1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91
|
# -*- coding: utf-8 -*-
#
# Copyright (c) ZeroC, Inc. All rights reserved.
#
class Glacier2HashPasswordTestCase(ClientTestCase):
def runClientSide(self, current):
import passlib.hash
hashpassword = os.path.join(toplevel, "scripts", "icehashpassword.py")
usePBKDF2 = sys.platform == "win32" or sys.platform == "darwin"
useCryptExt = sys.platform.startswith("linux")
def test(b):
if not b:
raise RuntimeError('test assertion failed')
def hashPasswords(password, args = ""):
return run('"%s" "%s" %s' % (sys.executable, hashpassword, args),
stdin=(password + "\r\n").encode('UTF-8'),
stdinRepeat=False)
if usePBKDF2:
current.write("Testing PBKDF2 crypt passwords...")
test(passlib.hash.pbkdf2_sha256.verify("abc123", hashPasswords("abc123")))
test(not passlib.hash.pbkdf2_sha256.verify("abc123", hashPasswords("abc")))
test(passlib.hash.pbkdf2_sha1.verify("abc123", hashPasswords("abc123", "-d sha1")))
test(not passlib.hash.pbkdf2_sha1.verify("abc123", hashPasswords("abc", "-d sha1")))
test(passlib.hash.pbkdf2_sha512.verify("abc123", hashPasswords("abc123", "-d sha512")))
test(not passlib.hash.pbkdf2_sha512.verify("abc123", hashPasswords("abc", "-d sha512")))
#
# Now use custom rounds
#
hash = hashPasswords("abc123", "-r 1000")
if hash.find("$pbkdf2-sha256$1000$") == -1:
test(False)
test(passlib.hash.pbkdf2_sha256.verify("abc123", hash))
hash = hashPasswords("abc123", "-r 1000 -d sha1")
if hash.find("$pbkdf2$1000$") == -1:
test(False)
test(passlib.hash.pbkdf2_sha1.verify("abc123", hash))
hash = hashPasswords("abc123", "-r 1000 -d sha512")
if hash.find("$pbkdf2-sha512$1000$") == -1:
test(False)
test(passlib.hash.pbkdf2_sha512.verify("abc123", hash))
current.writeln("ok")
elif useCryptExt:
current.write("Testing Linux crypt passwords...")
test(passlib.hash.sha512_crypt.verify("abc123", hashPasswords("abc123")))
test(not passlib.hash.sha512_crypt.verify("abc123", hashPasswords("abc")))
test(passlib.hash.sha256_crypt.verify("abc123", hashPasswords("abc123", "-d sha256")))
test(not passlib.hash.sha256_crypt.verify("abc123", hashPasswords("abc", "-d sha256")))
#
# Now use custom rounds
#
hash = hashPasswords("abc123", "-r 5000")
if hash.find("rounds=") != -1:
test(False)
test(passlib.hash.sha512_crypt.verify("abc123", hash))
hash = hashPasswords("abc123", "-d sha256 -r 5000")
if hash.find("rounds=") != -1:
test(False)
test(passlib.hash.sha256_crypt.verify("abc123", hash))
hash = hashPasswords("abc123", "-r 10000")
if hash.find("$rounds=10000$") == -1:
test(False)
test(passlib.hash.sha512_crypt.verify("abc123", hash))
hash = hashPasswords("abc123", "-d sha256 -r 10000")
if hash.find("$rounds=10000$") == -1:
test(False)
test(passlib.hash.sha256_crypt.verify("abc123", hash))
current.writeln("ok")
TestSuite(__name__, [Glacier2HashPasswordTestCase()])
|