| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656 |
- import binascii
- import functools
- import hmac
- import hashlib
- import unittest
- import unittest.mock
- import warnings
- from test.support import hashlib_helper, check_disallow_instantiation
- from _operator import _compare_digest as operator_compare_digest
- try:
- import _hashlib as _hashopenssl
- from _hashlib import HMAC as C_HMAC
- from _hashlib import hmac_new as c_hmac_new
- from _hashlib import compare_digest as openssl_compare_digest
- except ImportError:
- _hashopenssl = None
- C_HMAC = None
- c_hmac_new = None
- openssl_compare_digest = None
- try:
- import _sha256 as sha256_module
- except ImportError:
- sha256_module = None
- def ignore_warning(func):
- @functools.wraps(func)
- def wrapper(*args, **kwargs):
- with warnings.catch_warnings():
- warnings.filterwarnings("ignore",
- category=DeprecationWarning)
- return func(*args, **kwargs)
- return wrapper
- class TestVectorsTestCase(unittest.TestCase):
- def assert_hmac_internals(
- self, h, digest, hashname, digest_size, block_size
- ):
- self.assertEqual(h.hexdigest().upper(), digest.upper())
- self.assertEqual(h.digest(), binascii.unhexlify(digest))
- self.assertEqual(h.name, f"hmac-{hashname}")
- self.assertEqual(h.digest_size, digest_size)
- self.assertEqual(h.block_size, block_size)
- def assert_hmac(
- self, key, data, digest, hashfunc, hashname, digest_size, block_size
- ):
- h = hmac.HMAC(key, data, digestmod=hashfunc)
- self.assert_hmac_internals(
- h, digest, hashname, digest_size, block_size
- )
- h = hmac.HMAC(key, data, digestmod=hashname)
- self.assert_hmac_internals(
- h, digest, hashname, digest_size, block_size
- )
- h = hmac.HMAC(key, digestmod=hashname)
- h2 = h.copy()
- h2.update(b"test update")
- h.update(data)
- self.assertEqual(h.hexdigest().upper(), digest.upper())
- h = hmac.new(key, data, digestmod=hashname)
- self.assert_hmac_internals(
- h, digest, hashname, digest_size, block_size
- )
- h = hmac.new(key, None, digestmod=hashname)
- h.update(data)
- self.assertEqual(h.hexdigest().upper(), digest.upper())
- h = hmac.new(key, digestmod=hashname)
- h.update(data)
- self.assertEqual(h.hexdigest().upper(), digest.upper())
- h = hmac.new(key, data, digestmod=hashfunc)
- self.assertEqual(h.hexdigest().upper(), digest.upper())
- self.assertEqual(
- hmac.digest(key, data, digest=hashname),
- binascii.unhexlify(digest)
- )
- self.assertEqual(
- hmac.digest(key, data, digest=hashfunc),
- binascii.unhexlify(digest)
- )
- h = hmac.HMAC.__new__(hmac.HMAC)
- h._init_old(key, data, digestmod=hashname)
- self.assert_hmac_internals(
- h, digest, hashname, digest_size, block_size
- )
- if c_hmac_new is not None:
- h = c_hmac_new(key, data, digestmod=hashname)
- self.assert_hmac_internals(
- h, digest, hashname, digest_size, block_size
- )
- h = c_hmac_new(key, digestmod=hashname)
- h2 = h.copy()
- h2.update(b"test update")
- h.update(data)
- self.assertEqual(h.hexdigest().upper(), digest.upper())
- func = getattr(_hashopenssl, f"openssl_{hashname}")
- h = c_hmac_new(key, data, digestmod=func)
- self.assert_hmac_internals(
- h, digest, hashname, digest_size, block_size
- )
- h = hmac.HMAC.__new__(hmac.HMAC)
- h._init_hmac(key, data, digestmod=hashname)
- self.assert_hmac_internals(
- h, digest, hashname, digest_size, block_size
- )
- @hashlib_helper.requires_hashdigest('md5', openssl=True)
- def test_md5_vectors(self):
- # Test the HMAC module against test vectors from the RFC.
- def md5test(key, data, digest):
- self.assert_hmac(
- key, data, digest,
- hashfunc=hashlib.md5,
- hashname="md5",
- digest_size=16,
- block_size=64
- )
- md5test(b"\x0b" * 16,
- b"Hi There",
- "9294727A3638BB1C13F48EF8158BFC9D")
- md5test(b"Jefe",
- b"what do ya want for nothing?",
- "750c783e6ab0b503eaa86e310a5db738")
- md5test(b"\xaa" * 16,
- b"\xdd" * 50,
- "56be34521d144c88dbb8c733f0e8b3f6")
- md5test(bytes(range(1, 26)),
- b"\xcd" * 50,
- "697eaf0aca3a3aea3a75164746ffaa79")
- md5test(b"\x0C" * 16,
- b"Test With Truncation",
- "56461ef2342edc00f9bab995690efd4c")
- md5test(b"\xaa" * 80,
- b"Test Using Larger Than Block-Size Key - Hash Key First",
- "6b1ab7fe4bd7bf8f0b62e6ce61b9d0cd")
- md5test(b"\xaa" * 80,
- (b"Test Using Larger Than Block-Size Key "
- b"and Larger Than One Block-Size Data"),
- "6f630fad67cda0ee1fb1f562db3aa53e")
- @hashlib_helper.requires_hashdigest('sha1', openssl=True)
- def test_sha_vectors(self):
- def shatest(key, data, digest):
- self.assert_hmac(
- key, data, digest,
- hashfunc=hashlib.sha1,
- hashname="sha1",
- digest_size=20,
- block_size=64
- )
- shatest(b"\x0b" * 20,
- b"Hi There",
- "b617318655057264e28bc0b6fb378c8ef146be00")
- shatest(b"Jefe",
- b"what do ya want for nothing?",
- "effcdf6ae5eb2fa2d27416d5f184df9c259a7c79")
- shatest(b"\xAA" * 20,
- b"\xDD" * 50,
- "125d7342b9ac11cd91a39af48aa17b4f63f175d3")
- shatest(bytes(range(1, 26)),
- b"\xCD" * 50,
- "4c9007f4026250c6bc8414f9bf50c86c2d7235da")
- shatest(b"\x0C" * 20,
- b"Test With Truncation",
- "4c1a03424b55e07fe7f27be1d58bb9324a9a5a04")
- shatest(b"\xAA" * 80,
- b"Test Using Larger Than Block-Size Key - Hash Key First",
- "aa4ae5e15272d00e95705637ce8a3b55ed402112")
- shatest(b"\xAA" * 80,
- (b"Test Using Larger Than Block-Size Key "
- b"and Larger Than One Block-Size Data"),
- "e8e99d0f45237d786d6bbaa7965c7808bbff1a91")
- def _rfc4231_test_cases(self, hashfunc, hash_name, digest_size, block_size):
- def hmactest(key, data, hexdigests):
- digest = hexdigests[hashfunc]
- self.assert_hmac(
- key, data, digest,
- hashfunc=hashfunc,
- hashname=hash_name,
- digest_size=digest_size,
- block_size=block_size
- )
- # 4.2. Test Case 1
- hmactest(key = b'\x0b'*20,
- data = b'Hi There',
- hexdigests = {
- hashlib.sha224: '896fb1128abbdf196832107cd49df33f'
- '47b4b1169912ba4f53684b22',
- hashlib.sha256: 'b0344c61d8db38535ca8afceaf0bf12b'
- '881dc200c9833da726e9376c2e32cff7',
- hashlib.sha384: 'afd03944d84895626b0825f4ab46907f'
- '15f9dadbe4101ec682aa034c7cebc59c'
- 'faea9ea9076ede7f4af152e8b2fa9cb6',
- hashlib.sha512: '87aa7cdea5ef619d4ff0b4241a1d6cb0'
- '2379f4e2ce4ec2787ad0b30545e17cde'
- 'daa833b7d6b8a702038b274eaea3f4e4'
- 'be9d914eeb61f1702e696c203a126854',
- })
- # 4.3. Test Case 2
- hmactest(key = b'Jefe',
- data = b'what do ya want for nothing?',
- hexdigests = {
- hashlib.sha224: 'a30e01098bc6dbbf45690f3a7e9e6d0f'
- '8bbea2a39e6148008fd05e44',
- hashlib.sha256: '5bdcc146bf60754e6a042426089575c7'
- '5a003f089d2739839dec58b964ec3843',
- hashlib.sha384: 'af45d2e376484031617f78d2b58a6b1b'
- '9c7ef464f5a01b47e42ec3736322445e'
- '8e2240ca5e69e2c78b3239ecfab21649',
- hashlib.sha512: '164b7a7bfcf819e2e395fbe73b56e0a3'
- '87bd64222e831fd610270cd7ea250554'
- '9758bf75c05a994a6d034f65f8f0e6fd'
- 'caeab1a34d4a6b4b636e070a38bce737',
- })
- # 4.4. Test Case 3
- hmactest(key = b'\xaa'*20,
- data = b'\xdd'*50,
- hexdigests = {
- hashlib.sha224: '7fb3cb3588c6c1f6ffa9694d7d6ad264'
- '9365b0c1f65d69d1ec8333ea',
- hashlib.sha256: '773ea91e36800e46854db8ebd09181a7'
- '2959098b3ef8c122d9635514ced565fe',
- hashlib.sha384: '88062608d3e6ad8a0aa2ace014c8a86f'
- '0aa635d947ac9febe83ef4e55966144b'
- '2a5ab39dc13814b94e3ab6e101a34f27',
- hashlib.sha512: 'fa73b0089d56a284efb0f0756c890be9'
- 'b1b5dbdd8ee81a3655f83e33b2279d39'
- 'bf3e848279a722c806b485a47e67c807'
- 'b946a337bee8942674278859e13292fb',
- })
- # 4.5. Test Case 4
- hmactest(key = bytes(x for x in range(0x01, 0x19+1)),
- data = b'\xcd'*50,
- hexdigests = {
- hashlib.sha224: '6c11506874013cac6a2abc1bb382627c'
- 'ec6a90d86efc012de7afec5a',
- hashlib.sha256: '82558a389a443c0ea4cc819899f2083a'
- '85f0faa3e578f8077a2e3ff46729665b',
- hashlib.sha384: '3e8a69b7783c25851933ab6290af6ca7'
- '7a9981480850009cc5577c6e1f573b4e'
- '6801dd23c4a7d679ccf8a386c674cffb',
- hashlib.sha512: 'b0ba465637458c6990e5a8c5f61d4af7'
- 'e576d97ff94b872de76f8050361ee3db'
- 'a91ca5c11aa25eb4d679275cc5788063'
- 'a5f19741120c4f2de2adebeb10a298dd',
- })
- # 4.7. Test Case 6
- hmactest(key = b'\xaa'*131,
- data = b'Test Using Larger Than Block-Siz'
- b'e Key - Hash Key First',
- hexdigests = {
- hashlib.sha224: '95e9a0db962095adaebe9b2d6f0dbce2'
- 'd499f112f2d2b7273fa6870e',
- hashlib.sha256: '60e431591ee0b67f0d8a26aacbf5b77f'
- '8e0bc6213728c5140546040f0ee37f54',
- hashlib.sha384: '4ece084485813e9088d2c63a041bc5b4'
- '4f9ef1012a2b588f3cd11f05033ac4c6'
- '0c2ef6ab4030fe8296248df163f44952',
- hashlib.sha512: '80b24263c7c1a3ebb71493c1dd7be8b4'
- '9b46d1f41b4aeec1121b013783f8f352'
- '6b56d037e05f2598bd0fd2215d6a1e52'
- '95e64f73f63f0aec8b915a985d786598',
- })
- # 4.8. Test Case 7
- hmactest(key = b'\xaa'*131,
- data = b'This is a test using a larger th'
- b'an block-size key and a larger t'
- b'han block-size data. The key nee'
- b'ds to be hashed before being use'
- b'd by the HMAC algorithm.',
- hexdigests = {
- hashlib.sha224: '3a854166ac5d9f023f54d517d0b39dbd'
- '946770db9c2b95c9f6f565d1',
- hashlib.sha256: '9b09ffa71b942fcb27635fbcd5b0e944'
- 'bfdc63644f0713938a7f51535c3a35e2',
- hashlib.sha384: '6617178e941f020d351e2f254e8fd32c'
- '602420feb0b8fb9adccebb82461e99c5'
- 'a678cc31e799176d3860e6110c46523e',
- hashlib.sha512: 'e37b6a775dc87dbaa4dfa9f96e5e3ffd'
- 'debd71f8867289865df5a32d20cdc944'
- 'b6022cac3c4982b10d5eeb55c3e4de15'
- '134676fb6de0446065c97440fa8c6a58',
- })
- @hashlib_helper.requires_hashdigest('sha224', openssl=True)
- def test_sha224_rfc4231(self):
- self._rfc4231_test_cases(hashlib.sha224, 'sha224', 28, 64)
- @hashlib_helper.requires_hashdigest('sha256', openssl=True)
- def test_sha256_rfc4231(self):
- self._rfc4231_test_cases(hashlib.sha256, 'sha256', 32, 64)
- @hashlib_helper.requires_hashdigest('sha384', openssl=True)
- def test_sha384_rfc4231(self):
- self._rfc4231_test_cases(hashlib.sha384, 'sha384', 48, 128)
- @hashlib_helper.requires_hashdigest('sha512', openssl=True)
- def test_sha512_rfc4231(self):
- self._rfc4231_test_cases(hashlib.sha512, 'sha512', 64, 128)
- @hashlib_helper.requires_hashdigest('sha256')
- def test_legacy_block_size_warnings(self):
- class MockCrazyHash(object):
- """Ain't no block_size attribute here."""
- def __init__(self, *args):
- self._x = hashlib.sha256(*args)
- self.digest_size = self._x.digest_size
- def update(self, v):
- self._x.update(v)
- def digest(self):
- return self._x.digest()
- with warnings.catch_warnings():
- warnings.simplefilter('error', RuntimeWarning)
- with self.assertRaises(RuntimeWarning):
- hmac.HMAC(b'a', b'b', digestmod=MockCrazyHash)
- self.fail('Expected warning about missing block_size')
- MockCrazyHash.block_size = 1
- with self.assertRaises(RuntimeWarning):
- hmac.HMAC(b'a', b'b', digestmod=MockCrazyHash)
- self.fail('Expected warning about small block_size')
- def test_with_digestmod_no_default(self):
- """The digestmod parameter is required as of Python 3.8."""
- with self.assertRaisesRegex(TypeError, r'required.*digestmod'):
- key = b"\x0b" * 16
- data = b"Hi There"
- hmac.HMAC(key, data, digestmod=None)
- with self.assertRaisesRegex(TypeError, r'required.*digestmod'):
- hmac.new(key, data)
- with self.assertRaisesRegex(TypeError, r'required.*digestmod'):
- hmac.HMAC(key, msg=data, digestmod='')
- class ConstructorTestCase(unittest.TestCase):
- expected = (
- "6c845b47f52b3b47f6590c502db7825aad757bf4fadc8fa972f7cd2e76a5bdeb"
- )
- @hashlib_helper.requires_hashdigest('sha256')
- def test_normal(self):
- # Standard constructor call.
- try:
- hmac.HMAC(b"key", digestmod='sha256')
- except Exception:
- self.fail("Standard constructor call raised exception.")
- @hashlib_helper.requires_hashdigest('sha256')
- def test_with_str_key(self):
- # Pass a key of type str, which is an error, because it expects a key
- # of type bytes
- with self.assertRaises(TypeError):
- h = hmac.HMAC("key", digestmod='sha256')
- @hashlib_helper.requires_hashdigest('sha256')
- def test_dot_new_with_str_key(self):
- # Pass a key of type str, which is an error, because it expects a key
- # of type bytes
- with self.assertRaises(TypeError):
- h = hmac.new("key", digestmod='sha256')
- @hashlib_helper.requires_hashdigest('sha256')
- def test_withtext(self):
- # Constructor call with text.
- try:
- h = hmac.HMAC(b"key", b"hash this!", digestmod='sha256')
- except Exception:
- self.fail("Constructor call with text argument raised exception.")
- self.assertEqual(h.hexdigest(), self.expected)
- @hashlib_helper.requires_hashdigest('sha256')
- def test_with_bytearray(self):
- try:
- h = hmac.HMAC(bytearray(b"key"), bytearray(b"hash this!"),
- digestmod="sha256")
- except Exception:
- self.fail("Constructor call with bytearray arguments raised exception.")
- self.assertEqual(h.hexdigest(), self.expected)
- @hashlib_helper.requires_hashdigest('sha256')
- def test_with_memoryview_msg(self):
- try:
- h = hmac.HMAC(b"key", memoryview(b"hash this!"), digestmod="sha256")
- except Exception:
- self.fail("Constructor call with memoryview msg raised exception.")
- self.assertEqual(h.hexdigest(), self.expected)
- @hashlib_helper.requires_hashdigest('sha256')
- def test_withmodule(self):
- # Constructor call with text and digest module.
- try:
- h = hmac.HMAC(b"key", b"", hashlib.sha256)
- except Exception:
- self.fail("Constructor call with hashlib.sha256 raised exception.")
- @unittest.skipUnless(C_HMAC is not None, 'need _hashlib')
- def test_internal_types(self):
- # internal types like _hashlib.C_HMAC are not constructable
- check_disallow_instantiation(self, C_HMAC)
- with self.assertRaisesRegex(TypeError, "immutable type"):
- C_HMAC.value = None
- @unittest.skipUnless(sha256_module is not None, 'need _sha256')
- def test_with_sha256_module(self):
- h = hmac.HMAC(b"key", b"hash this!", digestmod=sha256_module.sha256)
- self.assertEqual(h.hexdigest(), self.expected)
- self.assertEqual(h.name, "hmac-sha256")
- digest = hmac.digest(b"key", b"hash this!", sha256_module.sha256)
- self.assertEqual(digest, binascii.unhexlify(self.expected))
- class SanityTestCase(unittest.TestCase):
- @hashlib_helper.requires_hashdigest('sha256')
- def test_exercise_all_methods(self):
- # Exercising all methods once.
- # This must not raise any exceptions
- try:
- h = hmac.HMAC(b"my secret key", digestmod="sha256")
- h.update(b"compute the hash of this text!")
- h.digest()
- h.hexdigest()
- h.copy()
- except Exception:
- self.fail("Exception raised during normal usage of HMAC class.")
- class CopyTestCase(unittest.TestCase):
- @hashlib_helper.requires_hashdigest('sha256')
- def test_attributes_old(self):
- # Testing if attributes are of same type.
- h1 = hmac.HMAC.__new__(hmac.HMAC)
- h1._init_old(b"key", b"msg", digestmod="sha256")
- h2 = h1.copy()
- self.assertEqual(type(h1._inner), type(h2._inner),
- "Types of inner don't match.")
- self.assertEqual(type(h1._outer), type(h2._outer),
- "Types of outer don't match.")
- @hashlib_helper.requires_hashdigest('sha256')
- def test_realcopy_old(self):
- # Testing if the copy method created a real copy.
- h1 = hmac.HMAC.__new__(hmac.HMAC)
- h1._init_old(b"key", b"msg", digestmod="sha256")
- h2 = h1.copy()
- # Using id() in case somebody has overridden __eq__/__ne__.
- self.assertTrue(id(h1) != id(h2), "No real copy of the HMAC instance.")
- self.assertTrue(id(h1._inner) != id(h2._inner),
- "No real copy of the attribute 'inner'.")
- self.assertTrue(id(h1._outer) != id(h2._outer),
- "No real copy of the attribute 'outer'.")
- self.assertIs(h1._hmac, None)
- @unittest.skipIf(_hashopenssl is None, "test requires _hashopenssl")
- @hashlib_helper.requires_hashdigest('sha256')
- def test_realcopy_hmac(self):
- h1 = hmac.HMAC.__new__(hmac.HMAC)
- h1._init_hmac(b"key", b"msg", digestmod="sha256")
- h2 = h1.copy()
- self.assertTrue(id(h1._hmac) != id(h2._hmac))
- @hashlib_helper.requires_hashdigest('sha256')
- def test_equality(self):
- # Testing if the copy has the same digests.
- h1 = hmac.HMAC(b"key", digestmod="sha256")
- h1.update(b"some random text")
- h2 = h1.copy()
- self.assertEqual(h1.digest(), h2.digest(),
- "Digest of copy doesn't match original digest.")
- self.assertEqual(h1.hexdigest(), h2.hexdigest(),
- "Hexdigest of copy doesn't match original hexdigest.")
- @hashlib_helper.requires_hashdigest('sha256')
- def test_equality_new(self):
- # Testing if the copy has the same digests with hmac.new().
- h1 = hmac.new(b"key", digestmod="sha256")
- h1.update(b"some random text")
- h2 = h1.copy()
- self.assertTrue(
- id(h1) != id(h2), "No real copy of the HMAC instance."
- )
- self.assertEqual(h1.digest(), h2.digest(),
- "Digest of copy doesn't match original digest.")
- self.assertEqual(h1.hexdigest(), h2.hexdigest(),
- "Hexdigest of copy doesn't match original hexdigest.")
- class CompareDigestTestCase(unittest.TestCase):
- def test_hmac_compare_digest(self):
- self._test_compare_digest(hmac.compare_digest)
- if openssl_compare_digest is not None:
- self.assertIs(hmac.compare_digest, openssl_compare_digest)
- else:
- self.assertIs(hmac.compare_digest, operator_compare_digest)
- def test_operator_compare_digest(self):
- self._test_compare_digest(operator_compare_digest)
- @unittest.skipIf(openssl_compare_digest is None, "test requires _hashlib")
- def test_openssl_compare_digest(self):
- self._test_compare_digest(openssl_compare_digest)
- def _test_compare_digest(self, compare_digest):
- # Testing input type exception handling
- a, b = 100, 200
- self.assertRaises(TypeError, compare_digest, a, b)
- a, b = 100, b"foobar"
- self.assertRaises(TypeError, compare_digest, a, b)
- a, b = b"foobar", 200
- self.assertRaises(TypeError, compare_digest, a, b)
- a, b = "foobar", b"foobar"
- self.assertRaises(TypeError, compare_digest, a, b)
- a, b = b"foobar", "foobar"
- self.assertRaises(TypeError, compare_digest, a, b)
- # Testing bytes of different lengths
- a, b = b"foobar", b"foo"
- self.assertFalse(compare_digest(a, b))
- a, b = b"\xde\xad\xbe\xef", b"\xde\xad"
- self.assertFalse(compare_digest(a, b))
- # Testing bytes of same lengths, different values
- a, b = b"foobar", b"foobaz"
- self.assertFalse(compare_digest(a, b))
- a, b = b"\xde\xad\xbe\xef", b"\xab\xad\x1d\xea"
- self.assertFalse(compare_digest(a, b))
- # Testing bytes of same lengths, same values
- a, b = b"foobar", b"foobar"
- self.assertTrue(compare_digest(a, b))
- a, b = b"\xde\xad\xbe\xef", b"\xde\xad\xbe\xef"
- self.assertTrue(compare_digest(a, b))
- # Testing bytearrays of same lengths, same values
- a, b = bytearray(b"foobar"), bytearray(b"foobar")
- self.assertTrue(compare_digest(a, b))
- # Testing bytearrays of different lengths
- a, b = bytearray(b"foobar"), bytearray(b"foo")
- self.assertFalse(compare_digest(a, b))
- # Testing bytearrays of same lengths, different values
- a, b = bytearray(b"foobar"), bytearray(b"foobaz")
- self.assertFalse(compare_digest(a, b))
- # Testing byte and bytearray of same lengths, same values
- a, b = bytearray(b"foobar"), b"foobar"
- self.assertTrue(compare_digest(a, b))
- self.assertTrue(compare_digest(b, a))
- # Testing byte bytearray of different lengths
- a, b = bytearray(b"foobar"), b"foo"
- self.assertFalse(compare_digest(a, b))
- self.assertFalse(compare_digest(b, a))
- # Testing byte and bytearray of same lengths, different values
- a, b = bytearray(b"foobar"), b"foobaz"
- self.assertFalse(compare_digest(a, b))
- self.assertFalse(compare_digest(b, a))
- # Testing str of same lengths
- a, b = "foobar", "foobar"
- self.assertTrue(compare_digest(a, b))
- # Testing str of different lengths
- a, b = "foo", "foobar"
- self.assertFalse(compare_digest(a, b))
- # Testing bytes of same lengths, different values
- a, b = "foobar", "foobaz"
- self.assertFalse(compare_digest(a, b))
- # Testing error cases
- a, b = "foobar", b"foobar"
- self.assertRaises(TypeError, compare_digest, a, b)
- a, b = b"foobar", "foobar"
- self.assertRaises(TypeError, compare_digest, a, b)
- a, b = b"foobar", 1
- self.assertRaises(TypeError, compare_digest, a, b)
- a, b = 100, 200
- self.assertRaises(TypeError, compare_digest, a, b)
- a, b = "fooä", "fooä"
- self.assertRaises(TypeError, compare_digest, a, b)
- # subclasses are supported by ignore __eq__
- class mystr(str):
- def __eq__(self, other):
- return False
- a, b = mystr("foobar"), mystr("foobar")
- self.assertTrue(compare_digest(a, b))
- a, b = mystr("foobar"), "foobar"
- self.assertTrue(compare_digest(a, b))
- a, b = mystr("foobar"), mystr("foobaz")
- self.assertFalse(compare_digest(a, b))
- class mybytes(bytes):
- def __eq__(self, other):
- return False
- a, b = mybytes(b"foobar"), mybytes(b"foobar")
- self.assertTrue(compare_digest(a, b))
- a, b = mybytes(b"foobar"), b"foobar"
- self.assertTrue(compare_digest(a, b))
- a, b = mybytes(b"foobar"), mybytes(b"foobaz")
- self.assertFalse(compare_digest(a, b))
- if __name__ == "__main__":
- unittest.main()
|