diff sat/test/test_memory_crypto.py @ 2562:26edcf3a30eb

core, setup: huge cleaning: - moved directories from src and frontends/src to sat and sat_frontends, which is the recommanded naming convention - move twisted directory to root - removed all hacks from setup.py, and added missing dependencies, it is now clean - use https URL for website in setup.py - removed "Environment :: X11 Applications :: GTK", as wix is deprecated and removed - renamed sat.sh to sat and fixed its installation - added python_requires to specify Python version needed - replaced glib2reactor which use deprecated code by gtk3reactor sat can now be installed directly from virtualenv without using --system-site-packages anymore \o/
author Goffi <goffi@goffi.org>
date Mon, 02 Apr 2018 19:44:50 +0200
parents src/test/test_memory_crypto.py@2daf7b4c6756
children 56f94936df1e
line wrap: on
line diff
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/sat/test/test_memory_crypto.py	Mon Apr 02 19:44:50 2018 +0200
@@ -0,0 +1,72 @@
+#!/usr/bin/env python2
+# -*- coding: utf-8 -*-
+
+# SAT: a jabber client
+# Copyright (C) 2009-2016  Jérôme Poisson (goffi@goffi.org)
+# Copyright (C) 2013-2016  Adrien Cossa (souliane@mailoo.org)
+
+# This program is free software: you can redistribute it and/or modify
+# it under the terms of the GNU Affero General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU Affero General Public License for more details.
+
+# You should have received a copy of the GNU Affero General Public License
+# along with this program.  If not, see <http://www.gnu.org/licenses/>.
+
+
+""" Tests for the plugin radiocol """
+
+from sat.test import helpers
+from sat.memory.crypto import BlockCipher, PasswordHasher
+import random
+import string
+from twisted.internet import defer
+
+
+def getRandomUnicode(len):
+    """Return a random unicode string"""
+    return u''.join(random.choice(string.letters + u"éáúóâêûôßüöä") for i in xrange(len))
+
+
+class CryptoTest(helpers.SatTestCase):
+
+    def setUp(self):
+        self.host = helpers.FakeSAT()
+
+    def test_encrypt_decrypt(self):
+        d_list = []
+
+        def test(key, message):
+            d = BlockCipher.encrypt(key, message)
+            d.addCallback(lambda ciphertext: BlockCipher.decrypt(key, ciphertext))
+            d.addCallback(lambda decrypted: self.assertEqual(message, decrypted))
+            d_list.append(d)
+
+        for key_len in (0, 2, 8, 10, 16, 24, 30, 32, 40):
+            key = getRandomUnicode(key_len)
+            for message_len in (0, 2, 16, 24, 32, 100):
+                message = getRandomUnicode(message_len)
+                test(key, message)
+        return defer.DeferredList(d_list)
+
+    def test_hash_verify(self):
+        d_list = []
+        for password in (0, 2, 8, 10, 16, 24, 30, 32, 40):
+            d = PasswordHasher.hash(password)
+
+            def cb(hashed):
+                d1 = PasswordHasher.verify(password, hashed)
+                d1.addCallback(lambda result: self.assertTrue(result))
+                d_list.append(d1)
+                attempt = getRandomUnicode(10)
+                d2 = PasswordHasher.verify(attempt, hashed)
+                d2.addCallback(lambda result: self.assertFalse(result))
+                d_list.append(d2)
+
+            d.addCallback(cb)
+        return defer.DeferredList(d_list)