b"foobar", 1
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertRaises(TypeError, compare_digest, a, b)
|
2012-06-24 08:48:32 -03:00
|
|
|
a, b = 100, 200
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertRaises(TypeError, compare_digest, a, b)
|
2012-06-24 08:48:32 -03:00
|
|
|
a, b = "fooä", "fooä"
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertRaises(TypeError, compare_digest, a, b)
|
2012-06-24 08:48:32 -03:00
|
|
|
|
|
|
|
# subclasses are supported by ignore __eq__
|
|
|
|
class mystr(str):
|
|
|
|
def __eq__(self, other):
|
|
|
|
return False
|
|
|
|
|
|
|
|
a, b = mystr("foobar"), mystr("foobar")
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertTrue(compare_digest(a, b))
|
2012-06-24 08:48:32 -03:00
|
|
|
a, b = mystr("foobar"), "foobar"
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertTrue(compare_digest(a, b))
|
2012-06-24 08:48:32 -03:00
|
|
|
a, b = mystr("foobar"), mystr("foobaz")
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertFalse(compare_digest(a, b))
|
2012-06-24 08:48:32 -03:00
|
|
|
|
|
|
|
class mybytes(bytes):
|
|
|
|
def __eq__(self, other):
|
|
|
|
return False
|
|
|
|
|
|
|
|
a, b = mybytes(b"foobar"), mybytes(b"foobar")
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertTrue(compare_digest(a, b))
|
2012-06-24 08:48:32 -03:00
|
|
|
a, b = mybytes(b"foobar"), b"foobar"
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertTrue(compare_digest(a, b))
|
2012-06-24 08:48:32 -03:00
|
|
|
a, b = mybytes(b"foobar"), mybytes(b"foobaz")
|
2020-05-27 16:50:06 -03:00
|
|
|
self.assertFalse(compare_digest(a, b))
|
2012-06-24 08:48:32 -03:00
|
|
|
|
|
|
|
|
2001-11-02 17:49:59 -04:00
|
|
|
if __name__ == "__main__":
|
2015-04-13 17:00:43 -03:00
|
|
|
unittest.main()
|