mirror of
https://github.com/samba-team/samba.git
synced 2025-12-16 00:23:52 +03:00
pytest: test that _glue.crypt works
The test vectors were generated via Python 3.10 crypt module, which directly wraps crypt(3), which in this case is from glibc 2.39-0ubuntu8.3. We mainly test the sha256 and sha512 vectors, which seems to be all we use, and which are said to be widely supported. BUG: https://bugzilla.samba.org/show_bug.cgi?id=15756 Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Reviewed-by: Andreas Schneider <asn@samba.org>
This commit is contained in:
committed by
Andreas Schneider
parent
88e3c82d88
commit
5636d30c09
@@ -88,3 +88,68 @@ class GlueTests(samba.tests.TestCase):
|
||||
self.assertEqual(_glue.strstr_m(string, '_'), '_string_num__one')
|
||||
self.assertEqual(_glue.strstr_m(string, '__'), '__one')
|
||||
self.assertEqual(_glue.strstr_m(string, 'ring'), 'ring_num__one')
|
||||
|
||||
def test_crypt(self):
|
||||
# We hopefully only use schemes 5 and 6 (sha256 and sha512),
|
||||
# which are OK and also quite widely supported according to
|
||||
# https://en.wikipedia.org/wiki/Crypt_(C)
|
||||
for phrase, setting, expected in [
|
||||
("a", "$5$aaaaaa",
|
||||
"$5$aaaaaa$F4lxguL7mZR7TGlvukPTJIxoRhVmHMZs8ZdH8oDP0.6"),
|
||||
# with scheme 5, 5000 rounds is default, so hash is the same as above
|
||||
('a', '$5$rounds=5000$aaaaaa',
|
||||
'$5$rounds=5000$aaaaaa$F4lxguL7mZR7TGlvukPTJIxoRhVmHMZs8ZdH8oDP0.6'),
|
||||
('a',
|
||||
'$5$rounds=4999$aaaaaa',
|
||||
'$5$rounds=4999$aaaaaa$FiP70gtxOJUFLokUJvET06E7jbL6aNmF6Wtv2ddzjY8'),
|
||||
('a', '$5$aaaaab',
|
||||
'$5$aaaaab$e9qR2F833/JyuMu.nkQc9kn184vBWLo0ODqnCe./mj0'),
|
||||
|
||||
('', '$5$aaaaaa', '$5$aaaaaa$5B4WTdWp5n/v/aNUw2N8RsEitqvlZJEaAKhH/pOkGg4'),
|
||||
|
||||
("a", "$6$aaaaaa",
|
||||
"$6$aaaaaa$KHs/Ez7X/I5/K.V8FR7kEsx9rOvjXnEDUmGC.dLBWP87XWy.oUEAM7QYcZQRVhiDwGepOF2pKrCVETYLyASh60"),
|
||||
|
||||
('', '$5$', '$5$$3c2QQ0KjIU1OLtB29cl8Fplc2WN7X89bnoEjaR7tWu.'),
|
||||
|
||||
# scheme 1 (md5) should be supported if not used
|
||||
('a', '$1$aaaaaa',
|
||||
'$1$aaaaaa$MUMWPbGfzrHFCNm7ZHg31.'),
|
||||
|
||||
('', '$6$',
|
||||
'$6$$/chiBau24cE26QQVW3IfIe68Xu5.JQ4E8Ie7lcRLwqxO5cxGuBhqF2HmTL.zWJ9zjChg3yJYFXeGBQ2y3Ba1d1'),
|
||||
(' ',
|
||||
'$6$6',
|
||||
'$6$6$asLnbxf0obyuv3ybNvDE9ZcdwGFkDhLe7uW.wzdOdKCm4/M3vGFKq4Ttk1tBQrOn4wALZ3tj1L8IarIu5i8hR/'),
|
||||
|
||||
# original DES scheme, 12 bits of salt
|
||||
("a", "lalala", "laKGbFzgh./R2"),
|
||||
("a", "lalalaLALALAla", "laKGbFzgh./R2"),
|
||||
("a", "arrgh", "ar7VUiUvDhX2c"),
|
||||
("a", "arrggghhh", "ar7VUiUvDhX2c"),
|
||||
]:
|
||||
hash = _glue.crypt(phrase, setting)
|
||||
self.assertEqual(hash, expected)
|
||||
|
||||
def test_crypt_bad(self):
|
||||
# We can't be too strident in our assertions, because every
|
||||
# system allows a different set of algorithms, and some have
|
||||
# different ideas of how to parse.
|
||||
for phrase, setting, exception in [
|
||||
("a", "$5", ValueError),
|
||||
("a", "$0$", ValueError),
|
||||
("a", None, TypeError),
|
||||
(None, "", TypeError),
|
||||
('a', '$66$', ValueError),
|
||||
('a', '$$', ValueError),
|
||||
('a', '*0', ValueError),
|
||||
('a', '*', ValueError),
|
||||
('a', '++', ValueError),
|
||||
# this next one is too long, except on Rocky Linux 8.
|
||||
#('a' * 10000, '$5$5', ValueError),
|
||||
# this is invalid, except on Debian 11.
|
||||
# (' ', '$6$ ', ValueError),
|
||||
]:
|
||||
with self.assertRaises(exception,
|
||||
msg=f"crypt({phrase!r}, {setting!r}) didn't fail"):
|
||||
_glue.crypt(phrase, setting)
|
||||
|
||||
Reference in New Issue
Block a user