blob: 23c108f6e3c27c5c5d388e305b13ece7aeb500b6 [file] [log] [blame]
Christian Heimes2f050c72018-01-27 09:53:43 +01001import binascii
Christian Heimes217f5c42013-11-24 23:14:16 +01002import functools
Guido van Rossumf1669942001-09-11 15:54:16 +00003import hmac
Guido van Rossuma19f80c2007-11-06 20:51:31 +00004import hashlib
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +00005import unittest
Christian Heimes2f050c72018-01-27 09:53:43 +01006import unittest.mock
Guido van Rossuma19f80c2007-11-06 20:51:31 +00007import warnings
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +00008
Christian Heimesc64a1a62019-09-25 16:30:20 +02009from test.support import requires_hashdigest
10
Christian Heimes217f5c42013-11-24 23:14:16 +010011
12def ignore_warning(func):
13 @functools.wraps(func)
14 def wrapper(*args, **kwargs):
15 with warnings.catch_warnings():
16 warnings.filterwarnings("ignore",
Matthias Bussonnier8bb0b5b2018-05-22 15:55:31 -070017 category=DeprecationWarning)
Christian Heimes217f5c42013-11-24 23:14:16 +010018 return func(*args, **kwargs)
19 return wrapper
20
21
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +000022class TestVectorsTestCase(unittest.TestCase):
Guido van Rossum7e8fdba2002-08-22 19:38:14 +000023
Christian Heimes90558152019-09-27 15:03:53 +020024 @requires_hashdigest('md5', openssl=True)
Jeremy Hylton893801e2003-05-27 16:16:41 +000025 def test_md5_vectors(self):
Guido van Rossum7e8fdba2002-08-22 19:38:14 +000026 # Test the HMAC module against test vectors from the RFC.
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +000027
28 def md5test(key, data, digest):
Christian Heimes634919a2013-11-20 17:23:06 +010029 h = hmac.HMAC(key, data, digestmod=hashlib.md5)
30 self.assertEqual(h.hexdigest().upper(), digest.upper())
Christian Heimes2f050c72018-01-27 09:53:43 +010031 self.assertEqual(h.digest(), binascii.unhexlify(digest))
Christian Heimesc4ab1102013-11-20 17:35:06 +010032 self.assertEqual(h.name, "hmac-md5")
33 self.assertEqual(h.digest_size, 16)
34 self.assertEqual(h.block_size, 64)
35
Christian Heimes634919a2013-11-20 17:23:06 +010036 h = hmac.HMAC(key, data, digestmod='md5')
Jeremy Hylton893801e2003-05-27 16:16:41 +000037 self.assertEqual(h.hexdigest().upper(), digest.upper())
Christian Heimes2f050c72018-01-27 09:53:43 +010038 self.assertEqual(h.digest(), binascii.unhexlify(digest))
Christian Heimesc4ab1102013-11-20 17:35:06 +010039 self.assertEqual(h.name, "hmac-md5")
40 self.assertEqual(h.digest_size, 16)
41 self.assertEqual(h.block_size, 64)
42
Christian Heimes2f050c72018-01-27 09:53:43 +010043 self.assertEqual(
44 hmac.digest(key, data, digest='md5'),
45 binascii.unhexlify(digest)
46 )
47 with unittest.mock.patch('hmac._openssl_md_meths', {}):
48 self.assertEqual(
49 hmac.digest(key, data, digest='md5'),
50 binascii.unhexlify(digest)
51 )
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +000052
Guido van Rossum3f429082007-07-10 13:35:52 +000053 md5test(b"\x0b" * 16,
54 b"Hi There",
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +000055 "9294727A3638BB1C13F48EF8158BFC9D")
56
Guido van Rossum3f429082007-07-10 13:35:52 +000057 md5test(b"Jefe",
58 b"what do ya want for nothing?",
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +000059 "750c783e6ab0b503eaa86e310a5db738")
60
Guido van Rossum3f429082007-07-10 13:35:52 +000061 md5test(b"\xaa" * 16,
62 b"\xdd" * 50,
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +000063 "56be34521d144c88dbb8c733f0e8b3f6")
64
Guido van Rossum39478e82007-08-27 17:23:59 +000065 md5test(bytes(range(1, 26)),
Guido van Rossum3f429082007-07-10 13:35:52 +000066 b"\xcd" * 50,
Jeremy Hylton893801e2003-05-27 16:16:41 +000067 "697eaf0aca3a3aea3a75164746ffaa79")
68
Guido van Rossum39478e82007-08-27 17:23:59 +000069 md5test(b"\x0C" * 16,
70 b"Test With Truncation",
Jeremy Hylton893801e2003-05-27 16:16:41 +000071 "56461ef2342edc00f9bab995690efd4c")
72
Guido van Rossum3f429082007-07-10 13:35:52 +000073 md5test(b"\xaa" * 80,
Guido van Rossum39478e82007-08-27 17:23:59 +000074 b"Test Using Larger Than Block-Size Key - Hash Key First",
Jeremy Hylton893801e2003-05-27 16:16:41 +000075 "6b1ab7fe4bd7bf8f0b62e6ce61b9d0cd")
76
Guido van Rossum3f429082007-07-10 13:35:52 +000077 md5test(b"\xaa" * 80,
Guido van Rossum39478e82007-08-27 17:23:59 +000078 (b"Test Using Larger Than Block-Size Key "
79 b"and Larger Than One Block-Size Data"),
Jeremy Hylton893801e2003-05-27 16:16:41 +000080 "6f630fad67cda0ee1fb1f562db3aa53e")
81
Christian Heimes90558152019-09-27 15:03:53 +020082 @requires_hashdigest('sha1', openssl=True)
Jeremy Hylton893801e2003-05-27 16:16:41 +000083 def test_sha_vectors(self):
84 def shatest(key, data, digest):
Guido van Rossuma19f80c2007-11-06 20:51:31 +000085 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
Jeremy Hylton893801e2003-05-27 16:16:41 +000086 self.assertEqual(h.hexdigest().upper(), digest.upper())
Christian Heimes2f050c72018-01-27 09:53:43 +010087 self.assertEqual(h.digest(), binascii.unhexlify(digest))
Christian Heimesc4ab1102013-11-20 17:35:06 +010088 self.assertEqual(h.name, "hmac-sha1")
89 self.assertEqual(h.digest_size, 20)
90 self.assertEqual(h.block_size, 64)
91
Christian Heimes634919a2013-11-20 17:23:06 +010092 h = hmac.HMAC(key, data, digestmod='sha1')
93 self.assertEqual(h.hexdigest().upper(), digest.upper())
Christian Heimes2f050c72018-01-27 09:53:43 +010094 self.assertEqual(h.digest(), binascii.unhexlify(digest))
Christian Heimesc4ab1102013-11-20 17:35:06 +010095 self.assertEqual(h.name, "hmac-sha1")
96 self.assertEqual(h.digest_size, 20)
97 self.assertEqual(h.block_size, 64)
Christian Heimes634919a2013-11-20 17:23:06 +010098
Christian Heimes2f050c72018-01-27 09:53:43 +010099 self.assertEqual(
100 hmac.digest(key, data, digest='sha1'),
101 binascii.unhexlify(digest)
102 )
103
Jeremy Hylton893801e2003-05-27 16:16:41 +0000104
Guido van Rossum3f429082007-07-10 13:35:52 +0000105 shatest(b"\x0b" * 20,
106 b"Hi There",
Jeremy Hylton893801e2003-05-27 16:16:41 +0000107 "b617318655057264e28bc0b6fb378c8ef146be00")
108
Guido van Rossum3f429082007-07-10 13:35:52 +0000109 shatest(b"Jefe",
110 b"what do ya want for nothing?",
Jeremy Hylton893801e2003-05-27 16:16:41 +0000111 "effcdf6ae5eb2fa2d27416d5f184df9c259a7c79")
112
Guido van Rossum3f429082007-07-10 13:35:52 +0000113 shatest(b"\xAA" * 20,
114 b"\xDD" * 50,
Jeremy Hylton893801e2003-05-27 16:16:41 +0000115 "125d7342b9ac11cd91a39af48aa17b4f63f175d3")
116
Guido van Rossum3f429082007-07-10 13:35:52 +0000117 shatest(bytes(range(1, 26)),
118 b"\xCD" * 50,
Jeremy Hylton893801e2003-05-27 16:16:41 +0000119 "4c9007f4026250c6bc8414f9bf50c86c2d7235da")
120
Guido van Rossum39478e82007-08-27 17:23:59 +0000121 shatest(b"\x0C" * 20,
122 b"Test With Truncation",
Jeremy Hylton893801e2003-05-27 16:16:41 +0000123 "4c1a03424b55e07fe7f27be1d58bb9324a9a5a04")
124
Guido van Rossum3f429082007-07-10 13:35:52 +0000125 shatest(b"\xAA" * 80,
126 b"Test Using Larger Than Block-Size Key - Hash Key First",
Jeremy Hylton893801e2003-05-27 16:16:41 +0000127 "aa4ae5e15272d00e95705637ce8a3b55ed402112")
128
Guido van Rossum3f429082007-07-10 13:35:52 +0000129 shatest(b"\xAA" * 80,
130 (b"Test Using Larger Than Block-Size Key "
131 b"and Larger Than One Block-Size Data"),
Jeremy Hylton893801e2003-05-27 16:16:41 +0000132 "e8e99d0f45237d786d6bbaa7965c7808bbff1a91")
133
Christian Heimesc4ab1102013-11-20 17:35:06 +0100134 def _rfc4231_test_cases(self, hashfunc, hash_name, digest_size, block_size):
Guido van Rossuma19f80c2007-11-06 20:51:31 +0000135 def hmactest(key, data, hexdigests):
Christian Heimesc4ab1102013-11-20 17:35:06 +0100136 hmac_name = "hmac-" + hash_name
Guido van Rossuma19f80c2007-11-06 20:51:31 +0000137 h = hmac.HMAC(key, data, digestmod=hashfunc)
138 self.assertEqual(h.hexdigest().lower(), hexdigests[hashfunc])
Christian Heimesc4ab1102013-11-20 17:35:06 +0100139 self.assertEqual(h.name, hmac_name)
140 self.assertEqual(h.digest_size, digest_size)
141 self.assertEqual(h.block_size, block_size)
142
143 h = hmac.HMAC(key, data, digestmod=hash_name)
Christian Heimes634919a2013-11-20 17:23:06 +0100144 self.assertEqual(h.hexdigest().lower(), hexdigests[hashfunc])
Christian Heimesc4ab1102013-11-20 17:35:06 +0100145 self.assertEqual(h.name, hmac_name)
146 self.assertEqual(h.digest_size, digest_size)
147 self.assertEqual(h.block_size, block_size)
Christian Heimes634919a2013-11-20 17:23:06 +0100148
Christian Heimes2f050c72018-01-27 09:53:43 +0100149 self.assertEqual(
150 hmac.digest(key, data, digest=hashfunc),
151 binascii.unhexlify(hexdigests[hashfunc])
152 )
153 self.assertEqual(
154 hmac.digest(key, data, digest=hash_name),
155 binascii.unhexlify(hexdigests[hashfunc])
156 )
157
158 with unittest.mock.patch('hmac._openssl_md_meths', {}):
159 self.assertEqual(
160 hmac.digest(key, data, digest=hashfunc),
161 binascii.unhexlify(hexdigests[hashfunc])
162 )
163 self.assertEqual(
164 hmac.digest(key, data, digest=hash_name),
165 binascii.unhexlify(hexdigests[hashfunc])
166 )
Guido van Rossuma19f80c2007-11-06 20:51:31 +0000167
168 # 4.2. Test Case 1
169 hmactest(key = b'\x0b'*20,
170 data = b'Hi There',
171 hexdigests = {
172 hashlib.sha224: '896fb1128abbdf196832107cd49df33f'
173 '47b4b1169912ba4f53684b22',
174 hashlib.sha256: 'b0344c61d8db38535ca8afceaf0bf12b'
175 '881dc200c9833da726e9376c2e32cff7',
176 hashlib.sha384: 'afd03944d84895626b0825f4ab46907f'
177 '15f9dadbe4101ec682aa034c7cebc59c'
178 'faea9ea9076ede7f4af152e8b2fa9cb6',
179 hashlib.sha512: '87aa7cdea5ef619d4ff0b4241a1d6cb0'
180 '2379f4e2ce4ec2787ad0b30545e17cde'
181 'daa833b7d6b8a702038b274eaea3f4e4'
182 'be9d914eeb61f1702e696c203a126854',
183 })
184
185 # 4.3. Test Case 2
186 hmactest(key = b'Jefe',
187 data = b'what do ya want for nothing?',
188 hexdigests = {
189 hashlib.sha224: 'a30e01098bc6dbbf45690f3a7e9e6d0f'
190 '8bbea2a39e6148008fd05e44',
191 hashlib.sha256: '5bdcc146bf60754e6a042426089575c7'
192 '5a003f089d2739839dec58b964ec3843',
193 hashlib.sha384: 'af45d2e376484031617f78d2b58a6b1b'
194 '9c7ef464f5a01b47e42ec3736322445e'
195 '8e2240ca5e69e2c78b3239ecfab21649',
196 hashlib.sha512: '164b7a7bfcf819e2e395fbe73b56e0a3'
197 '87bd64222e831fd610270cd7ea250554'
198 '9758bf75c05a994a6d034f65f8f0e6fd'
199 'caeab1a34d4a6b4b636e070a38bce737',
200 })
201
202 # 4.4. Test Case 3
203 hmactest(key = b'\xaa'*20,
204 data = b'\xdd'*50,
205 hexdigests = {
206 hashlib.sha224: '7fb3cb3588c6c1f6ffa9694d7d6ad264'
207 '9365b0c1f65d69d1ec8333ea',
208 hashlib.sha256: '773ea91e36800e46854db8ebd09181a7'
209 '2959098b3ef8c122d9635514ced565fe',
210 hashlib.sha384: '88062608d3e6ad8a0aa2ace014c8a86f'
211 '0aa635d947ac9febe83ef4e55966144b'
212 '2a5ab39dc13814b94e3ab6e101a34f27',
213 hashlib.sha512: 'fa73b0089d56a284efb0f0756c890be9'
214 'b1b5dbdd8ee81a3655f83e33b2279d39'
215 'bf3e848279a722c806b485a47e67c807'
216 'b946a337bee8942674278859e13292fb',
217 })
218
219 # 4.5. Test Case 4
220 hmactest(key = bytes(x for x in range(0x01, 0x19+1)),
221 data = b'\xcd'*50,
222 hexdigests = {
223 hashlib.sha224: '6c11506874013cac6a2abc1bb382627c'
224 'ec6a90d86efc012de7afec5a',
225 hashlib.sha256: '82558a389a443c0ea4cc819899f2083a'
226 '85f0faa3e578f8077a2e3ff46729665b',
227 hashlib.sha384: '3e8a69b7783c25851933ab6290af6ca7'
228 '7a9981480850009cc5577c6e1f573b4e'
229 '6801dd23c4a7d679ccf8a386c674cffb',
230 hashlib.sha512: 'b0ba465637458c6990e5a8c5f61d4af7'
231 'e576d97ff94b872de76f8050361ee3db'
232 'a91ca5c11aa25eb4d679275cc5788063'
233 'a5f19741120c4f2de2adebeb10a298dd',
234 })
235
236 # 4.7. Test Case 6
237 hmactest(key = b'\xaa'*131,
238 data = b'Test Using Larger Than Block-Siz'
239 b'e Key - Hash Key First',
240 hexdigests = {
241 hashlib.sha224: '95e9a0db962095adaebe9b2d6f0dbce2'
242 'd499f112f2d2b7273fa6870e',
243 hashlib.sha256: '60e431591ee0b67f0d8a26aacbf5b77f'
244 '8e0bc6213728c5140546040f0ee37f54',
245 hashlib.sha384: '4ece084485813e9088d2c63a041bc5b4'
246 '4f9ef1012a2b588f3cd11f05033ac4c6'
247 '0c2ef6ab4030fe8296248df163f44952',
248 hashlib.sha512: '80b24263c7c1a3ebb71493c1dd7be8b4'
249 '9b46d1f41b4aeec1121b013783f8f352'
250 '6b56d037e05f2598bd0fd2215d6a1e52'
251 '95e64f73f63f0aec8b915a985d786598',
252 })
253
254 # 4.8. Test Case 7
255 hmactest(key = b'\xaa'*131,
256 data = b'This is a test using a larger th'
257 b'an block-size key and a larger t'
258 b'han block-size data. The key nee'
259 b'ds to be hashed before being use'
260 b'd by the HMAC algorithm.',
261 hexdigests = {
262 hashlib.sha224: '3a854166ac5d9f023f54d517d0b39dbd'
263 '946770db9c2b95c9f6f565d1',
264 hashlib.sha256: '9b09ffa71b942fcb27635fbcd5b0e944'
265 'bfdc63644f0713938a7f51535c3a35e2',
266 hashlib.sha384: '6617178e941f020d351e2f254e8fd32c'
267 '602420feb0b8fb9adccebb82461e99c5'
268 'a678cc31e799176d3860e6110c46523e',
269 hashlib.sha512: 'e37b6a775dc87dbaa4dfa9f96e5e3ffd'
270 'debd71f8867289865df5a32d20cdc944'
271 'b6022cac3c4982b10d5eeb55c3e4de15'
272 '134676fb6de0446065c97440fa8c6a58',
273 })
274
Christian Heimes90558152019-09-27 15:03:53 +0200275 @requires_hashdigest('sha224', openssl=True)
Guido van Rossuma19f80c2007-11-06 20:51:31 +0000276 def test_sha224_rfc4231(self):
Christian Heimesc4ab1102013-11-20 17:35:06 +0100277 self._rfc4231_test_cases(hashlib.sha224, 'sha224', 28, 64)
Guido van Rossuma19f80c2007-11-06 20:51:31 +0000278
Christian Heimes90558152019-09-27 15:03:53 +0200279 @requires_hashdigest('sha256', openssl=True)
Guido van Rossuma19f80c2007-11-06 20:51:31 +0000280 def test_sha256_rfc4231(self):
Christian Heimesc4ab1102013-11-20 17:35:06 +0100281 self._rfc4231_test_cases(hashlib.sha256, 'sha256', 32, 64)
Guido van Rossuma19f80c2007-11-06 20:51:31 +0000282
Christian Heimes90558152019-09-27 15:03:53 +0200283 @requires_hashdigest('sha384', openssl=True)
Guido van Rossuma19f80c2007-11-06 20:51:31 +0000284 def test_sha384_rfc4231(self):
Christian Heimesc4ab1102013-11-20 17:35:06 +0100285 self._rfc4231_test_cases(hashlib.sha384, 'sha384', 48, 128)
Guido van Rossuma19f80c2007-11-06 20:51:31 +0000286
Christian Heimes90558152019-09-27 15:03:53 +0200287 @requires_hashdigest('sha512', openssl=True)
Guido van Rossuma19f80c2007-11-06 20:51:31 +0000288 def test_sha512_rfc4231(self):
Christian Heimesc4ab1102013-11-20 17:35:06 +0100289 self._rfc4231_test_cases(hashlib.sha512, 'sha512', 64, 128)
Guido van Rossuma19f80c2007-11-06 20:51:31 +0000290
Christian Heimesc64a1a62019-09-25 16:30:20 +0200291 @requires_hashdigest('sha256')
Guido van Rossuma19f80c2007-11-06 20:51:31 +0000292 def test_legacy_block_size_warnings(self):
293 class MockCrazyHash(object):
294 """Ain't no block_size attribute here."""
295 def __init__(self, *args):
Christian Heimesc64a1a62019-09-25 16:30:20 +0200296 self._x = hashlib.sha256(*args)
Guido van Rossuma19f80c2007-11-06 20:51:31 +0000297 self.digest_size = self._x.digest_size
298 def update(self, v):
299 self._x.update(v)
300 def digest(self):
301 return self._x.digest()
302
Brett Cannon1cd02472008-09-09 01:52:27 +0000303 with warnings.catch_warnings():
Christian Heimese25f35e2008-03-20 10:49:03 +0000304 warnings.simplefilter('error', RuntimeWarning)
Florent Xicluna41fe6152010-04-02 18:52:12 +0000305 with self.assertRaises(RuntimeWarning):
Guido van Rossuma19f80c2007-11-06 20:51:31 +0000306 hmac.HMAC(b'a', b'b', digestmod=MockCrazyHash)
Guido van Rossuma19f80c2007-11-06 20:51:31 +0000307 self.fail('Expected warning about missing block_size')
308
309 MockCrazyHash.block_size = 1
Florent Xicluna41fe6152010-04-02 18:52:12 +0000310 with self.assertRaises(RuntimeWarning):
Guido van Rossuma19f80c2007-11-06 20:51:31 +0000311 hmac.HMAC(b'a', b'b', digestmod=MockCrazyHash)
Guido van Rossuma19f80c2007-11-06 20:51:31 +0000312 self.fail('Expected warning about small block_size')
Guido van Rossuma19f80c2007-11-06 20:51:31 +0000313
Matthias Bussonnier51a47432018-09-10 20:10:01 +0200314 def test_with_digestmod_no_default(self):
Gregory P. Smithf33c57d52019-10-17 20:30:42 -0700315 """The digestmod parameter is required as of Python 3.8."""
316 with self.assertRaisesRegex(TypeError, r'required.*digestmod'):
Christian Heimes634919a2013-11-20 17:23:06 +0100317 key = b"\x0b" * 16
318 data = b"Hi There"
Matthias Bussonnier51a47432018-09-10 20:10:01 +0200319 hmac.HMAC(key, data, digestmod=None)
Gregory P. Smithf33c57d52019-10-17 20:30:42 -0700320 with self.assertRaisesRegex(TypeError, r'required.*digestmod'):
321 hmac.new(key, data)
322 with self.assertRaisesRegex(TypeError, r'required.*digestmod'):
323 hmac.HMAC(key, msg=data, digestmod='')
Jeremy Hylton893801e2003-05-27 16:16:41 +0000324
Christian Heimesc64a1a62019-09-25 16:30:20 +0200325
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000326class ConstructorTestCase(unittest.TestCase):
Guido van Rossum7e8fdba2002-08-22 19:38:14 +0000327
Christian Heimesc64a1a62019-09-25 16:30:20 +0200328 expected = (
329 "6c845b47f52b3b47f6590c502db7825aad757bf4fadc8fa972f7cd2e76a5bdeb"
330 )
331
332 @requires_hashdigest('sha256')
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000333 def test_normal(self):
Guido van Rossum7e8fdba2002-08-22 19:38:14 +0000334 # Standard constructor call.
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000335 try:
Christian Heimesc64a1a62019-09-25 16:30:20 +0200336 hmac.HMAC(b"key", digestmod='sha256')
Christian Heimes217f5c42013-11-24 23:14:16 +0100337 except Exception:
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000338 self.fail("Standard constructor call raised exception.")
339
Christian Heimesc64a1a62019-09-25 16:30:20 +0200340 @requires_hashdigest('sha256')
Antoine Pitrou24ef3e92012-06-30 17:27:56 +0200341 def test_with_str_key(self):
342 # Pass a key of type str, which is an error, because it expects a key
343 # of type bytes
344 with self.assertRaises(TypeError):
Christian Heimesc64a1a62019-09-25 16:30:20 +0200345 h = hmac.HMAC("key", digestmod='sha256')
Antoine Pitrou24ef3e92012-06-30 17:27:56 +0200346
Christian Heimesc64a1a62019-09-25 16:30:20 +0200347 @requires_hashdigest('sha256')
Antoine Pitrou24ef3e92012-06-30 17:27:56 +0200348 def test_dot_new_with_str_key(self):
349 # Pass a key of type str, which is an error, because it expects a key
350 # of type bytes
351 with self.assertRaises(TypeError):
Christian Heimesc64a1a62019-09-25 16:30:20 +0200352 h = hmac.new("key", digestmod='sha256')
Antoine Pitrou24ef3e92012-06-30 17:27:56 +0200353
Christian Heimesc64a1a62019-09-25 16:30:20 +0200354 @requires_hashdigest('sha256')
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000355 def test_withtext(self):
Guido van Rossum7e8fdba2002-08-22 19:38:14 +0000356 # Constructor call with text.
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000357 try:
Christian Heimesc64a1a62019-09-25 16:30:20 +0200358 h = hmac.HMAC(b"key", b"hash this!", digestmod='sha256')
Christian Heimes217f5c42013-11-24 23:14:16 +0100359 except Exception:
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000360 self.fail("Constructor call with text argument raised exception.")
Christian Heimesc64a1a62019-09-25 16:30:20 +0200361 self.assertEqual(h.hexdigest(), self.expected)
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000362
Christian Heimesc64a1a62019-09-25 16:30:20 +0200363 @requires_hashdigest('sha256')
Christian Heimes04926ae2013-07-01 13:08:42 +0200364 def test_with_bytearray(self):
365 try:
Christian Heimes217f5c42013-11-24 23:14:16 +0100366 h = hmac.HMAC(bytearray(b"key"), bytearray(b"hash this!"),
Christian Heimesc64a1a62019-09-25 16:30:20 +0200367 digestmod="sha256")
Christian Heimes217f5c42013-11-24 23:14:16 +0100368 except Exception:
Christian Heimes04926ae2013-07-01 13:08:42 +0200369 self.fail("Constructor call with bytearray arguments raised exception.")
stratakis89433182019-12-03 16:35:54 +0100370 self.assertEqual(h.hexdigest(), self.expected)
Christian Heimes04926ae2013-07-01 13:08:42 +0200371
Christian Heimesc64a1a62019-09-25 16:30:20 +0200372 @requires_hashdigest('sha256')
Christian Heimes04926ae2013-07-01 13:08:42 +0200373 def test_with_memoryview_msg(self):
374 try:
Christian Heimesc64a1a62019-09-25 16:30:20 +0200375 h = hmac.HMAC(b"key", memoryview(b"hash this!"), digestmod="sha256")
Christian Heimes217f5c42013-11-24 23:14:16 +0100376 except Exception:
Christian Heimes04926ae2013-07-01 13:08:42 +0200377 self.fail("Constructor call with memoryview msg raised exception.")
stratakis89433182019-12-03 16:35:54 +0100378 self.assertEqual(h.hexdigest(), self.expected)
Christian Heimes04926ae2013-07-01 13:08:42 +0200379
Christian Heimesc64a1a62019-09-25 16:30:20 +0200380 @requires_hashdigest('sha256')
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000381 def test_withmodule(self):
Guido van Rossum7e8fdba2002-08-22 19:38:14 +0000382 # Constructor call with text and digest module.
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000383 try:
Christian Heimesc64a1a62019-09-25 16:30:20 +0200384 h = hmac.HMAC(b"key", b"", hashlib.sha256)
Christian Heimes217f5c42013-11-24 23:14:16 +0100385 except Exception:
Christian Heimesc64a1a62019-09-25 16:30:20 +0200386 self.fail("Constructor call with hashlib.sha256 raised exception.")
387
Tim Peters88768482001-11-13 21:51:26 +0000388
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000389class SanityTestCase(unittest.TestCase):
Guido van Rossum7e8fdba2002-08-22 19:38:14 +0000390
Christian Heimesc64a1a62019-09-25 16:30:20 +0200391 @requires_hashdigest('sha256')
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000392 def test_exercise_all_methods(self):
Guido van Rossum7e8fdba2002-08-22 19:38:14 +0000393 # Exercising all methods once.
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000394 # This must not raise any exceptions
395 try:
Christian Heimesc64a1a62019-09-25 16:30:20 +0200396 h = hmac.HMAC(b"my secret key", digestmod="sha256")
Guido van Rossum39478e82007-08-27 17:23:59 +0000397 h.update(b"compute the hash of this text!")
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000398 dig = h.digest()
399 dig = h.hexdigest()
400 h2 = h.copy()
Christian Heimes217f5c42013-11-24 23:14:16 +0100401 except Exception:
Neal Norwitz28bb5722002-04-01 19:00:50 +0000402 self.fail("Exception raised during normal usage of HMAC class.")
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000403
Christian Heimesc64a1a62019-09-25 16:30:20 +0200404
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000405class CopyTestCase(unittest.TestCase):
Guido van Rossum7e8fdba2002-08-22 19:38:14 +0000406
Christian Heimesc64a1a62019-09-25 16:30:20 +0200407 @requires_hashdigest('sha256')
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000408 def test_attributes(self):
Guido van Rossum7e8fdba2002-08-22 19:38:14 +0000409 # Testing if attributes are of same type.
Christian Heimesc64a1a62019-09-25 16:30:20 +0200410 h1 = hmac.HMAC(b"key", digestmod="sha256")
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000411 h2 = h1.copy()
Benjamin Petersonc9c0f202009-06-30 23:06:06 +0000412 self.assertTrue(h1.digest_cons == h2.digest_cons,
Gregory P. Smithf21a5f72005-08-21 18:45:59 +0000413 "digest constructors don't match.")
Guido van Rossume61fd5b2007-07-11 12:20:59 +0000414 self.assertEqual(type(h1.inner), type(h2.inner),
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000415 "Types of inner don't match.")
Guido van Rossume61fd5b2007-07-11 12:20:59 +0000416 self.assertEqual(type(h1.outer), type(h2.outer),
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000417 "Types of outer don't match.")
418
Christian Heimesc64a1a62019-09-25 16:30:20 +0200419 @requires_hashdigest('sha256')
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000420 def test_realcopy(self):
Guido van Rossum7e8fdba2002-08-22 19:38:14 +0000421 # Testing if the copy method created a real copy.
Christian Heimesc64a1a62019-09-25 16:30:20 +0200422 h1 = hmac.HMAC(b"key", digestmod="sha256")
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000423 h2 = h1.copy()
Mark Dickinsona56c4672009-01-27 18:17:45 +0000424 # Using id() in case somebody has overridden __eq__/__ne__.
Benjamin Petersonc9c0f202009-06-30 23:06:06 +0000425 self.assertTrue(id(h1) != id(h2), "No real copy of the HMAC instance.")
426 self.assertTrue(id(h1.inner) != id(h2.inner),
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000427 "No real copy of the attribute 'inner'.")
Benjamin Petersonc9c0f202009-06-30 23:06:06 +0000428 self.assertTrue(id(h1.outer) != id(h2.outer),
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000429 "No real copy of the attribute 'outer'.")
430
Christian Heimesc64a1a62019-09-25 16:30:20 +0200431 @requires_hashdigest('sha256')
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000432 def test_equality(self):
Guido van Rossum7e8fdba2002-08-22 19:38:14 +0000433 # Testing if the copy has the same digests.
Christian Heimesc64a1a62019-09-25 16:30:20 +0200434 h1 = hmac.HMAC(b"key", digestmod="sha256")
Guido van Rossum39478e82007-08-27 17:23:59 +0000435 h1.update(b"some random text")
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000436 h2 = h1.copy()
Guido van Rossume61fd5b2007-07-11 12:20:59 +0000437 self.assertEqual(h1.digest(), h2.digest(),
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000438 "Digest of copy doesn't match original digest.")
Guido van Rossume61fd5b2007-07-11 12:20:59 +0000439 self.assertEqual(h1.hexdigest(), h2.hexdigest(),
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000440 "Hexdigest of copy doesn't match original hexdigest.")
441
Nick Coghlan807770e2012-06-15 21:14:08 +1000442class CompareDigestTestCase(unittest.TestCase):
Charles-François Natali7feb9f42012-05-13 19:53:07 +0200443
Christian Heimes6cea6552012-06-24 13:48:32 +0200444 def test_compare_digest(self):
Charles-François Natali7feb9f42012-05-13 19:53:07 +0200445 # Testing input type exception handling
446 a, b = 100, 200
Nick Coghlan807770e2012-06-15 21:14:08 +1000447 self.assertRaises(TypeError, hmac.compare_digest, a, b)
448 a, b = 100, b"foobar"
449 self.assertRaises(TypeError, hmac.compare_digest, a, b)
450 a, b = b"foobar", 200
451 self.assertRaises(TypeError, hmac.compare_digest, a, b)
Charles-François Natali7feb9f42012-05-13 19:53:07 +0200452 a, b = "foobar", b"foobar"
Nick Coghlan807770e2012-06-15 21:14:08 +1000453 self.assertRaises(TypeError, hmac.compare_digest, a, b)
454 a, b = b"foobar", "foobar"
455 self.assertRaises(TypeError, hmac.compare_digest, a, b)
Nick Coghlan807770e2012-06-15 21:14:08 +1000456
457 # Testing bytes of different lengths
458 a, b = b"foobar", b"foo"
459 self.assertFalse(hmac.compare_digest(a, b))
460 a, b = b"\xde\xad\xbe\xef", b"\xde\xad"
461 self.assertFalse(hmac.compare_digest(a, b))
462
463 # Testing bytes of same lengths, different values
464 a, b = b"foobar", b"foobaz"
465 self.assertFalse(hmac.compare_digest(a, b))
466 a, b = b"\xde\xad\xbe\xef", b"\xab\xad\x1d\xea"
467 self.assertFalse(hmac.compare_digest(a, b))
468
469 # Testing bytes of same lengths, same values
Charles-François Natali7feb9f42012-05-13 19:53:07 +0200470 a, b = b"foobar", b"foobar"
Nick Coghlan807770e2012-06-15 21:14:08 +1000471 self.assertTrue(hmac.compare_digest(a, b))
Charles-François Natali7feb9f42012-05-13 19:53:07 +0200472 a, b = b"\xde\xad\xbe\xef", b"\xde\xad\xbe\xef"
Nick Coghlan807770e2012-06-15 21:14:08 +1000473 self.assertTrue(hmac.compare_digest(a, b))
Charles-François Natali7feb9f42012-05-13 19:53:07 +0200474
Christian Heimes6cea6552012-06-24 13:48:32 +0200475 # Testing bytearrays of same lengths, same values
476 a, b = bytearray(b"foobar"), bytearray(b"foobar")
477 self.assertTrue(hmac.compare_digest(a, b))
478
Min ho Kim39d87b52019-08-31 06:21:19 +1000479 # Testing bytearrays of different lengths
Christian Heimes6cea6552012-06-24 13:48:32 +0200480 a, b = bytearray(b"foobar"), bytearray(b"foo")
481 self.assertFalse(hmac.compare_digest(a, b))
482
483 # Testing bytearrays of same lengths, different values
484 a, b = bytearray(b"foobar"), bytearray(b"foobaz")
485 self.assertFalse(hmac.compare_digest(a, b))
486
487 # Testing byte and bytearray of same lengths, same values
488 a, b = bytearray(b"foobar"), b"foobar"
489 self.assertTrue(hmac.compare_digest(a, b))
490 self.assertTrue(hmac.compare_digest(b, a))
491
Min ho Kim39d87b52019-08-31 06:21:19 +1000492 # Testing byte bytearray of different lengths
Christian Heimes6cea6552012-06-24 13:48:32 +0200493 a, b = bytearray(b"foobar"), b"foo"
494 self.assertFalse(hmac.compare_digest(a, b))
495 self.assertFalse(hmac.compare_digest(b, a))
496
497 # Testing byte and bytearray of same lengths, different values
498 a, b = bytearray(b"foobar"), b"foobaz"
499 self.assertFalse(hmac.compare_digest(a, b))
500 self.assertFalse(hmac.compare_digest(b, a))
501
502 # Testing str of same lengths
503 a, b = "foobar", "foobar"
504 self.assertTrue(hmac.compare_digest(a, b))
505
Min ho Kim39d87b52019-08-31 06:21:19 +1000506 # Testing str of different lengths
Christian Heimes6cea6552012-06-24 13:48:32 +0200507 a, b = "foo", "foobar"
508 self.assertFalse(hmac.compare_digest(a, b))
509
510 # Testing bytes of same lengths, different values
511 a, b = "foobar", "foobaz"
512 self.assertFalse(hmac.compare_digest(a, b))
513
514 # Testing error cases
515 a, b = "foobar", b"foobar"
516 self.assertRaises(TypeError, hmac.compare_digest, a, b)
517 a, b = b"foobar", "foobar"
518 self.assertRaises(TypeError, hmac.compare_digest, a, b)
519 a, b = b"foobar", 1
520 self.assertRaises(TypeError, hmac.compare_digest, a, b)
521 a, b = 100, 200
522 self.assertRaises(TypeError, hmac.compare_digest, a, b)
523 a, b = "fooä", "fooä"
524 self.assertRaises(TypeError, hmac.compare_digest, a, b)
525
526 # subclasses are supported by ignore __eq__
527 class mystr(str):
528 def __eq__(self, other):
529 return False
530
531 a, b = mystr("foobar"), mystr("foobar")
532 self.assertTrue(hmac.compare_digest(a, b))
533 a, b = mystr("foobar"), "foobar"
534 self.assertTrue(hmac.compare_digest(a, b))
535 a, b = mystr("foobar"), mystr("foobaz")
536 self.assertFalse(hmac.compare_digest(a, b))
537
538 class mybytes(bytes):
539 def __eq__(self, other):
540 return False
541
542 a, b = mybytes(b"foobar"), mybytes(b"foobar")
543 self.assertTrue(hmac.compare_digest(a, b))
544 a, b = mybytes(b"foobar"), b"foobar"
545 self.assertTrue(hmac.compare_digest(a, b))
546 a, b = mybytes(b"foobar"), mybytes(b"foobaz")
547 self.assertFalse(hmac.compare_digest(a, b))
548
549
Andrew M. Kuchlingf792bba2001-11-02 21:49:59 +0000550if __name__ == "__main__":
Zachary Ware38c707e2015-04-13 15:00:43 -0500551 unittest.main()