mirror of https://github.com/pyodide/pyodide.git
584 lines
18 KiB
Python
584 lines
18 KiB
Python
import pytest
|
|
from pytest_pyodide import run_in_pyodide
|
|
|
|
_test_vectors = [
|
|
(
|
|
b"Kk4DQuMMfZL9o",
|
|
b"$2b$04$cVWp4XaNU8a4v1uMRum2SO",
|
|
b"$2b$04$cVWp4XaNU8a4v1uMRum2SO026BWLIoQMD/TXg5uZV.0P.uO8m3YEm",
|
|
),
|
|
(
|
|
b"9IeRXmnGxMYbs",
|
|
b"$2b$04$pQ7gRO7e6wx/936oXhNjrO",
|
|
b"$2b$04$pQ7gRO7e6wx/936oXhNjrOUNOHL1D0h1N2IDbJZYs.1ppzSof6SPy",
|
|
),
|
|
(
|
|
b"xVQVbwa1S0M8r",
|
|
b"$2b$04$SQe9knOzepOVKoYXo9xTte",
|
|
b"$2b$04$SQe9knOzepOVKoYXo9xTteNYr6MBwVz4tpriJVe3PNgYufGIsgKcW",
|
|
),
|
|
(
|
|
b"Zfgr26LWd22Za",
|
|
b"$2b$04$eH8zX.q5Q.j2hO1NkVYJQO",
|
|
b"$2b$04$eH8zX.q5Q.j2hO1NkVYJQOM6KxntS/ow3.YzVmFrE4t//CoF4fvne",
|
|
),
|
|
(
|
|
b"Tg4daC27epFBE",
|
|
b"$2b$04$ahiTdwRXpUG2JLRcIznxc.",
|
|
b"$2b$04$ahiTdwRXpUG2JLRcIznxc.s1.ydaPGD372bsGs8NqyYjLY1inG5n2",
|
|
),
|
|
(
|
|
b"xhQPMmwh5ALzW",
|
|
b"$2b$04$nQn78dV0hGHf5wUBe0zOFu",
|
|
b"$2b$04$nQn78dV0hGHf5wUBe0zOFu8n07ZbWWOKoGasZKRspZxtt.vBRNMIy",
|
|
),
|
|
(
|
|
b"59je8h5Gj71tg",
|
|
b"$2b$04$cvXudZ5ugTg95W.rOjMITu",
|
|
b"$2b$04$cvXudZ5ugTg95W.rOjMITuM1jC0piCl3zF5cmGhzCibHZrNHkmckG",
|
|
),
|
|
(
|
|
b"wT4fHJa2N9WSW",
|
|
b"$2b$04$YYjtiq4Uh88yUsExO0RNTu",
|
|
b"$2b$04$YYjtiq4Uh88yUsExO0RNTuEJ.tZlsONac16A8OcLHleWFjVawfGvO",
|
|
),
|
|
(
|
|
b"uSgFRnQdOgm4S",
|
|
b"$2b$04$WLTjgY/pZSyqX/fbMbJzf.",
|
|
b"$2b$04$WLTjgY/pZSyqX/fbMbJzf.qxCeTMQOzgL.CimRjMHtMxd/VGKojMu",
|
|
),
|
|
(
|
|
b"tEPtJZXur16Vg",
|
|
b"$2b$04$2moPs/x/wnCfeQ5pCheMcu",
|
|
b"$2b$04$2moPs/x/wnCfeQ5pCheMcuSJQ/KYjOZG780UjA/SiR.KsYWNrC7SG",
|
|
),
|
|
(
|
|
b"vvho8C6nlVf9K",
|
|
b"$2b$04$HrEYC/AQ2HS77G78cQDZQ.",
|
|
b"$2b$04$HrEYC/AQ2HS77G78cQDZQ.r44WGcruKw03KHlnp71yVQEwpsi3xl2",
|
|
),
|
|
(
|
|
b"5auCCY9by0Ruf",
|
|
b"$2b$04$vVYgSTfB8KVbmhbZE/k3R.",
|
|
b"$2b$04$vVYgSTfB8KVbmhbZE/k3R.ux9A0lJUM4CZwCkHI9fifke2.rTF7MG",
|
|
),
|
|
(
|
|
b"GtTkR6qn2QOZW",
|
|
b"$2b$04$JfoNrR8.doieoI8..F.C1O",
|
|
b"$2b$04$JfoNrR8.doieoI8..F.C1OQgwE3uTeuardy6lw0AjALUzOARoyf2m",
|
|
),
|
|
(
|
|
b"zKo8vdFSnjX0f",
|
|
b"$2b$04$HP3I0PUs7KBEzMBNFw7o3O",
|
|
b"$2b$04$HP3I0PUs7KBEzMBNFw7o3O7f/uxaZU7aaDot1quHMgB2yrwBXsgyy",
|
|
),
|
|
(
|
|
b"I9VfYlacJiwiK",
|
|
b"$2b$04$xnFVhJsTzsFBTeP3PpgbMe",
|
|
b"$2b$04$xnFVhJsTzsFBTeP3PpgbMeMREb6rdKV9faW54Sx.yg9plf4jY8qT6",
|
|
),
|
|
(
|
|
b"VFPO7YXnHQbQO",
|
|
b"$2b$04$WQp9.igoLqVr6Qk70mz6xu",
|
|
b"$2b$04$WQp9.igoLqVr6Qk70mz6xuRxE0RttVXXdukpR9N54x17ecad34ZF6",
|
|
),
|
|
(
|
|
b"VDx5BdxfxstYk",
|
|
b"$2b$04$xgZtlonpAHSU/njOCdKztO",
|
|
b"$2b$04$xgZtlonpAHSU/njOCdKztOPuPFzCNVpB4LGicO4/OGgHv.uKHkwsS",
|
|
),
|
|
(
|
|
b"dEe6XfVGrrfSH",
|
|
b"$2b$04$2Siw3Nv3Q/gTOIPetAyPr.",
|
|
b"$2b$04$2Siw3Nv3Q/gTOIPetAyPr.GNj3aO0lb1E5E9UumYGKjP9BYqlNWJe",
|
|
),
|
|
(
|
|
b"cTT0EAFdwJiLn",
|
|
b"$2b$04$7/Qj7Kd8BcSahPO4khB8me",
|
|
b"$2b$04$7/Qj7Kd8BcSahPO4khB8me4ssDJCW3r4OGYqPF87jxtrSyPj5cS5m",
|
|
),
|
|
(
|
|
b"J8eHUDuxBB520",
|
|
b"$2b$04$VvlCUKbTMjaxaYJ.k5juoe",
|
|
b"$2b$04$VvlCUKbTMjaxaYJ.k5juoecpG/7IzcH1AkmqKi.lIZMVIOLClWAk.",
|
|
),
|
|
(
|
|
b"U*U",
|
|
b"$2a$05$CCCCCCCCCCCCCCCCCCCCC.",
|
|
b"$2a$05$CCCCCCCCCCCCCCCCCCCCC.E5YPO9kmyuRGyh0XouQYb4YMJKvyOeW",
|
|
),
|
|
(
|
|
b"U*U*",
|
|
b"$2a$05$CCCCCCCCCCCCCCCCCCCCC.",
|
|
b"$2a$05$CCCCCCCCCCCCCCCCCCCCC.VGOzA784oUp/Z0DY336zx7pLYAy0lwK",
|
|
),
|
|
(
|
|
b"U*U*U",
|
|
b"$2a$05$XXXXXXXXXXXXXXXXXXXXXO",
|
|
b"$2a$05$XXXXXXXXXXXXXXXXXXXXXOAcXxm9kjPGEMsLznoKqmqw7tc8WCx4a",
|
|
),
|
|
(
|
|
b"0123456789abcdefghijklmnopqrstuvwxyz"
|
|
b"ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"
|
|
b"chars after 72 are ignored",
|
|
b"$2a$05$abcdefghijklmnopqrstuu",
|
|
b"$2a$05$abcdefghijklmnopqrstuu5s2v8.iXieOjg/.AySBTTZIIVFJeBui",
|
|
),
|
|
(
|
|
b"\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
|
|
b"\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
|
|
b"\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
|
|
b"\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
|
|
b"\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
|
|
b"\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
|
|
b"chars after 72 are ignored as usual",
|
|
b"$2a$05$/OK.fbVrR/bpIqNJ5ianF.",
|
|
b"$2a$05$/OK.fbVrR/bpIqNJ5ianF.swQOIzjOiJ9GHEPuhEkvqrUyvWhEMx6",
|
|
),
|
|
(
|
|
b"\xa3",
|
|
b"$2a$05$/OK.fbVrR/bpIqNJ5ianF.",
|
|
b"$2a$05$/OK.fbVrR/bpIqNJ5ianF.Sa7shbm4.OzKpvFnX1pQLmQW96oUlCq",
|
|
),
|
|
(
|
|
b"}>\xb3\xfe\xf1\x8b\xa0\xe6(\xa2Lzq\xc3P\x7f\xcc\xc8b{\xf9\x14\xf6"
|
|
b"\xf6`\x81G5\xec\x1d\x87\x10\xbf\xa7\xe1}I7 \x96\xdfc\xf2\xbf\xb3Vh"
|
|
b"\xdfM\x88q\xf7\xff\x1b\x82~z\x13\xdd\xe9\x84\x00\xdd4",
|
|
b"$2b$10$keO.ZZs22YtygVF6BLfhGO",
|
|
b"$2b$10$keO.ZZs22YtygVF6BLfhGOI/JjshJYPp8DZsUtym6mJV2Eha2Hdd.",
|
|
),
|
|
(
|
|
b"g7\r\x01\xf3\xd4\xd0\xa9JB^\x18\x007P\xb2N\xc7\x1c\xee\x87&\x83C"
|
|
b"\x8b\xe8\x18\xc5>\x86\x14/\xd6\xcc\x1cJ\xde\xd7ix\xeb\xdeO\xef"
|
|
b"\xe1i\xac\xcb\x03\x96v1' \xd6@.m\xa5!\xa0\xef\xc0(",
|
|
b"$2a$04$tecY.9ylRInW/rAAzXCXPO",
|
|
b"$2a$04$tecY.9ylRInW/rAAzXCXPOOlyYeCNzmNTzPDNSIFztFMKbvs/s5XG",
|
|
),
|
|
]
|
|
|
|
_2y_test_vectors = [
|
|
(
|
|
b"\xa3",
|
|
b"$2y$05$/OK.fbVrR/bpIqNJ5ianF.Sa7shbm4.OzKpvFnX1pQLmQW96oUlCq",
|
|
b"$2y$05$/OK.fbVrR/bpIqNJ5ianF.Sa7shbm4.OzKpvFnX1pQLmQW96oUlCq",
|
|
),
|
|
(
|
|
b"\xff\xff\xa3",
|
|
b"$2y$05$/OK.fbVrR/bpIqNJ5ianF.CE5elHaaO4EbggVDjb8P19RukzXSM3e",
|
|
b"$2y$05$/OK.fbVrR/bpIqNJ5ianF.CE5elHaaO4EbggVDjb8P19RukzXSM3e",
|
|
),
|
|
]
|
|
|
|
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_gensalt_basic(selenium, monkeypatch):
|
|
import bcrypt
|
|
|
|
salt = bcrypt.gensalt()
|
|
assert salt.startswith(b"$2b$12$")
|
|
|
|
|
|
@pytest.mark.parametrize(
|
|
("rounds", "expected_prefix"),
|
|
[
|
|
(4, b"$2b$04$"),
|
|
(5, b"$2b$05$"),
|
|
(6, b"$2b$06$"),
|
|
(7, b"$2b$07$"),
|
|
(8, b"$2b$08$"),
|
|
(9, b"$2b$09$"),
|
|
(10, b"$2b$10$"),
|
|
(11, b"$2b$11$"),
|
|
(12, b"$2b$12$"),
|
|
(13, b"$2b$13$"),
|
|
(14, b"$2b$14$"),
|
|
(15, b"$2b$15$"),
|
|
(16, b"$2b$16$"),
|
|
(17, b"$2b$17$"),
|
|
(18, b"$2b$18$"),
|
|
(19, b"$2b$19$"),
|
|
(20, b"$2b$20$"),
|
|
(21, b"$2b$21$"),
|
|
(22, b"$2b$22$"),
|
|
(23, b"$2b$23$"),
|
|
(24, b"$2b$24$"),
|
|
],
|
|
)
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_gensalt_rounds_valid(selenium, rounds, expected_prefix):
|
|
import bcrypt
|
|
|
|
salt = bcrypt.gensalt(rounds)
|
|
|
|
assert salt.startswith(expected_prefix)
|
|
|
|
|
|
@pytest.mark.parametrize("rounds", list(range(1, 4)))
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_gensalt_rounds_invalid(selenium, rounds):
|
|
import bcrypt
|
|
import pytest
|
|
|
|
with pytest.raises(ValueError):
|
|
bcrypt.gensalt(rounds)
|
|
|
|
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_gensalt_bad_prefix(selenium):
|
|
import bcrypt
|
|
import pytest
|
|
|
|
with pytest.raises(ValueError):
|
|
bcrypt.gensalt(prefix=b"bad")
|
|
|
|
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_gensalt_2a_prefix(selenium):
|
|
import bcrypt
|
|
|
|
salt = bcrypt.gensalt(prefix=b"2a")
|
|
assert salt.startswith(b"$2a$12$")
|
|
|
|
|
|
@pytest.mark.parametrize(("password", "salt", "hashed"), _test_vectors)
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_hashpw_new(selenium, password, salt, hashed):
|
|
import bcrypt
|
|
|
|
assert bcrypt.hashpw(password, salt) == hashed
|
|
|
|
|
|
@pytest.mark.parametrize(("password", "salt", "hashed"), _test_vectors)
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_checkpw(selenium, password, salt, hashed):
|
|
import bcrypt
|
|
|
|
assert bcrypt.checkpw(password, hashed) is True
|
|
|
|
|
|
@pytest.mark.parametrize(("password", "salt", "hashed"), _test_vectors)
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_hashpw_existing(selenium, password, salt, hashed):
|
|
import bcrypt
|
|
|
|
assert bcrypt.hashpw(password, hashed) == hashed
|
|
|
|
|
|
@pytest.mark.parametrize(("password", "hashed", "expected"), _2y_test_vectors)
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_hashpw_2y_prefix(selenium, password, hashed, expected):
|
|
import bcrypt
|
|
|
|
assert bcrypt.hashpw(password, hashed) == expected
|
|
|
|
|
|
@pytest.mark.parametrize(("password", "hashed", "expected"), _2y_test_vectors)
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_checkpw_2y_prefix(selenium, password, hashed, expected):
|
|
import bcrypt
|
|
|
|
assert bcrypt.checkpw(password, hashed) is True
|
|
|
|
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_hashpw_invalid(selenium):
|
|
import bcrypt
|
|
import pytest
|
|
|
|
with pytest.raises(ValueError):
|
|
bcrypt.hashpw(b"password", b"$2z$04$cVWp4XaNU8a4v1uMRum2SO")
|
|
|
|
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_checkpw_wrong_password(selenium):
|
|
import bcrypt
|
|
|
|
assert (
|
|
bcrypt.checkpw(
|
|
b"badpass",
|
|
b"$2b$04$2Siw3Nv3Q/gTOIPetAyPr.GNj3aO0lb1E5E9UumYGKjP9BYqlNWJe",
|
|
)
|
|
is False
|
|
)
|
|
|
|
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_checkpw_bad_salt(selenium):
|
|
import bcrypt
|
|
import pytest
|
|
|
|
with pytest.raises(ValueError):
|
|
bcrypt.checkpw(
|
|
b"badpass",
|
|
b"$2b$04$?Siw3Nv3Q/gTOIPetAyPr.GNj3aO0lb1E5E9UumYGKjP9BYqlNWJe",
|
|
)
|
|
with pytest.raises(ValueError):
|
|
bcrypt.checkpw(
|
|
b"password",
|
|
b"$2b$3$mdEQPMOtfPX.WGZNXgF66OhmBlOGKEd66SQ7DyJPGucYYmvTJYviy",
|
|
)
|
|
|
|
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_checkpw_str_password(selenium):
|
|
import bcrypt
|
|
import pytest
|
|
|
|
with pytest.raises(TypeError):
|
|
bcrypt.checkpw("password", b"$2b$04$cVWp4XaNU8a4v1uMRum2SO")
|
|
|
|
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_checkpw_str_salt(selenium):
|
|
import bcrypt
|
|
import pytest
|
|
|
|
with pytest.raises(TypeError):
|
|
bcrypt.checkpw(b"password", "$2b$04$cVWp4XaNU8a4v1uMRum2SO")
|
|
|
|
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_hashpw_str_password(selenium):
|
|
import bcrypt
|
|
import pytest
|
|
|
|
with pytest.raises(TypeError):
|
|
bcrypt.hashpw("password", b"$2b$04$cVWp4XaNU8a4v1uMRum2SO")
|
|
|
|
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_hashpw_str_salt(selenium):
|
|
import bcrypt
|
|
import pytest
|
|
|
|
with pytest.raises(TypeError):
|
|
bcrypt.hashpw(b"password", "$2b$04$cVWp4XaNU8a4v1uMRum2SO")
|
|
|
|
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_checkpw_nul_byte(selenium):
|
|
import bcrypt
|
|
import pytest
|
|
|
|
bcrypt.checkpw(
|
|
b"abc\0def",
|
|
b"$2b$04$2Siw3Nv3Q/gTOIPetAyPr.GNj3aO0lb1E5E9UumYGKjP9BYqlNWJe",
|
|
)
|
|
|
|
with pytest.raises(ValueError):
|
|
bcrypt.checkpw(
|
|
b"abcdef",
|
|
b"$2b$04$2S\0w3Nv3Q/gTOIPetAyPr.GNj3aO0lb1E5E9UumYGKjP9BYqlNWJe",
|
|
)
|
|
|
|
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_hashpw_nul_byte(selenium):
|
|
import bcrypt
|
|
|
|
salt = bcrypt.gensalt(4)
|
|
hashed = bcrypt.hashpw(b"abc\0def", salt)
|
|
assert bcrypt.checkpw(b"abc\0def", hashed)
|
|
# assert that we are sensitive to changes in the password after the first
|
|
# null byte:
|
|
assert not bcrypt.checkpw(b"abc\0deg", hashed)
|
|
assert not bcrypt.checkpw(b"abc\0def\0", hashed)
|
|
assert not bcrypt.checkpw(b"abc\0def\0\0", hashed)
|
|
|
|
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_checkpw_extra_data(selenium):
|
|
import bcrypt
|
|
|
|
salt = bcrypt.gensalt(4)
|
|
hashed = bcrypt.hashpw(b"abc", salt)
|
|
|
|
assert bcrypt.checkpw(b"abc", hashed)
|
|
assert bcrypt.checkpw(b"abc", hashed + b"extra") is False
|
|
assert bcrypt.checkpw(b"abc", hashed[:-10]) is False
|
|
|
|
|
|
@pytest.mark.parametrize(
|
|
("rounds", "password", "salt", "expected"),
|
|
[
|
|
[
|
|
4,
|
|
b"password",
|
|
b"salt",
|
|
b"\x5b\xbf\x0c\xc2\x93\x58\x7f\x1c\x36\x35\x55\x5c\x27\x79\x65\x98"
|
|
b"\xd4\x7e\x57\x90\x71\xbf\x42\x7e\x9d\x8f\xbe\x84\x2a\xba\x34\xd9",
|
|
],
|
|
[
|
|
4,
|
|
b"password",
|
|
b"\x00",
|
|
b"\xc1\x2b\x56\x62\x35\xee\xe0\x4c\x21\x25\x98\x97\x0a\x57\x9a\x67",
|
|
],
|
|
[
|
|
4,
|
|
b"\x00",
|
|
b"salt",
|
|
b"\x60\x51\xbe\x18\xc2\xf4\xf8\x2c\xbf\x0e\xfe\xe5\x47\x1b\x4b\xb9",
|
|
],
|
|
[
|
|
# nul bytes in password and string
|
|
4,
|
|
b"password\x00",
|
|
b"salt\x00",
|
|
b"\x74\x10\xe4\x4c\xf4\xfa\x07\xbf\xaa\xc8\xa9\x28\xb1\x72\x7f\xac"
|
|
b"\x00\x13\x75\xe7\xbf\x73\x84\x37\x0f\x48\xef\xd1\x21\x74\x30\x50",
|
|
],
|
|
[
|
|
4,
|
|
b"pass\x00wor",
|
|
b"sa\0l",
|
|
b"\xc2\xbf\xfd\x9d\xb3\x8f\x65\x69\xef\xef\x43\x72\xf4\xde\x83\xc0",
|
|
],
|
|
[
|
|
4,
|
|
b"pass\x00word",
|
|
b"sa\0lt",
|
|
b"\x4b\xa4\xac\x39\x25\xc0\xe8\xd7\xf0\xcd\xb6\xbb\x16\x84\xa5\x6f",
|
|
],
|
|
[
|
|
# bigger key
|
|
8,
|
|
b"password",
|
|
b"salt",
|
|
b"\xe1\x36\x7e\xc5\x15\x1a\x33\xfa\xac\x4c\xc1\xc1\x44\xcd\x23\xfa"
|
|
b"\x15\xd5\x54\x84\x93\xec\xc9\x9b\x9b\x5d\x9c\x0d\x3b\x27\xbe\xc7"
|
|
b"\x62\x27\xea\x66\x08\x8b\x84\x9b\x20\xab\x7a\xa4\x78\x01\x02\x46"
|
|
b"\xe7\x4b\xba\x51\x72\x3f\xef\xa9\xf9\x47\x4d\x65\x08\x84\x5e\x8d",
|
|
],
|
|
[
|
|
# more rounds
|
|
42,
|
|
b"password",
|
|
b"salt",
|
|
b"\x83\x3c\xf0\xdc\xf5\x6d\xb6\x56\x08\xe8\xf0\xdc\x0c\xe8\x82\xbd",
|
|
],
|
|
[
|
|
# longer password
|
|
8,
|
|
b"Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do"
|
|
b" eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut "
|
|
b"enim ad minim veniam, quis nostrud exercitation ullamco laboris "
|
|
b"nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor "
|
|
b"in reprehenderit in voluptate velit esse cillum dolore eu fugiat"
|
|
b" nulla pariatur. Excepteur sint occaecat cupidatat non proident,"
|
|
b" sunt in culpa qui officia deserunt mollit anim id est laborum.",
|
|
b"salis\x00",
|
|
b"\x10\x97\x8b\x07\x25\x3d\xf5\x7f\x71\xa1\x62\xeb\x0e\x8a\xd3\x0a",
|
|
],
|
|
[
|
|
# "unicode"
|
|
8,
|
|
b"\x0d\xb3\xac\x94\xb3\xee\x53\x28\x4f\x4a\x22\x89\x3b\x3c\x24\xae",
|
|
b"\x3a\x62\xf0\xf0\xdb\xce\xf8\x23\xcf\xcc\x85\x48\x56\xea\x10\x28",
|
|
b"\x20\x44\x38\x17\x5e\xee\x7c\xe1\x36\xc9\x1b\x49\xa6\x79\x23\xff",
|
|
],
|
|
[
|
|
# very large key
|
|
8,
|
|
b"\x0d\xb3\xac\x94\xb3\xee\x53\x28\x4f\x4a\x22\x89\x3b\x3c\x24\xae",
|
|
b"\x3a\x62\xf0\xf0\xdb\xce\xf8\x23\xcf\xcc\x85\x48\x56\xea\x10\x28",
|
|
b"\x20\x54\xb9\xff\xf3\x4e\x37\x21\x44\x03\x34\x74\x68\x28\xe9\xed"
|
|
b"\x38\xde\x4b\x72\xe0\xa6\x9a\xdc\x17\x0a\x13\xb5\xe8\xd6\x46\x38"
|
|
b"\x5e\xa4\x03\x4a\xe6\xd2\x66\x00\xee\x23\x32\xc5\xed\x40\xad\x55"
|
|
b"\x7c\x86\xe3\x40\x3f\xbb\x30\xe4\xe1\xdc\x1a\xe0\x6b\x99\xa0\x71"
|
|
b"\x36\x8f\x51\x8d\x2c\x42\x66\x51\xc9\xe7\xe4\x37\xfd\x6c\x91\x5b"
|
|
b"\x1b\xbf\xc3\xa4\xce\xa7\x14\x91\x49\x0e\xa7\xaf\xb7\xdd\x02\x90"
|
|
b"\xa6\x78\xa4\xf4\x41\x12\x8d\xb1\x79\x2e\xab\x27\x76\xb2\x1e\xb4"
|
|
b"\x23\x8e\x07\x15\xad\xd4\x12\x7d\xff\x44\xe4\xb3\xe4\xcc\x4c\x4f"
|
|
b"\x99\x70\x08\x3f\x3f\x74\xbd\x69\x88\x73\xfd\xf6\x48\x84\x4f\x75"
|
|
b"\xc9\xbf\x7f\x9e\x0c\x4d\x9e\x5d\x89\xa7\x78\x39\x97\x49\x29\x66"
|
|
b"\x61\x67\x07\x61\x1c\xb9\x01\xde\x31\xa1\x97\x26\xb6\xe0\x8c\x3a"
|
|
b"\x80\x01\x66\x1f\x2d\x5c\x9d\xcc\x33\xb4\xaa\x07\x2f\x90\xdd\x0b"
|
|
b"\x3f\x54\x8d\x5e\xeb\xa4\x21\x13\x97\xe2\xfb\x06\x2e\x52\x6e\x1d"
|
|
b"\x68\xf4\x6a\x4c\xe2\x56\x18\x5b\x4b\xad\xc2\x68\x5f\xbe\x78\xe1"
|
|
b"\xc7\x65\x7b\x59\xf8\x3a\xb9\xab\x80\xcf\x93\x18\xd6\xad\xd1\xf5"
|
|
b"\x93\x3f\x12\xd6\xf3\x61\x82\xc8\xe8\x11\x5f\x68\x03\x0a\x12\x44",
|
|
],
|
|
[
|
|
# UTF-8 Greek characters "odysseus" / "telemachos"
|
|
8,
|
|
b"\xe1\xbd\x88\xce\xb4\xcf\x85\xcf\x83\xcf\x83\xce\xb5\xcf\x8d\xcf\x82",
|
|
b"\xce\xa4\xce\xb7\xce\xbb\xce\xad\xce\xbc\xce\xb1\xcf\x87\xce\xbf"
|
|
b"\xcf\x82",
|
|
b"\x43\x66\x6c\x9b\x09\xef\x33\xed\x8c\x27\xe8\xe8\xf3\xe2\xd8\xe6",
|
|
],
|
|
],
|
|
)
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_kdf(selenium, rounds, password, salt, expected):
|
|
import bcrypt
|
|
|
|
derived = bcrypt.kdf(password, salt, len(expected), rounds, ignore_few_rounds=True)
|
|
assert derived == expected
|
|
|
|
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_kdf_str_password(selenium):
|
|
import bcrypt
|
|
import pytest
|
|
|
|
with pytest.raises(TypeError):
|
|
bcrypt.kdf("password", b"$2b$04$cVWp4XaNU8a4v1uMRum2SO", 10, 10)
|
|
|
|
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_kdf_str_salt(selenium):
|
|
import bcrypt
|
|
import pytest
|
|
|
|
with pytest.raises(TypeError):
|
|
bcrypt.kdf(b"password", "salt", 10, 10)
|
|
|
|
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_kdf_no_warn_rounds(selenium):
|
|
import bcrypt
|
|
|
|
bcrypt.kdf(b"password", b"salt", 10, 10, True)
|
|
|
|
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_kdf_warn_rounds(selenium):
|
|
import bcrypt
|
|
import pytest
|
|
|
|
with pytest.warns(UserWarning):
|
|
bcrypt.kdf(b"password", b"salt", 10, 10)
|
|
|
|
|
|
@pytest.mark.parametrize(
|
|
("password", "salt", "desired_key_bytes", "rounds", "error"),
|
|
[
|
|
("pass", b"$2b$04$cVWp4XaNU8a4v1uMRum2SO", 10, 10, TypeError),
|
|
(b"password", "salt", 10, 10, TypeError),
|
|
(b"", b"$2b$04$cVWp4XaNU8a4v1uMRum2SO", 10, 10, ValueError),
|
|
(b"password", b"", 10, 10, ValueError),
|
|
(b"password", b"$2b$04$cVWp4XaNU8a4v1uMRum2SO", 0, 10, ValueError),
|
|
(b"password", b"$2b$04$cVWp4XaNU8a4v1uMRum2SO", -3, 10, OverflowError),
|
|
(b"password", b"$2b$04$cVWp4XaNU8a4v1uMRum2SO", 513, 10, ValueError),
|
|
(b"password", b"$2b$04$cVWp4XaNU8a4v1uMRum2SO", 20, 0, ValueError),
|
|
],
|
|
)
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_invalid_params(selenium, password, salt, desired_key_bytes, rounds, error):
|
|
import bcrypt
|
|
import pytest
|
|
|
|
with pytest.raises(error):
|
|
bcrypt.kdf(password, salt, desired_key_bytes, rounds)
|
|
|
|
|
|
@run_in_pyodide(packages=["bcrypt"])
|
|
def test_2a_wraparound_bug(selenium):
|
|
import bcrypt
|
|
|
|
assert (
|
|
bcrypt.hashpw((b"0123456789" * 26)[:255], b"$2a$04$R1lJ2gkNaoPGdafE.H.16.")
|
|
== b"$2a$04$R1lJ2gkNaoPGdafE.H.16.1MKHPvmKwryeulRe225LKProWYwt9Oi"
|
|
)
|