summaryrefslogtreecommitdiffstats
path: root/Lib/test/test_crypt.py
diff options
context:
space:
mode:
authorVictor Stinner <vstinner@python.org>2023-05-25 13:45:46 (GMT)
committerGitHub <noreply@github.com>2023-05-25 13:45:46 (GMT)
commite4127eaa1ea9104be0a1d9d9e147d50ba88f59aa (patch)
treeb6d74e28f2325fb4f8c27a94cc101d351b775054 /Lib/test/test_crypt.py
parent38539ef1267f26a8b3508fcc8c6199cf46fc300b (diff)
downloadcpython-e4127eaa1ea9104be0a1d9d9e147d50ba88f59aa.zip
cpython-e4127eaa1ea9104be0a1d9d9e147d50ba88f59aa.tar.gz
cpython-e4127eaa1ea9104be0a1d9d9e147d50ba88f59aa.tar.bz2
gh-104773: PEP 594: Remove the crypt module (#104908)
Remove the crypt module and its private _crypt extension, deprecated in Python 3.11.
Diffstat (limited to 'Lib/test/test_crypt.py')
-rw-r--r--Lib/test/test_crypt.py112
1 files changed, 0 insertions, 112 deletions
diff --git a/Lib/test/test_crypt.py b/Lib/test/test_crypt.py
deleted file mode 100644
index b2a5ce6..0000000
--- a/Lib/test/test_crypt.py
+++ /dev/null
@@ -1,112 +0,0 @@
-import sys
-import unittest
-from test.support import check_sanitizer, warnings_helper
-
-
-try:
- if check_sanitizer(address=True, memory=True):
- raise unittest.SkipTest("The crypt module SEGFAULTs on ASAN/MSAN builds")
- crypt = warnings_helper.import_deprecated("crypt")
- IMPORT_ERROR = None
-except ImportError as ex:
- if sys.platform != 'win32':
- raise unittest.SkipTest(str(ex))
- crypt = None
- IMPORT_ERROR = str(ex)
-
-
-@unittest.skipUnless(sys.platform == 'win32', 'This should only run on windows')
-@unittest.skipIf(crypt, 'import succeeded')
-class TestWhyCryptDidNotImport(unittest.TestCase):
-
- def test_import_failure_message(self):
- self.assertIn('not supported', IMPORT_ERROR)
-
-
-@unittest.skipUnless(crypt, 'crypt module is required')
-class CryptTestCase(unittest.TestCase):
-
- def test_crypt(self):
- cr = crypt.crypt('mypassword')
- cr2 = crypt.crypt('mypassword', cr)
- self.assertEqual(cr2, cr)
- cr = crypt.crypt('mypassword', 'ab')
- if cr is not None:
- cr2 = crypt.crypt('mypassword', cr)
- self.assertEqual(cr2, cr)
-
- def test_salt(self):
- self.assertEqual(len(crypt._saltchars), 64)
- for method in crypt.methods:
- salt = crypt.mksalt(method)
- self.assertIn(len(salt) - method.salt_chars, {0, 1, 3, 4, 6, 7})
- if method.ident:
- self.assertIn(method.ident, salt[:len(salt)-method.salt_chars])
-
- def test_saltedcrypt(self):
- for method in crypt.methods:
- cr = crypt.crypt('assword', method)
- self.assertEqual(len(cr), method.total_size)
- cr2 = crypt.crypt('assword', cr)
- self.assertEqual(cr2, cr)
- cr = crypt.crypt('assword', crypt.mksalt(method))
- self.assertEqual(len(cr), method.total_size)
-
- def test_methods(self):
- self.assertTrue(len(crypt.methods) >= 1)
- if sys.platform.startswith('openbsd'):
- self.assertEqual(crypt.methods, [crypt.METHOD_BLOWFISH])
- else:
- self.assertEqual(crypt.methods[-1], crypt.METHOD_CRYPT)
-
- @unittest.skipUnless(
- crypt
- and (
- crypt.METHOD_SHA256 in crypt.methods or crypt.METHOD_SHA512 in crypt.methods
- ),
- 'requires support of SHA-2',
- )
- def test_sha2_rounds(self):
- for method in (crypt.METHOD_SHA256, crypt.METHOD_SHA512):
- for rounds in 1000, 10_000, 100_000:
- salt = crypt.mksalt(method, rounds=rounds)
- self.assertIn('$rounds=%d$' % rounds, salt)
- self.assertEqual(len(salt) - method.salt_chars,
- 11 + len(str(rounds)))
- cr = crypt.crypt('mypassword', salt)
- self.assertTrue(cr)
- cr2 = crypt.crypt('mypassword', cr)
- self.assertEqual(cr2, cr)
-
- @unittest.skipUnless(
- crypt and crypt.METHOD_BLOWFISH in crypt.methods, 'requires support of Blowfish'
- )
- def test_blowfish_rounds(self):
- for log_rounds in range(4, 11):
- salt = crypt.mksalt(crypt.METHOD_BLOWFISH, rounds=1 << log_rounds)
- self.assertIn('$%02d$' % log_rounds, salt)
- self.assertIn(len(salt) - crypt.METHOD_BLOWFISH.salt_chars, {6, 7})
- cr = crypt.crypt('mypassword', salt)
- self.assertTrue(cr)
- cr2 = crypt.crypt('mypassword', cr)
- self.assertEqual(cr2, cr)
-
- def test_invalid_rounds(self):
- for method in (crypt.METHOD_SHA256, crypt.METHOD_SHA512,
- crypt.METHOD_BLOWFISH):
- with self.assertRaises(TypeError):
- crypt.mksalt(method, rounds='4096')
- with self.assertRaises(TypeError):
- crypt.mksalt(method, rounds=4096.0)
- for rounds in (0, 1, -1, 1<<999):
- with self.assertRaises(ValueError):
- crypt.mksalt(method, rounds=rounds)
- with self.assertRaises(ValueError):
- crypt.mksalt(crypt.METHOD_BLOWFISH, rounds=1000)
- for method in (crypt.METHOD_CRYPT, crypt.METHOD_MD5):
- with self.assertRaisesRegex(ValueError, 'support'):
- crypt.mksalt(method, rounds=4096)
-
-
-if __name__ == "__main__":
- unittest.main()