mirror of
https://github.com/dashpay/dash.git
synced 2024-12-27 04:52:59 +01:00
9369fde159
6be7d14d243eeeaaf6b4b98c3359c3e1695f2046 Properly generate salt in rpcauth.py, update tests (Carl Dong) Pull request description: Previously, when iterating over bytes of the generated salt to construct a hex string, only one character would be outputted when the byte is less than 0x10. Meaning that for a 16 byte salt, the hex string might be less than 32 characters and collisions would occur. Tree-SHA512: 7038ecbbac846cd1851112396acd8a04475685f5b6f786e4e7316acba4a56cc711c275b7f52f0f2b6bc6cfdc0c0d9d39c3afeb2c0aff3a30fde516bf642fdf9f
49 lines
1.7 KiB
Python
Executable File
49 lines
1.7 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
# Copyright (c) 2015-2018 The Bitcoin Core developers
|
|
# Distributed under the MIT software license, see the accompanying
|
|
# file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
"""Test share/rpcauth/rpcauth.py
|
|
"""
|
|
import base64
|
|
import configparser
|
|
import hmac
|
|
import importlib
|
|
import os
|
|
import sys
|
|
import unittest
|
|
|
|
class TestRPCAuth(unittest.TestCase):
|
|
def setUp(self):
|
|
config = configparser.ConfigParser()
|
|
config_path = os.path.abspath(
|
|
os.path.join(os.sep, os.path.abspath(os.path.dirname(__file__)),
|
|
"../config.ini"))
|
|
with open(config_path) as config_file:
|
|
config.read_file(config_file)
|
|
sys.path.insert(0, os.path.dirname(config['environment']['RPCAUTH']))
|
|
self.rpcauth = importlib.import_module('rpcauth')
|
|
|
|
def test_generate_salt(self):
|
|
for i in range(16, 32 + 1):
|
|
self.assertEqual(len(self.rpcauth.generate_salt(i)), i * 2)
|
|
|
|
def test_generate_password(self):
|
|
password = self.rpcauth.generate_password()
|
|
expected_password = base64.urlsafe_b64encode(
|
|
base64.urlsafe_b64decode(password)).decode('utf-8')
|
|
self.assertEqual(expected_password, password)
|
|
|
|
def test_check_password_hmac(self):
|
|
salt = self.rpcauth.generate_salt(16)
|
|
password = self.rpcauth.generate_password()
|
|
password_hmac = self.rpcauth.password_to_hmac(salt, password)
|
|
|
|
m = hmac.new(bytearray(salt, 'utf-8'),
|
|
bytearray(password, 'utf-8'), 'SHA256')
|
|
expected_password_hmac = m.hexdigest()
|
|
|
|
self.assertEqual(expected_password_hmac, password_hmac)
|
|
|
|
if __name__ == '__main__':
|
|
unittest.main()
|