|  | import binascii | 
|  | import functools | 
|  | import hmac | 
|  | import hashlib | 
|  | import unittest | 
|  | import unittest.mock | 
|  | import warnings | 
|  |  | 
|  | from test.support import hashlib_helper, check_disallow_instantiation | 
|  |  | 
|  | from _operator import _compare_digest as operator_compare_digest | 
|  |  | 
|  | try: | 
|  | import _hashlib as _hashopenssl | 
|  | from _hashlib import HMAC as C_HMAC | 
|  | from _hashlib import hmac_new as c_hmac_new | 
|  | from _hashlib import compare_digest as openssl_compare_digest | 
|  | except ImportError: | 
|  | _hashopenssl = None | 
|  | C_HMAC = None | 
|  | c_hmac_new = None | 
|  | openssl_compare_digest = None | 
|  |  | 
|  | try: | 
|  | import _sha256 as sha256_module | 
|  | except ImportError: | 
|  | sha256_module = None | 
|  |  | 
|  |  | 
|  | def ignore_warning(func): | 
|  | @functools.wraps(func) | 
|  | def wrapper(*args, **kwargs): | 
|  | with warnings.catch_warnings(): | 
|  | warnings.filterwarnings("ignore", | 
|  | category=DeprecationWarning) | 
|  | return func(*args, **kwargs) | 
|  | return wrapper | 
|  |  | 
|  |  | 
|  | class TestVectorsTestCase(unittest.TestCase): | 
|  |  | 
|  | def assert_hmac_internals( | 
|  | self, h, digest, hashname, digest_size, block_size | 
|  | ): | 
|  | self.assertEqual(h.hexdigest().upper(), digest.upper()) | 
|  | self.assertEqual(h.digest(), binascii.unhexlify(digest)) | 
|  | self.assertEqual(h.name, f"hmac-{hashname}") | 
|  | self.assertEqual(h.digest_size, digest_size) | 
|  | self.assertEqual(h.block_size, block_size) | 
|  |  | 
|  | def assert_hmac( | 
|  | self, key, data, digest, hashfunc, hashname, digest_size, block_size | 
|  | ): | 
|  | h = hmac.HMAC(key, data, digestmod=hashfunc) | 
|  | self.assert_hmac_internals( | 
|  | h, digest, hashname, digest_size, block_size | 
|  | ) | 
|  |  | 
|  | h = hmac.HMAC(key, data, digestmod=hashname) | 
|  | self.assert_hmac_internals( | 
|  | h, digest, hashname, digest_size, block_size | 
|  | ) | 
|  |  | 
|  | h = hmac.HMAC(key, digestmod=hashname) | 
|  | h2 = h.copy() | 
|  | h2.update(b"test update") | 
|  | h.update(data) | 
|  | self.assertEqual(h.hexdigest().upper(), digest.upper()) | 
|  |  | 
|  | h = hmac.new(key, data, digestmod=hashname) | 
|  | self.assert_hmac_internals( | 
|  | h, digest, hashname, digest_size, block_size | 
|  | ) | 
|  |  | 
|  | h = hmac.new(key, None, digestmod=hashname) | 
|  | h.update(data) | 
|  | self.assertEqual(h.hexdigest().upper(), digest.upper()) | 
|  |  | 
|  | h = hmac.new(key, digestmod=hashname) | 
|  | h.update(data) | 
|  | self.assertEqual(h.hexdigest().upper(), digest.upper()) | 
|  |  | 
|  | h = hmac.new(key, data, digestmod=hashfunc) | 
|  | self.assertEqual(h.hexdigest().upper(), digest.upper()) | 
|  |  | 
|  | self.assertEqual( | 
|  | hmac.digest(key, data, digest=hashname), | 
|  | binascii.unhexlify(digest) | 
|  | ) | 
|  | self.assertEqual( | 
|  | hmac.digest(key, data, digest=hashfunc), | 
|  | binascii.unhexlify(digest) | 
|  | ) | 
|  |  | 
|  | h = hmac.HMAC.__new__(hmac.HMAC) | 
|  | h._init_old(key, data, digestmod=hashname) | 
|  | self.assert_hmac_internals( | 
|  | h, digest, hashname, digest_size, block_size | 
|  | ) | 
|  |  | 
|  | if c_hmac_new is not None: | 
|  | h = c_hmac_new(key, data, digestmod=hashname) | 
|  | self.assert_hmac_internals( | 
|  | h, digest, hashname, digest_size, block_size | 
|  | ) | 
|  |  | 
|  | h = c_hmac_new(key, digestmod=hashname) | 
|  | h2 = h.copy() | 
|  | h2.update(b"test update") | 
|  | h.update(data) | 
|  | self.assertEqual(h.hexdigest().upper(), digest.upper()) | 
|  |  | 
|  | func = getattr(_hashopenssl, f"openssl_{hashname}") | 
|  | h = c_hmac_new(key, data, digestmod=func) | 
|  | self.assert_hmac_internals( | 
|  | h, digest, hashname, digest_size, block_size | 
|  | ) | 
|  |  | 
|  | h = hmac.HMAC.__new__(hmac.HMAC) | 
|  | h._init_hmac(key, data, digestmod=hashname) | 
|  | self.assert_hmac_internals( | 
|  | h, digest, hashname, digest_size, block_size | 
|  | ) | 
|  |  | 
|  | @hashlib_helper.requires_hashdigest('md5', openssl=True) | 
|  | def test_md5_vectors(self): | 
|  | # Test the HMAC module against test vectors from the RFC. | 
|  |  | 
|  | def md5test(key, data, digest): | 
|  | self.assert_hmac( | 
|  | key, data, digest, | 
|  | hashfunc=hashlib.md5, | 
|  | hashname="md5", | 
|  | digest_size=16, | 
|  | block_size=64 | 
|  | ) | 
|  |  | 
|  | md5test(b"\x0b" * 16, | 
|  | b"Hi There", | 
|  | "9294727A3638BB1C13F48EF8158BFC9D") | 
|  |  | 
|  | md5test(b"Jefe", | 
|  | b"what do ya want for nothing?", | 
|  | "750c783e6ab0b503eaa86e310a5db738") | 
|  |  | 
|  | md5test(b"\xaa" * 16, | 
|  | b"\xdd" * 50, | 
|  | "56be34521d144c88dbb8c733f0e8b3f6") | 
|  |  | 
|  | md5test(bytes(range(1, 26)), | 
|  | b"\xcd" * 50, | 
|  | "697eaf0aca3a3aea3a75164746ffaa79") | 
|  |  | 
|  | md5test(b"\x0C" * 16, | 
|  | b"Test With Truncation", | 
|  | "56461ef2342edc00f9bab995690efd4c") | 
|  |  | 
|  | md5test(b"\xaa" * 80, | 
|  | b"Test Using Larger Than Block-Size Key - Hash Key First", | 
|  | "6b1ab7fe4bd7bf8f0b62e6ce61b9d0cd") | 
|  |  | 
|  | md5test(b"\xaa" * 80, | 
|  | (b"Test Using Larger Than Block-Size Key " | 
|  | b"and Larger Than One Block-Size Data"), | 
|  | "6f630fad67cda0ee1fb1f562db3aa53e") | 
|  |  | 
|  | @hashlib_helper.requires_hashdigest('sha1', openssl=True) | 
|  | def test_sha_vectors(self): | 
|  | def shatest(key, data, digest): | 
|  | self.assert_hmac( | 
|  | key, data, digest, | 
|  | hashfunc=hashlib.sha1, | 
|  | hashname="sha1", | 
|  | digest_size=20, | 
|  | block_size=64 | 
|  | ) | 
|  |  | 
|  | shatest(b"\x0b" * 20, | 
|  | b"Hi There", | 
|  | "b617318655057264e28bc0b6fb378c8ef146be00") | 
|  |  | 
|  | shatest(b"Jefe", | 
|  | b"what do ya want for nothing?", | 
|  | "effcdf6ae5eb2fa2d27416d5f184df9c259a7c79") | 
|  |  | 
|  | shatest(b"\xAA" * 20, | 
|  | b"\xDD" * 50, | 
|  | "125d7342b9ac11cd91a39af48aa17b4f63f175d3") | 
|  |  | 
|  | shatest(bytes(range(1, 26)), | 
|  | b"\xCD" * 50, | 
|  | "4c9007f4026250c6bc8414f9bf50c86c2d7235da") | 
|  |  | 
|  | shatest(b"\x0C" * 20, | 
|  | b"Test With Truncation", | 
|  | "4c1a03424b55e07fe7f27be1d58bb9324a9a5a04") | 
|  |  | 
|  | shatest(b"\xAA" * 80, | 
|  | b"Test Using Larger Than Block-Size Key - Hash Key First", | 
|  | "aa4ae5e15272d00e95705637ce8a3b55ed402112") | 
|  |  | 
|  | shatest(b"\xAA" * 80, | 
|  | (b"Test Using Larger Than Block-Size Key " | 
|  | b"and Larger Than One Block-Size Data"), | 
|  | "e8e99d0f45237d786d6bbaa7965c7808bbff1a91") | 
|  |  | 
|  | def _rfc4231_test_cases(self, hashfunc, hash_name, digest_size, block_size): | 
|  | def hmactest(key, data, hexdigests): | 
|  | digest = hexdigests[hashfunc] | 
|  |  | 
|  | self.assert_hmac( | 
|  | key, data, digest, | 
|  | hashfunc=hashfunc, | 
|  | hashname=hash_name, | 
|  | digest_size=digest_size, | 
|  | block_size=block_size | 
|  | ) | 
|  |  | 
|  | # 4.2.  Test Case 1 | 
|  | hmactest(key = b'\x0b'*20, | 
|  | data = b'Hi There', | 
|  | hexdigests = { | 
|  | hashlib.sha224: '896fb1128abbdf196832107cd49df33f' | 
|  | '47b4b1169912ba4f53684b22', | 
|  | hashlib.sha256: 'b0344c61d8db38535ca8afceaf0bf12b' | 
|  | '881dc200c9833da726e9376c2e32cff7', | 
|  | hashlib.sha384: 'afd03944d84895626b0825f4ab46907f' | 
|  | '15f9dadbe4101ec682aa034c7cebc59c' | 
|  | 'faea9ea9076ede7f4af152e8b2fa9cb6', | 
|  | hashlib.sha512: '87aa7cdea5ef619d4ff0b4241a1d6cb0' | 
|  | '2379f4e2ce4ec2787ad0b30545e17cde' | 
|  | 'daa833b7d6b8a702038b274eaea3f4e4' | 
|  | 'be9d914eeb61f1702e696c203a126854', | 
|  | }) | 
|  |  | 
|  | # 4.3.  Test Case 2 | 
|  | hmactest(key = b'Jefe', | 
|  | data = b'what do ya want for nothing?', | 
|  | hexdigests = { | 
|  | hashlib.sha224: 'a30e01098bc6dbbf45690f3a7e9e6d0f' | 
|  | '8bbea2a39e6148008fd05e44', | 
|  | hashlib.sha256: '5bdcc146bf60754e6a042426089575c7' | 
|  | '5a003f089d2739839dec58b964ec3843', | 
|  | hashlib.sha384: 'af45d2e376484031617f78d2b58a6b1b' | 
|  | '9c7ef464f5a01b47e42ec3736322445e' | 
|  | '8e2240ca5e69e2c78b3239ecfab21649', | 
|  | hashlib.sha512: '164b7a7bfcf819e2e395fbe73b56e0a3' | 
|  | '87bd64222e831fd610270cd7ea250554' | 
|  | '9758bf75c05a994a6d034f65f8f0e6fd' | 
|  | 'caeab1a34d4a6b4b636e070a38bce737', | 
|  | }) | 
|  |  | 
|  | # 4.4.  Test Case 3 | 
|  | hmactest(key = b'\xaa'*20, | 
|  | data = b'\xdd'*50, | 
|  | hexdigests = { | 
|  | hashlib.sha224: '7fb3cb3588c6c1f6ffa9694d7d6ad264' | 
|  | '9365b0c1f65d69d1ec8333ea', | 
|  | hashlib.sha256: '773ea91e36800e46854db8ebd09181a7' | 
|  | '2959098b3ef8c122d9635514ced565fe', | 
|  | hashlib.sha384: '88062608d3e6ad8a0aa2ace014c8a86f' | 
|  | '0aa635d947ac9febe83ef4e55966144b' | 
|  | '2a5ab39dc13814b94e3ab6e101a34f27', | 
|  | hashlib.sha512: 'fa73b0089d56a284efb0f0756c890be9' | 
|  | 'b1b5dbdd8ee81a3655f83e33b2279d39' | 
|  | 'bf3e848279a722c806b485a47e67c807' | 
|  | 'b946a337bee8942674278859e13292fb', | 
|  | }) | 
|  |  | 
|  | # 4.5.  Test Case 4 | 
|  | hmactest(key = bytes(x for x in range(0x01, 0x19+1)), | 
|  | data = b'\xcd'*50, | 
|  | hexdigests = { | 
|  | hashlib.sha224: '6c11506874013cac6a2abc1bb382627c' | 
|  | 'ec6a90d86efc012de7afec5a', | 
|  | hashlib.sha256: '82558a389a443c0ea4cc819899f2083a' | 
|  | '85f0faa3e578f8077a2e3ff46729665b', | 
|  | hashlib.sha384: '3e8a69b7783c25851933ab6290af6ca7' | 
|  | '7a9981480850009cc5577c6e1f573b4e' | 
|  | '6801dd23c4a7d679ccf8a386c674cffb', | 
|  | hashlib.sha512: 'b0ba465637458c6990e5a8c5f61d4af7' | 
|  | 'e576d97ff94b872de76f8050361ee3db' | 
|  | 'a91ca5c11aa25eb4d679275cc5788063' | 
|  | 'a5f19741120c4f2de2adebeb10a298dd', | 
|  | }) | 
|  |  | 
|  | # 4.7.  Test Case 6 | 
|  | hmactest(key = b'\xaa'*131, | 
|  | data = b'Test Using Larger Than Block-Siz' | 
|  | b'e Key - Hash Key First', | 
|  | hexdigests = { | 
|  | hashlib.sha224: '95e9a0db962095adaebe9b2d6f0dbce2' | 
|  | 'd499f112f2d2b7273fa6870e', | 
|  | hashlib.sha256: '60e431591ee0b67f0d8a26aacbf5b77f' | 
|  | '8e0bc6213728c5140546040f0ee37f54', | 
|  | hashlib.sha384: '4ece084485813e9088d2c63a041bc5b4' | 
|  | '4f9ef1012a2b588f3cd11f05033ac4c6' | 
|  | '0c2ef6ab4030fe8296248df163f44952', | 
|  | hashlib.sha512: '80b24263c7c1a3ebb71493c1dd7be8b4' | 
|  | '9b46d1f41b4aeec1121b013783f8f352' | 
|  | '6b56d037e05f2598bd0fd2215d6a1e52' | 
|  | '95e64f73f63f0aec8b915a985d786598', | 
|  | }) | 
|  |  | 
|  | # 4.8.  Test Case 7 | 
|  | hmactest(key = b'\xaa'*131, | 
|  | data = b'This is a test using a larger th' | 
|  | b'an block-size key and a larger t' | 
|  | b'han block-size data. The key nee' | 
|  | b'ds to be hashed before being use' | 
|  | b'd by the HMAC algorithm.', | 
|  | hexdigests = { | 
|  | hashlib.sha224: '3a854166ac5d9f023f54d517d0b39dbd' | 
|  | '946770db9c2b95c9f6f565d1', | 
|  | hashlib.sha256: '9b09ffa71b942fcb27635fbcd5b0e944' | 
|  | 'bfdc63644f0713938a7f51535c3a35e2', | 
|  | hashlib.sha384: '6617178e941f020d351e2f254e8fd32c' | 
|  | '602420feb0b8fb9adccebb82461e99c5' | 
|  | 'a678cc31e799176d3860e6110c46523e', | 
|  | hashlib.sha512: 'e37b6a775dc87dbaa4dfa9f96e5e3ffd' | 
|  | 'debd71f8867289865df5a32d20cdc944' | 
|  | 'b6022cac3c4982b10d5eeb55c3e4de15' | 
|  | '134676fb6de0446065c97440fa8c6a58', | 
|  | }) | 
|  |  | 
|  | @hashlib_helper.requires_hashdigest('sha224', openssl=True) | 
|  | def test_sha224_rfc4231(self): | 
|  | self._rfc4231_test_cases(hashlib.sha224, 'sha224', 28, 64) | 
|  |  | 
|  | @hashlib_helper.requires_hashdigest('sha256', openssl=True) | 
|  | def test_sha256_rfc4231(self): | 
|  | self._rfc4231_test_cases(hashlib.sha256, 'sha256', 32, 64) | 
|  |  | 
|  | @hashlib_helper.requires_hashdigest('sha384', openssl=True) | 
|  | def test_sha384_rfc4231(self): | 
|  | self._rfc4231_test_cases(hashlib.sha384, 'sha384', 48, 128) | 
|  |  | 
|  | @hashlib_helper.requires_hashdigest('sha512', openssl=True) | 
|  | def test_sha512_rfc4231(self): | 
|  | self._rfc4231_test_cases(hashlib.sha512, 'sha512', 64, 128) | 
|  |  | 
|  | @hashlib_helper.requires_hashdigest('sha256') | 
|  | def test_legacy_block_size_warnings(self): | 
|  | class MockCrazyHash(object): | 
|  | """Ain't no block_size attribute here.""" | 
|  | def __init__(self, *args): | 
|  | self._x = hashlib.sha256(*args) | 
|  | self.digest_size = self._x.digest_size | 
|  | def update(self, v): | 
|  | self._x.update(v) | 
|  | def digest(self): | 
|  | return self._x.digest() | 
|  |  | 
|  | with warnings.catch_warnings(): | 
|  | warnings.simplefilter('error', RuntimeWarning) | 
|  | with self.assertRaises(RuntimeWarning): | 
|  | hmac.HMAC(b'a', b'b', digestmod=MockCrazyHash) | 
|  | self.fail('Expected warning about missing block_size') | 
|  |  | 
|  | MockCrazyHash.block_size = 1 | 
|  | with self.assertRaises(RuntimeWarning): | 
|  | hmac.HMAC(b'a', b'b', digestmod=MockCrazyHash) | 
|  | self.fail('Expected warning about small block_size') | 
|  |  | 
|  | def test_with_digestmod_no_default(self): | 
|  | """The digestmod parameter is required as of Python 3.8.""" | 
|  | with self.assertRaisesRegex(TypeError, r'required.*digestmod'): | 
|  | key = b"\x0b" * 16 | 
|  | data = b"Hi There" | 
|  | hmac.HMAC(key, data, digestmod=None) | 
|  | with self.assertRaisesRegex(TypeError, r'required.*digestmod'): | 
|  | hmac.new(key, data) | 
|  | with self.assertRaisesRegex(TypeError, r'required.*digestmod'): | 
|  | hmac.HMAC(key, msg=data, digestmod='') | 
|  |  | 
|  |  | 
|  | class ConstructorTestCase(unittest.TestCase): | 
|  |  | 
|  | expected = ( | 
|  | "6c845b47f52b3b47f6590c502db7825aad757bf4fadc8fa972f7cd2e76a5bdeb" | 
|  | ) | 
|  |  | 
|  | @hashlib_helper.requires_hashdigest('sha256') | 
|  | def test_normal(self): | 
|  | # Standard constructor call. | 
|  | try: | 
|  | hmac.HMAC(b"key", digestmod='sha256') | 
|  | except Exception: | 
|  | self.fail("Standard constructor call raised exception.") | 
|  |  | 
|  | @hashlib_helper.requires_hashdigest('sha256') | 
|  | def test_with_str_key(self): | 
|  | # Pass a key of type str, which is an error, because it expects a key | 
|  | # of type bytes | 
|  | with self.assertRaises(TypeError): | 
|  | h = hmac.HMAC("key", digestmod='sha256') | 
|  |  | 
|  | @hashlib_helper.requires_hashdigest('sha256') | 
|  | def test_dot_new_with_str_key(self): | 
|  | # Pass a key of type str, which is an error, because it expects a key | 
|  | # of type bytes | 
|  | with self.assertRaises(TypeError): | 
|  | h = hmac.new("key", digestmod='sha256') | 
|  |  | 
|  | @hashlib_helper.requires_hashdigest('sha256') | 
|  | def test_withtext(self): | 
|  | # Constructor call with text. | 
|  | try: | 
|  | h = hmac.HMAC(b"key", b"hash this!", digestmod='sha256') | 
|  | except Exception: | 
|  | self.fail("Constructor call with text argument raised exception.") | 
|  | self.assertEqual(h.hexdigest(), self.expected) | 
|  |  | 
|  | @hashlib_helper.requires_hashdigest('sha256') | 
|  | def test_with_bytearray(self): | 
|  | try: | 
|  | h = hmac.HMAC(bytearray(b"key"), bytearray(b"hash this!"), | 
|  | digestmod="sha256") | 
|  | except Exception: | 
|  | self.fail("Constructor call with bytearray arguments raised exception.") | 
|  | self.assertEqual(h.hexdigest(), self.expected) | 
|  |  | 
|  | @hashlib_helper.requires_hashdigest('sha256') | 
|  | def test_with_memoryview_msg(self): | 
|  | try: | 
|  | h = hmac.HMAC(b"key", memoryview(b"hash this!"), digestmod="sha256") | 
|  | except Exception: | 
|  | self.fail("Constructor call with memoryview msg raised exception.") | 
|  | self.assertEqual(h.hexdigest(), self.expected) | 
|  |  | 
|  | @hashlib_helper.requires_hashdigest('sha256') | 
|  | def test_withmodule(self): | 
|  | # Constructor call with text and digest module. | 
|  | try: | 
|  | h = hmac.HMAC(b"key", b"", hashlib.sha256) | 
|  | except Exception: | 
|  | self.fail("Constructor call with hashlib.sha256 raised exception.") | 
|  |  | 
|  | @unittest.skipUnless(C_HMAC is not None, 'need _hashlib') | 
|  | def test_internal_types(self): | 
|  | # internal types like _hashlib.C_HMAC are not constructable | 
|  | check_disallow_instantiation(self, C_HMAC) | 
|  | with self.assertRaisesRegex(TypeError, "immutable type"): | 
|  | C_HMAC.value = None | 
|  |  | 
|  | @unittest.skipUnless(sha256_module is not None, 'need _sha256') | 
|  | def test_with_sha256_module(self): | 
|  | h = hmac.HMAC(b"key", b"hash this!", digestmod=sha256_module.sha256) | 
|  | self.assertEqual(h.hexdigest(), self.expected) | 
|  | self.assertEqual(h.name, "hmac-sha256") | 
|  |  | 
|  | digest = hmac.digest(b"key", b"hash this!", sha256_module.sha256) | 
|  | self.assertEqual(digest, binascii.unhexlify(self.expected)) | 
|  |  | 
|  |  | 
|  | class SanityTestCase(unittest.TestCase): | 
|  |  | 
|  | @hashlib_helper.requires_hashdigest('sha256') | 
|  | def test_exercise_all_methods(self): | 
|  | # Exercising all methods once. | 
|  | # This must not raise any exceptions | 
|  | try: | 
|  | h = hmac.HMAC(b"my secret key", digestmod="sha256") | 
|  | h.update(b"compute the hash of this text!") | 
|  | h.digest() | 
|  | h.hexdigest() | 
|  | h.copy() | 
|  | except Exception: | 
|  | self.fail("Exception raised during normal usage of HMAC class.") | 
|  |  | 
|  |  | 
|  | class CopyTestCase(unittest.TestCase): | 
|  |  | 
|  | @hashlib_helper.requires_hashdigest('sha256') | 
|  | def test_attributes_old(self): | 
|  | # Testing if attributes are of same type. | 
|  | h1 = hmac.HMAC.__new__(hmac.HMAC) | 
|  | h1._init_old(b"key", b"msg", digestmod="sha256") | 
|  | h2 = h1.copy() | 
|  | self.assertEqual(type(h1._inner), type(h2._inner), | 
|  | "Types of inner don't match.") | 
|  | self.assertEqual(type(h1._outer), type(h2._outer), | 
|  | "Types of outer don't match.") | 
|  |  | 
|  | @hashlib_helper.requires_hashdigest('sha256') | 
|  | def test_realcopy_old(self): | 
|  | # Testing if the copy method created a real copy. | 
|  | h1 = hmac.HMAC.__new__(hmac.HMAC) | 
|  | h1._init_old(b"key", b"msg", digestmod="sha256") | 
|  | h2 = h1.copy() | 
|  | # Using id() in case somebody has overridden __eq__/__ne__. | 
|  | self.assertTrue(id(h1) != id(h2), "No real copy of the HMAC instance.") | 
|  | self.assertTrue(id(h1._inner) != id(h2._inner), | 
|  | "No real copy of the attribute 'inner'.") | 
|  | self.assertTrue(id(h1._outer) != id(h2._outer), | 
|  | "No real copy of the attribute 'outer'.") | 
|  | self.assertIs(h1._hmac, None) | 
|  |  | 
|  | @unittest.skipIf(_hashopenssl is None, "test requires _hashopenssl") | 
|  | @hashlib_helper.requires_hashdigest('sha256') | 
|  | def test_realcopy_hmac(self): | 
|  | h1 = hmac.HMAC.__new__(hmac.HMAC) | 
|  | h1._init_hmac(b"key", b"msg", digestmod="sha256") | 
|  | h2 = h1.copy() | 
|  | self.assertTrue(id(h1._hmac) != id(h2._hmac)) | 
|  |  | 
|  | @hashlib_helper.requires_hashdigest('sha256') | 
|  | def test_equality(self): | 
|  | # Testing if the copy has the same digests. | 
|  | h1 = hmac.HMAC(b"key", digestmod="sha256") | 
|  | h1.update(b"some random text") | 
|  | h2 = h1.copy() | 
|  | self.assertEqual(h1.digest(), h2.digest(), | 
|  | "Digest of copy doesn't match original digest.") | 
|  | self.assertEqual(h1.hexdigest(), h2.hexdigest(), | 
|  | "Hexdigest of copy doesn't match original hexdigest.") | 
|  |  | 
|  | @hashlib_helper.requires_hashdigest('sha256') | 
|  | def test_equality_new(self): | 
|  | # Testing if the copy has the same digests with hmac.new(). | 
|  | h1 = hmac.new(b"key", digestmod="sha256") | 
|  | h1.update(b"some random text") | 
|  | h2 = h1.copy() | 
|  | self.assertTrue( | 
|  | id(h1) != id(h2), "No real copy of the HMAC instance." | 
|  | ) | 
|  | self.assertEqual(h1.digest(), h2.digest(), | 
|  | "Digest of copy doesn't match original digest.") | 
|  | self.assertEqual(h1.hexdigest(), h2.hexdigest(), | 
|  | "Hexdigest of copy doesn't match original hexdigest.") | 
|  |  | 
|  |  | 
|  | class CompareDigestTestCase(unittest.TestCase): | 
|  |  | 
|  | def test_hmac_compare_digest(self): | 
|  | self._test_compare_digest(hmac.compare_digest) | 
|  | if openssl_compare_digest is not None: | 
|  | self.assertIs(hmac.compare_digest, openssl_compare_digest) | 
|  | else: | 
|  | self.assertIs(hmac.compare_digest, operator_compare_digest) | 
|  |  | 
|  | def test_operator_compare_digest(self): | 
|  | self._test_compare_digest(operator_compare_digest) | 
|  |  | 
|  | @unittest.skipIf(openssl_compare_digest is None, "test requires _hashlib") | 
|  | def test_openssl_compare_digest(self): | 
|  | self._test_compare_digest(openssl_compare_digest) | 
|  |  | 
|  | def _test_compare_digest(self, compare_digest): | 
|  | # Testing input type exception handling | 
|  | a, b = 100, 200 | 
|  | self.assertRaises(TypeError, compare_digest, a, b) | 
|  | a, b = 100, b"foobar" | 
|  | self.assertRaises(TypeError, compare_digest, a, b) | 
|  | a, b = b"foobar", 200 | 
|  | self.assertRaises(TypeError, compare_digest, a, b) | 
|  | a, b = "foobar", b"foobar" | 
|  | self.assertRaises(TypeError, compare_digest, a, b) | 
|  | a, b = b"foobar", "foobar" | 
|  | self.assertRaises(TypeError, compare_digest, a, b) | 
|  |  | 
|  | # Testing bytes of different lengths | 
|  | a, b = b"foobar", b"foo" | 
|  | self.assertFalse(compare_digest(a, b)) | 
|  | a, b = b"\xde\xad\xbe\xef", b"\xde\xad" | 
|  | self.assertFalse(compare_digest(a, b)) | 
|  |  | 
|  | # Testing bytes of same lengths, different values | 
|  | a, b = b"foobar", b"foobaz" | 
|  | self.assertFalse(compare_digest(a, b)) | 
|  | a, b = b"\xde\xad\xbe\xef", b"\xab\xad\x1d\xea" | 
|  | self.assertFalse(compare_digest(a, b)) | 
|  |  | 
|  | # Testing bytes of same lengths, same values | 
|  | a, b = b"foobar", b"foobar" | 
|  | self.assertTrue(compare_digest(a, b)) | 
|  | a, b = b"\xde\xad\xbe\xef", b"\xde\xad\xbe\xef" | 
|  | self.assertTrue(compare_digest(a, b)) | 
|  |  | 
|  | # Testing bytearrays of same lengths, same values | 
|  | a, b = bytearray(b"foobar"), bytearray(b"foobar") | 
|  | self.assertTrue(compare_digest(a, b)) | 
|  |  | 
|  | # Testing bytearrays of different lengths | 
|  | a, b = bytearray(b"foobar"), bytearray(b"foo") | 
|  | self.assertFalse(compare_digest(a, b)) | 
|  |  | 
|  | # Testing bytearrays of same lengths, different values | 
|  | a, b = bytearray(b"foobar"), bytearray(b"foobaz") | 
|  | self.assertFalse(compare_digest(a, b)) | 
|  |  | 
|  | # Testing byte and bytearray of same lengths, same values | 
|  | a, b = bytearray(b"foobar"), b"foobar" | 
|  | self.assertTrue(compare_digest(a, b)) | 
|  | self.assertTrue(compare_digest(b, a)) | 
|  |  | 
|  | # Testing byte bytearray of different lengths | 
|  | a, b = bytearray(b"foobar"), b"foo" | 
|  | self.assertFalse(compare_digest(a, b)) | 
|  | self.assertFalse(compare_digest(b, a)) | 
|  |  | 
|  | # Testing byte and bytearray of same lengths, different values | 
|  | a, b = bytearray(b"foobar"), b"foobaz" | 
|  | self.assertFalse(compare_digest(a, b)) | 
|  | self.assertFalse(compare_digest(b, a)) | 
|  |  | 
|  | # Testing str of same lengths | 
|  | a, b = "foobar", "foobar" | 
|  | self.assertTrue(compare_digest(a, b)) | 
|  |  | 
|  | # Testing str of different lengths | 
|  | a, b = "foo", "foobar" | 
|  | self.assertFalse(compare_digest(a, b)) | 
|  |  | 
|  | # Testing bytes of same lengths, different values | 
|  | a, b = "foobar", "foobaz" | 
|  | self.assertFalse(compare_digest(a, b)) | 
|  |  | 
|  | # Testing error cases | 
|  | a, b = "foobar", b"foobar" | 
|  | self.assertRaises(TypeError, compare_digest, a, b) | 
|  | a, b = b"foobar", "foobar" | 
|  | self.assertRaises(TypeError, compare_digest, a, b) | 
|  | a, b = b"foobar", 1 | 
|  | self.assertRaises(TypeError, compare_digest, a, b) | 
|  | a, b = 100, 200 | 
|  | self.assertRaises(TypeError, compare_digest, a, b) | 
|  | a, b = "fooä", "fooä" | 
|  | self.assertRaises(TypeError, compare_digest, a, b) | 
|  |  | 
|  | # subclasses are supported by ignore __eq__ | 
|  | class mystr(str): | 
|  | def __eq__(self, other): | 
|  | return False | 
|  |  | 
|  | a, b = mystr("foobar"), mystr("foobar") | 
|  | self.assertTrue(compare_digest(a, b)) | 
|  | a, b = mystr("foobar"), "foobar" | 
|  | self.assertTrue(compare_digest(a, b)) | 
|  | a, b = mystr("foobar"), mystr("foobaz") | 
|  | self.assertFalse(compare_digest(a, b)) | 
|  |  | 
|  | class mybytes(bytes): | 
|  | def __eq__(self, other): | 
|  | return False | 
|  |  | 
|  | a, b = mybytes(b"foobar"), mybytes(b"foobar") | 
|  | self.assertTrue(compare_digest(a, b)) | 
|  | a, b = mybytes(b"foobar"), b"foobar" | 
|  | self.assertTrue(compare_digest(a, b)) | 
|  | a, b = mybytes(b"foobar"), mybytes(b"foobaz") | 
|  | self.assertFalse(compare_digest(a, b)) | 
|  |  | 
|  |  | 
|  | if __name__ == "__main__": | 
|  | unittest.main() |