File: test_pbkdf2.py

package info (click to toggle)
python-cryptography 43.0.0-3
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 5,400 kB
  • sloc: python: 49,159; java: 319; makefile: 161
file content (42 lines) | stat: -rw-r--r-- 1,300 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
# This file is dual licensed under the terms of the Apache License, Version
# 2.0, and the BSD License. See the LICENSE file in the root of this repository
# for complete details.

import binascii

from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC

from .utils import wycheproof_tests

_HASH_ALGORITHMS = {
    "PBKDF2-HMACSHA1": hashes.SHA1(),
    "PBKDF2-HMACSHA224": hashes.SHA224(),
    "PBKDF2-HMACSHA256": hashes.SHA256(),
    "PBKDF2-HMACSHA384": hashes.SHA384(),
    "PBKDF2-HMACSHA512": hashes.SHA512(),
}


@wycheproof_tests(
    "pbkdf2_hmacsha1_test.json",
    "pbkdf2_hmacsha224_test.json",
    "pbkdf2_hmacsha256_test.json",
    "pbkdf2_hmacsha384_test.json",
    "pbkdf2_hmacsha512_test.json",
    subdir="testvectors_v1",
)
def test_pbkdf2(backend, wycheproof):
    assert wycheproof.valid

    algorithm = _HASH_ALGORITHMS[wycheproof.testfiledata["algorithm"]]

    p = PBKDF2HMAC(
        algorithm=algorithm,
        length=wycheproof.testcase["dkLen"],
        salt=binascii.unhexlify(wycheproof.testcase["salt"]),
        iterations=wycheproof.testcase["iterationCount"],
    )
    assert p.derive(
        binascii.unhexlify(wycheproof.testcase["password"])
    ) == binascii.unhexlify(wycheproof.testcase["dk"])