71 lines
2.7 KiB
Python
71 lines
2.7 KiB
Python
import sys
|
|
from test import support
|
|
import unittest
|
|
|
|
crypt = support.import_module('crypt')
|
|
|
|
class CryptTestCase(unittest.TestCase):
|
|
|
|
def test_crypt(self):
|
|
cr = crypt.crypt('mypassword')
|
|
cr2 = crypt.crypt('mypassword', cr)
|
|
self.assertEqual(cr2, cr)
|
|
cr = crypt.crypt('mypassword', 'ab')
|
|
if cr is not None:
|
|
cr2 = crypt.crypt('mypassword', cr)
|
|
self.assertEqual(cr2, cr)
|
|
|
|
def test_salt(self):
|
|
self.assertEqual(len(crypt._saltchars), 64)
|
|
for method in crypt.methods:
|
|
salt = crypt.mksalt(method)
|
|
self.assertIn(len(salt) - method.salt_chars, {0, 1, 3, 4, 6, 7})
|
|
if method.ident:
|
|
self.assertIn(method.ident, salt[:len(salt)-method.salt_chars])
|
|
|
|
def test_saltedcrypt(self):
|
|
for method in crypt.methods:
|
|
cr = crypt.crypt('assword', method)
|
|
self.assertEqual(len(cr), method.total_size)
|
|
cr2 = crypt.crypt('assword', cr)
|
|
self.assertEqual(cr2, cr)
|
|
cr = crypt.crypt('assword', crypt.mksalt(method))
|
|
self.assertEqual(len(cr), method.total_size)
|
|
|
|
def test_methods(self):
|
|
self.assertTrue(len(crypt.methods) >= 1)
|
|
if sys.platform.startswith('openbsd'):
|
|
self.assertEqual(crypt.methods, [crypt.METHOD_BLOWFISH])
|
|
else:
|
|
self.assertEqual(crypt.methods[-1], crypt.METHOD_CRYPT)
|
|
|
|
@unittest.skipUnless(crypt.METHOD_BLOWFISH in crypt.methods,
|
|
'requires support of Blowfish')
|
|
def test_log_rounds(self):
|
|
self.assertEqual(len(crypt._saltchars), 64)
|
|
for log_rounds in range(4, 11):
|
|
salt = crypt.mksalt(crypt.METHOD_BLOWFISH, log_rounds=log_rounds)
|
|
self.assertIn('$%02d$' % log_rounds, salt)
|
|
self.assertIn(len(salt) - crypt.METHOD_BLOWFISH.salt_chars, {6, 7})
|
|
cr = crypt.crypt('mypassword', salt)
|
|
self.assertTrue(cr)
|
|
cr2 = crypt.crypt('mypassword', cr)
|
|
self.assertEqual(cr2, cr)
|
|
|
|
@unittest.skipUnless(crypt.METHOD_BLOWFISH in crypt.methods,
|
|
'requires support of Blowfish')
|
|
def test_invalid_log_rounds(self):
|
|
for log_rounds in (1, -1, 999):
|
|
salt = crypt.mksalt(crypt.METHOD_BLOWFISH, log_rounds=log_rounds)
|
|
cr = crypt.crypt('mypassword', salt)
|
|
if cr is not None:
|
|
# On failure the openwall implementation returns a magic
|
|
# string that is shorter than 13 characters and is guaranteed
|
|
# to differ from a salt.
|
|
self.assertNotEqual(cr, salt)
|
|
self.assertLess(len(cr), 13)
|
|
|
|
|
|
if __name__ == "__main__":
|
|
unittest.main()
|