| # Copyright (C) Frederick Dean 2009, All rights reserved |
| |
| """ |
| Unit tests for L{OpenSSL.rand}. |
| """ |
| |
| from unittest import main |
| import os |
| import stat |
| |
| from OpenSSL.test.util import TestCase, b |
| from OpenSSL import rand |
| |
| |
| class RandTests(TestCase): |
| def test_bytes_wrong_args(self): |
| """ |
| L{OpenSSL.rand.bytes} raises L{TypeError} if called with the wrong |
| number of arguments or with a non-C{int} argument. |
| """ |
| self.assertRaises(TypeError, rand.bytes) |
| self.assertRaises(TypeError, rand.bytes, None) |
| self.assertRaises(TypeError, rand.bytes, 3, None) |
| |
| # XXX Test failure of the malloc() in rand_bytes. |
| |
| def test_bytes(self): |
| """ |
| Verify that we can obtain bytes from rand_bytes() and |
| that they are different each time. Test the parameter |
| of rand_bytes() for bad values. |
| """ |
| b1 = rand.bytes(50) |
| self.assertEqual(len(b1), 50) |
| b2 = rand.bytes(num_bytes=50) # parameter by name |
| self.assertNotEqual(b1, b2) # Hip, Hip, Horay! FIPS complaince |
| b3 = rand.bytes(num_bytes=0) |
| self.assertEqual(len(b3), 0) |
| exc = self.assertRaises(ValueError, rand.bytes, -1) |
| self.assertEqual(str(exc), "num_bytes must not be negative") |
| |
| |
| def test_add_wrong_args(self): |
| """ |
| When called with the wrong number of arguments, or with arguments not of |
| type C{str} and C{int}, L{OpenSSL.rand.add} raises L{TypeError}. |
| """ |
| self.assertRaises(TypeError, rand.add) |
| self.assertRaises(TypeError, rand.add, b("foo"), None) |
| self.assertRaises(TypeError, rand.add, None, 3) |
| self.assertRaises(TypeError, rand.add, b("foo"), 3, None) |
| |
| |
| def test_add(self): |
| """ |
| L{OpenSSL.rand.add} adds entropy to the PRNG. |
| """ |
| rand.add(b('hamburger'), 3) |
| |
| |
| def test_seed_wrong_args(self): |
| """ |
| When called with the wrong number of arguments, or with a non-C{str} |
| argument, L{OpenSSL.rand.seed} raises L{TypeError}. |
| """ |
| self.assertRaises(TypeError, rand.seed) |
| self.assertRaises(TypeError, rand.seed, None) |
| self.assertRaises(TypeError, rand.seed, b("foo"), None) |
| |
| |
| def test_seed(self): |
| """ |
| L{OpenSSL.rand.seed} adds entropy to the PRNG. |
| """ |
| rand.seed(b('milk shake')) |
| |
| |
| def test_status_wrong_args(self): |
| """ |
| L{OpenSSL.rand.status} raises L{TypeError} when called with any |
| arguments. |
| """ |
| self.assertRaises(TypeError, rand.status, None) |
| |
| |
| def test_status(self): |
| """ |
| L{OpenSSL.rand.status} returns C{True} if the PRNG has sufficient |
| entropy, C{False} otherwise. |
| """ |
| # It's hard to know what it is actually going to return. Different |
| # OpenSSL random engines decide differently whether they have enough |
| # entropy or not. |
| self.assertTrue(rand.status() in (1, 2)) |
| |
| |
| def test_egd_wrong_args(self): |
| """ |
| L{OpenSSL.rand.egd} raises L{TypeError} when called with the wrong |
| number of arguments or with arguments not of type C{str} and C{int}. |
| """ |
| self.assertRaises(TypeError, rand.egd) |
| self.assertRaises(TypeError, rand.egd, None) |
| self.assertRaises(TypeError, rand.egd, "foo", None) |
| self.assertRaises(TypeError, rand.egd, None, 3) |
| self.assertRaises(TypeError, rand.egd, "foo", 3, None) |
| |
| |
| def test_egd_missing(self): |
| """ |
| L{OpenSSL.rand.egd} returns C{0} or C{-1} if the EGD socket passed |
| to it does not exist. |
| """ |
| result = rand.egd(self.mktemp()) |
| expected = (-1, 0) |
| self.assertTrue( |
| result in expected, |
| "%r not in %r" % (result, expected)) |
| |
| |
| def test_cleanup_wrong_args(self): |
| """ |
| L{OpenSSL.rand.cleanup} raises L{TypeError} when called with any |
| arguments. |
| """ |
| self.assertRaises(TypeError, rand.cleanup, None) |
| |
| |
| def test_cleanup(self): |
| """ |
| L{OpenSSL.rand.cleanup} releases the memory used by the PRNG and returns |
| C{None}. |
| """ |
| self.assertIdentical(rand.cleanup(), None) |
| |
| |
| def test_load_file_wrong_args(self): |
| """ |
| L{OpenSSL.rand.load_file} raises L{TypeError} when called the wrong |
| number of arguments or arguments not of type C{str} and C{int}. |
| """ |
| self.assertRaises(TypeError, rand.load_file) |
| self.assertRaises(TypeError, rand.load_file, "foo", None) |
| self.assertRaises(TypeError, rand.load_file, None, 1) |
| self.assertRaises(TypeError, rand.load_file, "foo", 1, None) |
| |
| |
| def test_write_file_wrong_args(self): |
| """ |
| L{OpenSSL.rand.write_file} raises L{TypeError} when called with the |
| wrong number of arguments or a non-C{str} argument. |
| """ |
| self.assertRaises(TypeError, rand.write_file) |
| self.assertRaises(TypeError, rand.write_file, None) |
| self.assertRaises(TypeError, rand.write_file, "foo", None) |
| |
| |
| def test_files(self): |
| """ |
| Test reading and writing of files via rand functions. |
| """ |
| # Write random bytes to a file |
| tmpfile = self.mktemp() |
| # Make sure it exists (so cleanup definitely succeeds) |
| fObj = open(tmpfile, 'w') |
| fObj.close() |
| try: |
| rand.write_file(tmpfile) |
| # Verify length of written file |
| size = os.stat(tmpfile)[stat.ST_SIZE] |
| self.assertEquals(size, 1024) |
| # Read random bytes from file |
| rand.load_file(tmpfile) |
| rand.load_file(tmpfile, 4) # specify a length |
| finally: |
| # Cleanup |
| os.unlink(tmpfile) |
| |
| |
| if __name__ == '__main__': |
| main() |