mirror of
				https://github.com/python/cpython.git
				synced 2025-10-31 05:31:20 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			674 lines
		
	
	
	
		
			26 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			674 lines
		
	
	
	
		
			26 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
| import binascii
 | |
| import functools
 | |
| import hmac
 | |
| import hashlib
 | |
| import unittest
 | |
| import unittest.mock
 | |
| import warnings
 | |
| 
 | |
| from test.support import hashlib_helper, check_disallow_instantiation
 | |
| 
 | |
| from _operator import _compare_digest as operator_compare_digest
 | |
| 
 | |
| try:
 | |
|     import _hashlib as _hashopenssl
 | |
|     from _hashlib import HMAC as C_HMAC
 | |
|     from _hashlib import hmac_new as c_hmac_new
 | |
|     from _hashlib import compare_digest as openssl_compare_digest
 | |
| except ImportError:
 | |
|     _hashopenssl = None
 | |
|     C_HMAC = None
 | |
|     c_hmac_new = None
 | |
|     openssl_compare_digest = None
 | |
| 
 | |
| try:
 | |
|     import _sha256 as sha256_module
 | |
| except ImportError:
 | |
|     sha256_module = None
 | |
| 
 | |
| 
 | |
| def ignore_warning(func):
 | |
|     @functools.wraps(func)
 | |
|     def wrapper(*args, **kwargs):
 | |
|         with warnings.catch_warnings():
 | |
|             warnings.filterwarnings("ignore",
 | |
|                                     category=DeprecationWarning)
 | |
|             return func(*args, **kwargs)
 | |
|     return wrapper
 | |
| 
 | |
| 
 | |
| class TestVectorsTestCase(unittest.TestCase):
 | |
| 
 | |
|     def assert_hmac_internals(
 | |
|             self, h, digest, hashname, digest_size, block_size
 | |
|     ):
 | |
|         self.assertEqual(h.hexdigest().upper(), digest.upper())
 | |
|         self.assertEqual(h.digest(), binascii.unhexlify(digest))
 | |
|         self.assertEqual(h.name, f"hmac-{hashname}")
 | |
|         self.assertEqual(h.digest_size, digest_size)
 | |
|         self.assertEqual(h.block_size, block_size)
 | |
| 
 | |
|     def assert_hmac(
 | |
|         self, key, data, digest, hashfunc, hashname, digest_size, block_size
 | |
|     ):
 | |
|         h = hmac.HMAC(key, data, digestmod=hashfunc)
 | |
|         self.assert_hmac_internals(
 | |
|             h, digest, hashname, digest_size, block_size
 | |
|         )
 | |
| 
 | |
|         h = hmac.HMAC(key, data, digestmod=hashname)
 | |
|         self.assert_hmac_internals(
 | |
|             h, digest, hashname, digest_size, block_size
 | |
|         )
 | |
| 
 | |
|         h = hmac.HMAC(key, digestmod=hashname)
 | |
|         h2 = h.copy()
 | |
|         h2.update(b"test update")
 | |
|         h.update(data)
 | |
|         self.assertEqual(h.hexdigest().upper(), digest.upper())
 | |
| 
 | |
|         h = hmac.new(key, data, digestmod=hashname)
 | |
|         self.assert_hmac_internals(
 | |
|             h, digest, hashname, digest_size, block_size
 | |
|         )
 | |
| 
 | |
|         h = hmac.new(key, None, digestmod=hashname)
 | |
|         h.update(data)
 | |
|         self.assertEqual(h.hexdigest().upper(), digest.upper())
 | |
| 
 | |
|         h = hmac.new(key, digestmod=hashname)
 | |
|         h.update(data)
 | |
|         self.assertEqual(h.hexdigest().upper(), digest.upper())
 | |
| 
 | |
|         h = hmac.new(key, data, digestmod=hashfunc)
 | |
|         self.assertEqual(h.hexdigest().upper(), digest.upper())
 | |
| 
 | |
|         self.assertEqual(
 | |
|             hmac.digest(key, data, digest=hashname),
 | |
|             binascii.unhexlify(digest)
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             hmac.digest(key, data, digest=hashfunc),
 | |
|             binascii.unhexlify(digest)
 | |
|         )
 | |
| 
 | |
|         h = hmac.HMAC.__new__(hmac.HMAC)
 | |
|         h._init_old(key, data, digestmod=hashname)
 | |
|         self.assert_hmac_internals(
 | |
|             h, digest, hashname, digest_size, block_size
 | |
|         )
 | |
| 
 | |
|         if c_hmac_new is not None:
 | |
|             h = c_hmac_new(key, data, digestmod=hashname)
 | |
|             self.assert_hmac_internals(
 | |
|                 h, digest, hashname, digest_size, block_size
 | |
|             )
 | |
| 
 | |
|             h = c_hmac_new(key, digestmod=hashname)
 | |
|             h2 = h.copy()
 | |
|             h2.update(b"test update")
 | |
|             h.update(data)
 | |
|             self.assertEqual(h.hexdigest().upper(), digest.upper())
 | |
| 
 | |
|             func = getattr(_hashopenssl, f"openssl_{hashname}")
 | |
|             h = c_hmac_new(key, data, digestmod=func)
 | |
|             self.assert_hmac_internals(
 | |
|                 h, digest, hashname, digest_size, block_size
 | |
|             )
 | |
| 
 | |
|             h = hmac.HMAC.__new__(hmac.HMAC)
 | |
|             h._init_hmac(key, data, digestmod=hashname)
 | |
|             self.assert_hmac_internals(
 | |
|                 h, digest, hashname, digest_size, block_size
 | |
|             )
 | |
| 
 | |
|     @hashlib_helper.requires_hashdigest('md5', openssl=True)
 | |
|     def test_md5_vectors(self):
 | |
|         # Test the HMAC module against test vectors from the RFC.
 | |
| 
 | |
|         def md5test(key, data, digest):
 | |
|             self.assert_hmac(
 | |
|                 key, data, digest,
 | |
|                 hashfunc=hashlib.md5,
 | |
|                 hashname="md5",
 | |
|                 digest_size=16,
 | |
|                 block_size=64
 | |
|             )
 | |
| 
 | |
|         md5test(b"\x0b" * 16,
 | |
|                 b"Hi There",
 | |
|                 "9294727A3638BB1C13F48EF8158BFC9D")
 | |
| 
 | |
|         md5test(b"Jefe",
 | |
|                 b"what do ya want for nothing?",
 | |
|                 "750c783e6ab0b503eaa86e310a5db738")
 | |
| 
 | |
|         md5test(b"\xaa" * 16,
 | |
|                 b"\xdd" * 50,
 | |
|                 "56be34521d144c88dbb8c733f0e8b3f6")
 | |
| 
 | |
|         md5test(bytes(range(1, 26)),
 | |
|                 b"\xcd" * 50,
 | |
|                 "697eaf0aca3a3aea3a75164746ffaa79")
 | |
| 
 | |
|         md5test(b"\x0C" * 16,
 | |
|                 b"Test With Truncation",
 | |
|                 "56461ef2342edc00f9bab995690efd4c")
 | |
| 
 | |
|         md5test(b"\xaa" * 80,
 | |
|                 b"Test Using Larger Than Block-Size Key - Hash Key First",
 | |
|                 "6b1ab7fe4bd7bf8f0b62e6ce61b9d0cd")
 | |
| 
 | |
|         md5test(b"\xaa" * 80,
 | |
|                 (b"Test Using Larger Than Block-Size Key "
 | |
|                  b"and Larger Than One Block-Size Data"),
 | |
|                 "6f630fad67cda0ee1fb1f562db3aa53e")
 | |
| 
 | |
|     @hashlib_helper.requires_hashdigest('sha1', openssl=True)
 | |
|     def test_sha_vectors(self):
 | |
|         def shatest(key, data, digest):
 | |
|             self.assert_hmac(
 | |
|                 key, data, digest,
 | |
|                 hashfunc=hashlib.sha1,
 | |
|                 hashname="sha1",
 | |
|                 digest_size=20,
 | |
|                 block_size=64
 | |
|             )
 | |
| 
 | |
|         shatest(b"\x0b" * 20,
 | |
|                 b"Hi There",
 | |
|                 "b617318655057264e28bc0b6fb378c8ef146be00")
 | |
| 
 | |
|         shatest(b"Jefe",
 | |
|                 b"what do ya want for nothing?",
 | |
|                 "effcdf6ae5eb2fa2d27416d5f184df9c259a7c79")
 | |
| 
 | |
|         shatest(b"\xAA" * 20,
 | |
|                 b"\xDD" * 50,
 | |
|                 "125d7342b9ac11cd91a39af48aa17b4f63f175d3")
 | |
| 
 | |
|         shatest(bytes(range(1, 26)),
 | |
|                 b"\xCD" * 50,
 | |
|                 "4c9007f4026250c6bc8414f9bf50c86c2d7235da")
 | |
| 
 | |
|         shatest(b"\x0C" * 20,
 | |
|                 b"Test With Truncation",
 | |
|                 "4c1a03424b55e07fe7f27be1d58bb9324a9a5a04")
 | |
| 
 | |
|         shatest(b"\xAA" * 80,
 | |
|                 b"Test Using Larger Than Block-Size Key - Hash Key First",
 | |
|                 "aa4ae5e15272d00e95705637ce8a3b55ed402112")
 | |
| 
 | |
|         shatest(b"\xAA" * 80,
 | |
|                 (b"Test Using Larger Than Block-Size Key "
 | |
|                  b"and Larger Than One Block-Size Data"),
 | |
|                 "e8e99d0f45237d786d6bbaa7965c7808bbff1a91")
 | |
| 
 | |
|     def _rfc4231_test_cases(self, hashfunc, hash_name, digest_size, block_size):
 | |
|         def hmactest(key, data, hexdigests):
 | |
|             digest = hexdigests[hashfunc]
 | |
| 
 | |
|             self.assert_hmac(
 | |
|                 key, data, digest,
 | |
|                 hashfunc=hashfunc,
 | |
|                 hashname=hash_name,
 | |
|                 digest_size=digest_size,
 | |
|                 block_size=block_size
 | |
|             )
 | |
| 
 | |
|         # 4.2.  Test Case 1
 | |
|         hmactest(key = b'\x0b'*20,
 | |
|                  data = b'Hi There',
 | |
|                  hexdigests = {
 | |
|                    hashlib.sha224: '896fb1128abbdf196832107cd49df33f'
 | |
|                                    '47b4b1169912ba4f53684b22',
 | |
|                    hashlib.sha256: 'b0344c61d8db38535ca8afceaf0bf12b'
 | |
|                                    '881dc200c9833da726e9376c2e32cff7',
 | |
|                    hashlib.sha384: 'afd03944d84895626b0825f4ab46907f'
 | |
|                                    '15f9dadbe4101ec682aa034c7cebc59c'
 | |
|                                    'faea9ea9076ede7f4af152e8b2fa9cb6',
 | |
|                    hashlib.sha512: '87aa7cdea5ef619d4ff0b4241a1d6cb0'
 | |
|                                    '2379f4e2ce4ec2787ad0b30545e17cde'
 | |
|                                    'daa833b7d6b8a702038b274eaea3f4e4'
 | |
|                                    'be9d914eeb61f1702e696c203a126854',
 | |
|                  })
 | |
| 
 | |
|         # 4.3.  Test Case 2
 | |
|         hmactest(key = b'Jefe',
 | |
|                  data = b'what do ya want for nothing?',
 | |
|                  hexdigests = {
 | |
|                    hashlib.sha224: 'a30e01098bc6dbbf45690f3a7e9e6d0f'
 | |
|                                    '8bbea2a39e6148008fd05e44',
 | |
|                    hashlib.sha256: '5bdcc146bf60754e6a042426089575c7'
 | |
|                                    '5a003f089d2739839dec58b964ec3843',
 | |
|                    hashlib.sha384: 'af45d2e376484031617f78d2b58a6b1b'
 | |
|                                    '9c7ef464f5a01b47e42ec3736322445e'
 | |
|                                    '8e2240ca5e69e2c78b3239ecfab21649',
 | |
|                    hashlib.sha512: '164b7a7bfcf819e2e395fbe73b56e0a3'
 | |
|                                    '87bd64222e831fd610270cd7ea250554'
 | |
|                                    '9758bf75c05a994a6d034f65f8f0e6fd'
 | |
|                                    'caeab1a34d4a6b4b636e070a38bce737',
 | |
|                  })
 | |
| 
 | |
|         # 4.4.  Test Case 3
 | |
|         hmactest(key = b'\xaa'*20,
 | |
|                  data = b'\xdd'*50,
 | |
|                  hexdigests = {
 | |
|                    hashlib.sha224: '7fb3cb3588c6c1f6ffa9694d7d6ad264'
 | |
|                                    '9365b0c1f65d69d1ec8333ea',
 | |
|                    hashlib.sha256: '773ea91e36800e46854db8ebd09181a7'
 | |
|                                    '2959098b3ef8c122d9635514ced565fe',
 | |
|                    hashlib.sha384: '88062608d3e6ad8a0aa2ace014c8a86f'
 | |
|                                    '0aa635d947ac9febe83ef4e55966144b'
 | |
|                                    '2a5ab39dc13814b94e3ab6e101a34f27',
 | |
|                    hashlib.sha512: 'fa73b0089d56a284efb0f0756c890be9'
 | |
|                                    'b1b5dbdd8ee81a3655f83e33b2279d39'
 | |
|                                    'bf3e848279a722c806b485a47e67c807'
 | |
|                                    'b946a337bee8942674278859e13292fb',
 | |
|                  })
 | |
| 
 | |
|         # 4.5.  Test Case 4
 | |
|         hmactest(key = bytes(x for x in range(0x01, 0x19+1)),
 | |
|                  data = b'\xcd'*50,
 | |
|                  hexdigests = {
 | |
|                    hashlib.sha224: '6c11506874013cac6a2abc1bb382627c'
 | |
|                                    'ec6a90d86efc012de7afec5a',
 | |
|                    hashlib.sha256: '82558a389a443c0ea4cc819899f2083a'
 | |
|                                    '85f0faa3e578f8077a2e3ff46729665b',
 | |
|                    hashlib.sha384: '3e8a69b7783c25851933ab6290af6ca7'
 | |
|                                    '7a9981480850009cc5577c6e1f573b4e'
 | |
|                                    '6801dd23c4a7d679ccf8a386c674cffb',
 | |
|                    hashlib.sha512: 'b0ba465637458c6990e5a8c5f61d4af7'
 | |
|                                    'e576d97ff94b872de76f8050361ee3db'
 | |
|                                    'a91ca5c11aa25eb4d679275cc5788063'
 | |
|                                    'a5f19741120c4f2de2adebeb10a298dd',
 | |
|                  })
 | |
| 
 | |
|         # 4.7.  Test Case 6
 | |
|         hmactest(key = b'\xaa'*131,
 | |
|                  data = b'Test Using Larger Than Block-Siz'
 | |
|                         b'e Key - Hash Key First',
 | |
|                  hexdigests = {
 | |
|                    hashlib.sha224: '95e9a0db962095adaebe9b2d6f0dbce2'
 | |
|                                    'd499f112f2d2b7273fa6870e',
 | |
|                    hashlib.sha256: '60e431591ee0b67f0d8a26aacbf5b77f'
 | |
|                                    '8e0bc6213728c5140546040f0ee37f54',
 | |
|                    hashlib.sha384: '4ece084485813e9088d2c63a041bc5b4'
 | |
|                                    '4f9ef1012a2b588f3cd11f05033ac4c6'
 | |
|                                    '0c2ef6ab4030fe8296248df163f44952',
 | |
|                    hashlib.sha512: '80b24263c7c1a3ebb71493c1dd7be8b4'
 | |
|                                    '9b46d1f41b4aeec1121b013783f8f352'
 | |
|                                    '6b56d037e05f2598bd0fd2215d6a1e52'
 | |
|                                    '95e64f73f63f0aec8b915a985d786598',
 | |
|                  })
 | |
| 
 | |
|         # 4.8.  Test Case 7
 | |
|         hmactest(key = b'\xaa'*131,
 | |
|                  data = b'This is a test using a larger th'
 | |
|                         b'an block-size key and a larger t'
 | |
|                         b'han block-size data. The key nee'
 | |
|                         b'ds to be hashed before being use'
 | |
|                         b'd by the HMAC algorithm.',
 | |
|                  hexdigests = {
 | |
|                    hashlib.sha224: '3a854166ac5d9f023f54d517d0b39dbd'
 | |
|                                    '946770db9c2b95c9f6f565d1',
 | |
|                    hashlib.sha256: '9b09ffa71b942fcb27635fbcd5b0e944'
 | |
|                                    'bfdc63644f0713938a7f51535c3a35e2',
 | |
|                    hashlib.sha384: '6617178e941f020d351e2f254e8fd32c'
 | |
|                                    '602420feb0b8fb9adccebb82461e99c5'
 | |
|                                    'a678cc31e799176d3860e6110c46523e',
 | |
|                    hashlib.sha512: 'e37b6a775dc87dbaa4dfa9f96e5e3ffd'
 | |
|                                    'debd71f8867289865df5a32d20cdc944'
 | |
|                                    'b6022cac3c4982b10d5eeb55c3e4de15'
 | |
|                                    '134676fb6de0446065c97440fa8c6a58',
 | |
|                  })
 | |
| 
 | |
|     @hashlib_helper.requires_hashdigest('sha224', openssl=True)
 | |
|     def test_sha224_rfc4231(self):
 | |
|         self._rfc4231_test_cases(hashlib.sha224, 'sha224', 28, 64)
 | |
| 
 | |
|     @hashlib_helper.requires_hashdigest('sha256', openssl=True)
 | |
|     def test_sha256_rfc4231(self):
 | |
|         self._rfc4231_test_cases(hashlib.sha256, 'sha256', 32, 64)
 | |
| 
 | |
|     @hashlib_helper.requires_hashdigest('sha384', openssl=True)
 | |
|     def test_sha384_rfc4231(self):
 | |
|         self._rfc4231_test_cases(hashlib.sha384, 'sha384', 48, 128)
 | |
| 
 | |
|     @hashlib_helper.requires_hashdigest('sha512', openssl=True)
 | |
|     def test_sha512_rfc4231(self):
 | |
|         self._rfc4231_test_cases(hashlib.sha512, 'sha512', 64, 128)
 | |
| 
 | |
|     @hashlib_helper.requires_hashdigest('sha256')
 | |
|     def test_legacy_block_size_warnings(self):
 | |
|         class MockCrazyHash(object):
 | |
|             """Ain't no block_size attribute here."""
 | |
|             def __init__(self, *args):
 | |
|                 self._x = hashlib.sha256(*args)
 | |
|                 self.digest_size = self._x.digest_size
 | |
|             def update(self, v):
 | |
|                 self._x.update(v)
 | |
|             def digest(self):
 | |
|                 return self._x.digest()
 | |
| 
 | |
|         with warnings.catch_warnings():
 | |
|             warnings.simplefilter('error', RuntimeWarning)
 | |
|             with self.assertRaises(RuntimeWarning):
 | |
|                 hmac.HMAC(b'a', b'b', digestmod=MockCrazyHash)
 | |
|                 self.fail('Expected warning about missing block_size')
 | |
| 
 | |
|             MockCrazyHash.block_size = 1
 | |
|             with self.assertRaises(RuntimeWarning):
 | |
|                 hmac.HMAC(b'a', b'b', digestmod=MockCrazyHash)
 | |
|                 self.fail('Expected warning about small block_size')
 | |
| 
 | |
|     def test_with_digestmod_no_default(self):
 | |
|         """The digestmod parameter is required as of Python 3.8."""
 | |
|         with self.assertRaisesRegex(TypeError, r'required.*digestmod'):
 | |
|             key = b"\x0b" * 16
 | |
|             data = b"Hi There"
 | |
|             hmac.HMAC(key, data, digestmod=None)
 | |
|         with self.assertRaisesRegex(TypeError, r'required.*digestmod'):
 | |
|             hmac.new(key, data)
 | |
|         with self.assertRaisesRegex(TypeError, r'required.*digestmod'):
 | |
|             hmac.HMAC(key, msg=data, digestmod='')
 | |
| 
 | |
|     def test_with_fallback(self):
 | |
|         cache = getattr(hashlib, '__builtin_constructor_cache')
 | |
|         try:
 | |
|             cache['foo'] = hashlib.sha256
 | |
|             hexdigest = hmac.digest(b'key', b'message', 'foo').hex()
 | |
|             expected = '6e9ef29b75fffc5b7abae527d58fdadb2fe42e7219011976917343065f58ed4a'
 | |
|             self.assertEqual(hexdigest, expected)
 | |
|         finally:
 | |
|             cache.pop('foo')
 | |
| 
 | |
| 
 | |
| class ConstructorTestCase(unittest.TestCase):
 | |
| 
 | |
|     expected = (
 | |
|         "6c845b47f52b3b47f6590c502db7825aad757bf4fadc8fa972f7cd2e76a5bdeb"
 | |
|     )
 | |
| 
 | |
|     @hashlib_helper.requires_hashdigest('sha256')
 | |
|     def test_normal(self):
 | |
|         # Standard constructor call.
 | |
|         try:
 | |
|             hmac.HMAC(b"key", digestmod='sha256')
 | |
|         except Exception:
 | |
|             self.fail("Standard constructor call raised exception.")
 | |
| 
 | |
|     @hashlib_helper.requires_hashdigest('sha256')
 | |
|     def test_with_str_key(self):
 | |
|         # Pass a key of type str, which is an error, because it expects a key
 | |
|         # of type bytes
 | |
|         with self.assertRaises(TypeError):
 | |
|             h = hmac.HMAC("key", digestmod='sha256')
 | |
| 
 | |
|     @hashlib_helper.requires_hashdigest('sha256')
 | |
|     def test_dot_new_with_str_key(self):
 | |
|         # Pass a key of type str, which is an error, because it expects a key
 | |
|         # of type bytes
 | |
|         with self.assertRaises(TypeError):
 | |
|             h = hmac.new("key", digestmod='sha256')
 | |
| 
 | |
|     @hashlib_helper.requires_hashdigest('sha256')
 | |
|     def test_withtext(self):
 | |
|         # Constructor call with text.
 | |
|         try:
 | |
|             h = hmac.HMAC(b"key", b"hash this!", digestmod='sha256')
 | |
|         except Exception:
 | |
|             self.fail("Constructor call with text argument raised exception.")
 | |
|         self.assertEqual(h.hexdigest(), self.expected)
 | |
| 
 | |
|     @hashlib_helper.requires_hashdigest('sha256')
 | |
|     def test_with_bytearray(self):
 | |
|         try:
 | |
|             h = hmac.HMAC(bytearray(b"key"), bytearray(b"hash this!"),
 | |
|                           digestmod="sha256")
 | |
|         except Exception:
 | |
|             self.fail("Constructor call with bytearray arguments raised exception.")
 | |
|         self.assertEqual(h.hexdigest(), self.expected)
 | |
| 
 | |
|     @hashlib_helper.requires_hashdigest('sha256')
 | |
|     def test_with_memoryview_msg(self):
 | |
|         try:
 | |
|             h = hmac.HMAC(b"key", memoryview(b"hash this!"), digestmod="sha256")
 | |
|         except Exception:
 | |
|             self.fail("Constructor call with memoryview msg raised exception.")
 | |
|         self.assertEqual(h.hexdigest(), self.expected)
 | |
| 
 | |
|     @hashlib_helper.requires_hashdigest('sha256')
 | |
|     def test_withmodule(self):
 | |
|         # Constructor call with text and digest module.
 | |
|         try:
 | |
|             h = hmac.HMAC(b"key", b"", hashlib.sha256)
 | |
|         except Exception:
 | |
|             self.fail("Constructor call with hashlib.sha256 raised exception.")
 | |
| 
 | |
|     @unittest.skipUnless(C_HMAC is not None, 'need _hashlib')
 | |
|     def test_internal_types(self):
 | |
|         # internal types like _hashlib.C_HMAC are not constructable
 | |
|         check_disallow_instantiation(self, C_HMAC)
 | |
|         with self.assertRaisesRegex(TypeError, "immutable type"):
 | |
|             C_HMAC.value = None
 | |
| 
 | |
|     @unittest.skipUnless(sha256_module is not None, 'need _sha256')
 | |
|     def test_with_sha256_module(self):
 | |
|         h = hmac.HMAC(b"key", b"hash this!", digestmod=sha256_module.sha256)
 | |
|         self.assertEqual(h.hexdigest(), self.expected)
 | |
|         self.assertEqual(h.name, "hmac-sha256")
 | |
| 
 | |
|         digest = hmac.digest(b"key", b"hash this!", sha256_module.sha256)
 | |
|         self.assertEqual(digest, binascii.unhexlify(self.expected))
 | |
| 
 | |
| 
 | |
| class SanityTestCase(unittest.TestCase):
 | |
| 
 | |
|     @hashlib_helper.requires_hashdigest('sha256')
 | |
|     def test_exercise_all_methods(self):
 | |
|         # Exercising all methods once.
 | |
|         # This must not raise any exceptions
 | |
|         try:
 | |
|             h = hmac.HMAC(b"my secret key", digestmod="sha256")
 | |
|             h.update(b"compute the hash of this text!")
 | |
|             h.digest()
 | |
|             h.hexdigest()
 | |
|             h.copy()
 | |
|         except Exception:
 | |
|             self.fail("Exception raised during normal usage of HMAC class.")
 | |
| 
 | |
| 
 | |
| class UpdateTestCase(unittest.TestCase):
 | |
|     @hashlib_helper.requires_hashdigest('sha256')
 | |
|     def test_with_str_update(self):
 | |
|         with self.assertRaises(TypeError):
 | |
|             h = hmac.new(b"key", digestmod='sha256')
 | |
|             h.update("invalid update")
 | |
| 
 | |
| 
 | |
| class CopyTestCase(unittest.TestCase):
 | |
| 
 | |
|     @hashlib_helper.requires_hashdigest('sha256')
 | |
|     def test_attributes_old(self):
 | |
|         # Testing if attributes are of same type.
 | |
|         h1 = hmac.HMAC.__new__(hmac.HMAC)
 | |
|         h1._init_old(b"key", b"msg", digestmod="sha256")
 | |
|         h2 = h1.copy()
 | |
|         self.assertEqual(type(h1._inner), type(h2._inner),
 | |
|             "Types of inner don't match.")
 | |
|         self.assertEqual(type(h1._outer), type(h2._outer),
 | |
|             "Types of outer don't match.")
 | |
| 
 | |
|     @hashlib_helper.requires_hashdigest('sha256')
 | |
|     def test_realcopy_old(self):
 | |
|         # Testing if the copy method created a real copy.
 | |
|         h1 = hmac.HMAC.__new__(hmac.HMAC)
 | |
|         h1._init_old(b"key", b"msg", digestmod="sha256")
 | |
|         h2 = h1.copy()
 | |
|         # Using id() in case somebody has overridden __eq__/__ne__.
 | |
|         self.assertTrue(id(h1) != id(h2), "No real copy of the HMAC instance.")
 | |
|         self.assertTrue(id(h1._inner) != id(h2._inner),
 | |
|             "No real copy of the attribute 'inner'.")
 | |
|         self.assertTrue(id(h1._outer) != id(h2._outer),
 | |
|             "No real copy of the attribute 'outer'.")
 | |
|         self.assertIs(h1._hmac, None)
 | |
| 
 | |
|     @unittest.skipIf(_hashopenssl is None, "test requires _hashopenssl")
 | |
|     @hashlib_helper.requires_hashdigest('sha256')
 | |
|     def test_realcopy_hmac(self):
 | |
|         h1 = hmac.HMAC.__new__(hmac.HMAC)
 | |
|         h1._init_hmac(b"key", b"msg", digestmod="sha256")
 | |
|         h2 = h1.copy()
 | |
|         self.assertTrue(id(h1._hmac) != id(h2._hmac))
 | |
| 
 | |
|     @hashlib_helper.requires_hashdigest('sha256')
 | |
|     def test_equality(self):
 | |
|         # Testing if the copy has the same digests.
 | |
|         h1 = hmac.HMAC(b"key", digestmod="sha256")
 | |
|         h1.update(b"some random text")
 | |
|         h2 = h1.copy()
 | |
|         self.assertEqual(h1.digest(), h2.digest(),
 | |
|             "Digest of copy doesn't match original digest.")
 | |
|         self.assertEqual(h1.hexdigest(), h2.hexdigest(),
 | |
|             "Hexdigest of copy doesn't match original hexdigest.")
 | |
| 
 | |
|     @hashlib_helper.requires_hashdigest('sha256')
 | |
|     def test_equality_new(self):
 | |
|         # Testing if the copy has the same digests with hmac.new().
 | |
|         h1 = hmac.new(b"key", digestmod="sha256")
 | |
|         h1.update(b"some random text")
 | |
|         h2 = h1.copy()
 | |
|         self.assertTrue(
 | |
|             id(h1) != id(h2), "No real copy of the HMAC instance."
 | |
|         )
 | |
|         self.assertEqual(h1.digest(), h2.digest(),
 | |
|             "Digest of copy doesn't match original digest.")
 | |
|         self.assertEqual(h1.hexdigest(), h2.hexdigest(),
 | |
|             "Hexdigest of copy doesn't match original hexdigest.")
 | |
| 
 | |
| 
 | |
| class CompareDigestTestCase(unittest.TestCase):
 | |
| 
 | |
|     def test_hmac_compare_digest(self):
 | |
|         self._test_compare_digest(hmac.compare_digest)
 | |
|         if openssl_compare_digest is not None:
 | |
|             self.assertIs(hmac.compare_digest, openssl_compare_digest)
 | |
|         else:
 | |
|             self.assertIs(hmac.compare_digest, operator_compare_digest)
 | |
| 
 | |
|     def test_operator_compare_digest(self):
 | |
|         self._test_compare_digest(operator_compare_digest)
 | |
| 
 | |
|     @unittest.skipIf(openssl_compare_digest is None, "test requires _hashlib")
 | |
|     def test_openssl_compare_digest(self):
 | |
|         self._test_compare_digest(openssl_compare_digest)
 | |
| 
 | |
|     def _test_compare_digest(self, compare_digest):
 | |
|         # Testing input type exception handling
 | |
|         a, b = 100, 200
 | |
|         self.assertRaises(TypeError, compare_digest, a, b)
 | |
|         a, b = 100, b"foobar"
 | |
|         self.assertRaises(TypeError, compare_digest, a, b)
 | |
|         a, b = b"foobar", 200
 | |
|         self.assertRaises(TypeError, compare_digest, a, b)
 | |
|         a, b = "foobar", b"foobar"
 | |
|         self.assertRaises(TypeError, compare_digest, a, b)
 | |
|         a, b = b"foobar", "foobar"
 | |
|         self.assertRaises(TypeError, compare_digest, a, b)
 | |
| 
 | |
|         # Testing bytes of different lengths
 | |
|         a, b = b"foobar", b"foo"
 | |
|         self.assertFalse(compare_digest(a, b))
 | |
|         a, b = b"\xde\xad\xbe\xef", b"\xde\xad"
 | |
|         self.assertFalse(compare_digest(a, b))
 | |
| 
 | |
|         # Testing bytes of same lengths, different values
 | |
|         a, b = b"foobar", b"foobaz"
 | |
|         self.assertFalse(compare_digest(a, b))
 | |
|         a, b = b"\xde\xad\xbe\xef", b"\xab\xad\x1d\xea"
 | |
|         self.assertFalse(compare_digest(a, b))
 | |
| 
 | |
|         # Testing bytes of same lengths, same values
 | |
|         a, b = b"foobar", b"foobar"
 | |
|         self.assertTrue(compare_digest(a, b))
 | |
|         a, b = b"\xde\xad\xbe\xef", b"\xde\xad\xbe\xef"
 | |
|         self.assertTrue(compare_digest(a, b))
 | |
| 
 | |
|         # Testing bytearrays of same lengths, same values
 | |
|         a, b = bytearray(b"foobar"), bytearray(b"foobar")
 | |
|         self.assertTrue(compare_digest(a, b))
 | |
| 
 | |
|         # Testing bytearrays of different lengths
 | |
|         a, b = bytearray(b"foobar"), bytearray(b"foo")
 | |
|         self.assertFalse(compare_digest(a, b))
 | |
| 
 | |
|         # Testing bytearrays of same lengths, different values
 | |
|         a, b = bytearray(b"foobar"), bytearray(b"foobaz")
 | |
|         self.assertFalse(compare_digest(a, b))
 | |
| 
 | |
|         # Testing byte and bytearray of same lengths, same values
 | |
|         a, b = bytearray(b"foobar"), b"foobar"
 | |
|         self.assertTrue(compare_digest(a, b))
 | |
|         self.assertTrue(compare_digest(b, a))
 | |
| 
 | |
|         # Testing byte bytearray of different lengths
 | |
|         a, b = bytearray(b"foobar"), b"foo"
 | |
|         self.assertFalse(compare_digest(a, b))
 | |
|         self.assertFalse(compare_digest(b, a))
 | |
| 
 | |
|         # Testing byte and bytearray of same lengths, different values
 | |
|         a, b = bytearray(b"foobar"), b"foobaz"
 | |
|         self.assertFalse(compare_digest(a, b))
 | |
|         self.assertFalse(compare_digest(b, a))
 | |
| 
 | |
|         # Testing str of same lengths
 | |
|         a, b = "foobar", "foobar"
 | |
|         self.assertTrue(compare_digest(a, b))
 | |
| 
 | |
|         # Testing str of different lengths
 | |
|         a, b = "foo", "foobar"
 | |
|         self.assertFalse(compare_digest(a, b))
 | |
| 
 | |
|         # Testing bytes of same lengths, different values
 | |
|         a, b = "foobar", "foobaz"
 | |
|         self.assertFalse(compare_digest(a, b))
 | |
| 
 | |
|         # Testing error cases
 | |
|         a, b = "foobar", b"foobar"
 | |
|         self.assertRaises(TypeError, compare_digest, a, b)
 | |
|         a, b = b"foobar", "foobar"
 | |
|         self.assertRaises(TypeError, compare_digest, a, b)
 | |
|         a, b = b"foobar", 1
 | |
|         self.assertRaises(TypeError, compare_digest, a, b)
 | |
|         a, b = 100, 200
 | |
|         self.assertRaises(TypeError, compare_digest, a, b)
 | |
|         a, b = "fooä", "fooä"
 | |
|         self.assertRaises(TypeError, compare_digest, a, b)
 | |
| 
 | |
|         # subclasses are supported by ignore __eq__
 | |
|         class mystr(str):
 | |
|             def __eq__(self, other):
 | |
|                 return False
 | |
| 
 | |
|         a, b = mystr("foobar"), mystr("foobar")
 | |
|         self.assertTrue(compare_digest(a, b))
 | |
|         a, b = mystr("foobar"), "foobar"
 | |
|         self.assertTrue(compare_digest(a, b))
 | |
|         a, b = mystr("foobar"), mystr("foobaz")
 | |
|         self.assertFalse(compare_digest(a, b))
 | |
| 
 | |
|         class mybytes(bytes):
 | |
|             def __eq__(self, other):
 | |
|                 return False
 | |
| 
 | |
|         a, b = mybytes(b"foobar"), mybytes(b"foobar")
 | |
|         self.assertTrue(compare_digest(a, b))
 | |
|         a, b = mybytes(b"foobar"), b"foobar"
 | |
|         self.assertTrue(compare_digest(a, b))
 | |
|         a, b = mybytes(b"foobar"), mybytes(b"foobaz")
 | |
|         self.assertFalse(compare_digest(a, b))
 | |
| 
 | |
| 
 | |
| if __name__ == "__main__":
 | |
|     unittest.main()
 | 
