test_hashers.py 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566
  1. from unittest import mock, skipUnless
  2. from django.conf.global_settings import PASSWORD_HASHERS
  3. from django.contrib.auth.hashers import (
  4. UNUSABLE_PASSWORD_PREFIX, UNUSABLE_PASSWORD_SUFFIX_LENGTH,
  5. BasePasswordHasher, PBKDF2PasswordHasher, PBKDF2SHA1PasswordHasher,
  6. check_password, get_hasher, identify_hasher, is_password_usable,
  7. make_password,
  8. )
  9. from django.test import SimpleTestCase
  10. from django.test.utils import override_settings
  11. try:
  12. import crypt
  13. except ImportError:
  14. crypt = None
  15. else:
  16. # On some platforms (e.g. OpenBSD), crypt.crypt() always return None.
  17. if crypt.crypt('', '') is None:
  18. crypt = None
  19. try:
  20. import bcrypt
  21. except ImportError:
  22. bcrypt = None
  23. try:
  24. import argon2
  25. except ImportError:
  26. argon2 = None
  27. class PBKDF2SingleIterationHasher(PBKDF2PasswordHasher):
  28. iterations = 1
  29. @override_settings(PASSWORD_HASHERS=PASSWORD_HASHERS)
  30. class TestUtilsHashPass(SimpleTestCase):
  31. def test_simple(self):
  32. encoded = make_password('lètmein')
  33. self.assertTrue(encoded.startswith('pbkdf2_sha256$'))
  34. self.assertTrue(is_password_usable(encoded))
  35. self.assertTrue(check_password('lètmein', encoded))
  36. self.assertFalse(check_password('lètmeinz', encoded))
  37. # Blank passwords
  38. blank_encoded = make_password('')
  39. self.assertTrue(blank_encoded.startswith('pbkdf2_sha256$'))
  40. self.assertTrue(is_password_usable(blank_encoded))
  41. self.assertTrue(check_password('', blank_encoded))
  42. self.assertFalse(check_password(' ', blank_encoded))
  43. def test_pbkdf2(self):
  44. encoded = make_password('lètmein', 'seasalt', 'pbkdf2_sha256')
  45. self.assertEqual(encoded, 'pbkdf2_sha256$100000$seasalt$BNZ6eyaNc8qFTJPjrAq99hSYb73EgAdytAtdBg2Sdcc=')
  46. self.assertTrue(is_password_usable(encoded))
  47. self.assertTrue(check_password('lètmein', encoded))
  48. self.assertFalse(check_password('lètmeinz', encoded))
  49. self.assertEqual(identify_hasher(encoded).algorithm, "pbkdf2_sha256")
  50. # Blank passwords
  51. blank_encoded = make_password('', 'seasalt', 'pbkdf2_sha256')
  52. self.assertTrue(blank_encoded.startswith('pbkdf2_sha256$'))
  53. self.assertTrue(is_password_usable(blank_encoded))
  54. self.assertTrue(check_password('', blank_encoded))
  55. self.assertFalse(check_password(' ', blank_encoded))
  56. @override_settings(PASSWORD_HASHERS=['django.contrib.auth.hashers.SHA1PasswordHasher'])
  57. def test_sha1(self):
  58. encoded = make_password('lètmein', 'seasalt', 'sha1')
  59. self.assertEqual(encoded, 'sha1$seasalt$cff36ea83f5706ce9aa7454e63e431fc726b2dc8')
  60. self.assertTrue(is_password_usable(encoded))
  61. self.assertTrue(check_password('lètmein', encoded))
  62. self.assertFalse(check_password('lètmeinz', encoded))
  63. self.assertEqual(identify_hasher(encoded).algorithm, "sha1")
  64. # Blank passwords
  65. blank_encoded = make_password('', 'seasalt', 'sha1')
  66. self.assertTrue(blank_encoded.startswith('sha1$'))
  67. self.assertTrue(is_password_usable(blank_encoded))
  68. self.assertTrue(check_password('', blank_encoded))
  69. self.assertFalse(check_password(' ', blank_encoded))
  70. @override_settings(PASSWORD_HASHERS=['django.contrib.auth.hashers.MD5PasswordHasher'])
  71. def test_md5(self):
  72. encoded = make_password('lètmein', 'seasalt', 'md5')
  73. self.assertEqual(encoded, 'md5$seasalt$3f86d0d3d465b7b458c231bf3555c0e3')
  74. self.assertTrue(is_password_usable(encoded))
  75. self.assertTrue(check_password('lètmein', encoded))
  76. self.assertFalse(check_password('lètmeinz', encoded))
  77. self.assertEqual(identify_hasher(encoded).algorithm, "md5")
  78. # Blank passwords
  79. blank_encoded = make_password('', 'seasalt', 'md5')
  80. self.assertTrue(blank_encoded.startswith('md5$'))
  81. self.assertTrue(is_password_usable(blank_encoded))
  82. self.assertTrue(check_password('', blank_encoded))
  83. self.assertFalse(check_password(' ', blank_encoded))
  84. @override_settings(PASSWORD_HASHERS=['django.contrib.auth.hashers.UnsaltedMD5PasswordHasher'])
  85. def test_unsalted_md5(self):
  86. encoded = make_password('lètmein', '', 'unsalted_md5')
  87. self.assertEqual(encoded, '88a434c88cca4e900f7874cd98123f43')
  88. self.assertTrue(is_password_usable(encoded))
  89. self.assertTrue(check_password('lètmein', encoded))
  90. self.assertFalse(check_password('lètmeinz', encoded))
  91. self.assertEqual(identify_hasher(encoded).algorithm, "unsalted_md5")
  92. # Alternate unsalted syntax
  93. alt_encoded = "md5$$%s" % encoded
  94. self.assertTrue(is_password_usable(alt_encoded))
  95. self.assertTrue(check_password('lètmein', alt_encoded))
  96. self.assertFalse(check_password('lètmeinz', alt_encoded))
  97. # Blank passwords
  98. blank_encoded = make_password('', '', 'unsalted_md5')
  99. self.assertTrue(is_password_usable(blank_encoded))
  100. self.assertTrue(check_password('', blank_encoded))
  101. self.assertFalse(check_password(' ', blank_encoded))
  102. @override_settings(PASSWORD_HASHERS=['django.contrib.auth.hashers.UnsaltedSHA1PasswordHasher'])
  103. def test_unsalted_sha1(self):
  104. encoded = make_password('lètmein', '', 'unsalted_sha1')
  105. self.assertEqual(encoded, 'sha1$$6d138ca3ae545631b3abd71a4f076ce759c5700b')
  106. self.assertTrue(is_password_usable(encoded))
  107. self.assertTrue(check_password('lètmein', encoded))
  108. self.assertFalse(check_password('lètmeinz', encoded))
  109. self.assertEqual(identify_hasher(encoded).algorithm, "unsalted_sha1")
  110. # Raw SHA1 isn't acceptable
  111. alt_encoded = encoded[6:]
  112. self.assertFalse(check_password('lètmein', alt_encoded))
  113. # Blank passwords
  114. blank_encoded = make_password('', '', 'unsalted_sha1')
  115. self.assertTrue(blank_encoded.startswith('sha1$'))
  116. self.assertTrue(is_password_usable(blank_encoded))
  117. self.assertTrue(check_password('', blank_encoded))
  118. self.assertFalse(check_password(' ', blank_encoded))
  119. @skipUnless(crypt, "no crypt module to generate password.")
  120. @override_settings(PASSWORD_HASHERS=['django.contrib.auth.hashers.CryptPasswordHasher'])
  121. def test_crypt(self):
  122. encoded = make_password('lètmei', 'ab', 'crypt')
  123. self.assertEqual(encoded, 'crypt$$ab1Hv2Lg7ltQo')
  124. self.assertTrue(is_password_usable(encoded))
  125. self.assertTrue(check_password('lètmei', encoded))
  126. self.assertFalse(check_password('lètmeiz', encoded))
  127. self.assertEqual(identify_hasher(encoded).algorithm, "crypt")
  128. # Blank passwords
  129. blank_encoded = make_password('', 'ab', 'crypt')
  130. self.assertTrue(blank_encoded.startswith('crypt$'))
  131. self.assertTrue(is_password_usable(blank_encoded))
  132. self.assertTrue(check_password('', blank_encoded))
  133. self.assertFalse(check_password(' ', blank_encoded))
  134. @skipUnless(bcrypt, "bcrypt not installed")
  135. def test_bcrypt_sha256(self):
  136. encoded = make_password('lètmein', hasher='bcrypt_sha256')
  137. self.assertTrue(is_password_usable(encoded))
  138. self.assertTrue(encoded.startswith('bcrypt_sha256$'))
  139. self.assertTrue(check_password('lètmein', encoded))
  140. self.assertFalse(check_password('lètmeinz', encoded))
  141. self.assertEqual(identify_hasher(encoded).algorithm, "bcrypt_sha256")
  142. # password truncation no longer works
  143. password = (
  144. 'VSK0UYV6FFQVZ0KG88DYN9WADAADZO1CTSIVDJUNZSUML6IBX7LN7ZS3R5'
  145. 'JGB3RGZ7VI7G7DJQ9NI8BQFSRPTG6UWTTVESA5ZPUN'
  146. )
  147. encoded = make_password(password, hasher='bcrypt_sha256')
  148. self.assertTrue(check_password(password, encoded))
  149. self.assertFalse(check_password(password[:72], encoded))
  150. # Blank passwords
  151. blank_encoded = make_password('', hasher='bcrypt_sha256')
  152. self.assertTrue(blank_encoded.startswith('bcrypt_sha256$'))
  153. self.assertTrue(is_password_usable(blank_encoded))
  154. self.assertTrue(check_password('', blank_encoded))
  155. self.assertFalse(check_password(' ', blank_encoded))
  156. @skipUnless(bcrypt, "bcrypt not installed")
  157. @override_settings(PASSWORD_HASHERS=['django.contrib.auth.hashers.BCryptPasswordHasher'])
  158. def test_bcrypt(self):
  159. encoded = make_password('lètmein', hasher='bcrypt')
  160. self.assertTrue(is_password_usable(encoded))
  161. self.assertTrue(encoded.startswith('bcrypt$'))
  162. self.assertTrue(check_password('lètmein', encoded))
  163. self.assertFalse(check_password('lètmeinz', encoded))
  164. self.assertEqual(identify_hasher(encoded).algorithm, "bcrypt")
  165. # Blank passwords
  166. blank_encoded = make_password('', hasher='bcrypt')
  167. self.assertTrue(blank_encoded.startswith('bcrypt$'))
  168. self.assertTrue(is_password_usable(blank_encoded))
  169. self.assertTrue(check_password('', blank_encoded))
  170. self.assertFalse(check_password(' ', blank_encoded))
  171. @skipUnless(bcrypt, "bcrypt not installed")
  172. @override_settings(PASSWORD_HASHERS=['django.contrib.auth.hashers.BCryptPasswordHasher'])
  173. def test_bcrypt_upgrade(self):
  174. hasher = get_hasher('bcrypt')
  175. self.assertEqual('bcrypt', hasher.algorithm)
  176. self.assertNotEqual(hasher.rounds, 4)
  177. old_rounds = hasher.rounds
  178. try:
  179. # Generate a password with 4 rounds.
  180. hasher.rounds = 4
  181. encoded = make_password('letmein', hasher='bcrypt')
  182. rounds = hasher.safe_summary(encoded)['work factor']
  183. self.assertEqual(rounds, '04')
  184. state = {'upgraded': False}
  185. def setter(password):
  186. state['upgraded'] = True
  187. # No upgrade is triggered.
  188. self.assertTrue(check_password('letmein', encoded, setter, 'bcrypt'))
  189. self.assertFalse(state['upgraded'])
  190. # Revert to the old rounds count and ...
  191. hasher.rounds = old_rounds
  192. # ... check if the password would get updated to the new count.
  193. self.assertTrue(check_password('letmein', encoded, setter, 'bcrypt'))
  194. self.assertTrue(state['upgraded'])
  195. finally:
  196. hasher.rounds = old_rounds
  197. @skipUnless(bcrypt, "bcrypt not installed")
  198. @override_settings(PASSWORD_HASHERS=['django.contrib.auth.hashers.BCryptPasswordHasher'])
  199. def test_bcrypt_harden_runtime(self):
  200. hasher = get_hasher('bcrypt')
  201. self.assertEqual('bcrypt', hasher.algorithm)
  202. with mock.patch.object(hasher, 'rounds', 4):
  203. encoded = make_password('letmein', hasher='bcrypt')
  204. with mock.patch.object(hasher, 'rounds', 6), \
  205. mock.patch.object(hasher, 'encode', side_effect=hasher.encode):
  206. hasher.harden_runtime('wrong_password', encoded)
  207. # Increasing rounds from 4 to 6 means an increase of 4 in workload,
  208. # therefore hardening should run 3 times to make the timing the
  209. # same (the original encode() call already ran once).
  210. self.assertEqual(hasher.encode.call_count, 3)
  211. # Get the original salt (includes the original workload factor)
  212. algorithm, data = encoded.split('$', 1)
  213. expected_call = (('wrong_password', data[:29].encode()),)
  214. self.assertEqual(hasher.encode.call_args_list, [expected_call] * 3)
  215. def test_unusable(self):
  216. encoded = make_password(None)
  217. self.assertEqual(len(encoded), len(UNUSABLE_PASSWORD_PREFIX) + UNUSABLE_PASSWORD_SUFFIX_LENGTH)
  218. self.assertFalse(is_password_usable(encoded))
  219. self.assertFalse(check_password(None, encoded))
  220. self.assertFalse(check_password(encoded, encoded))
  221. self.assertFalse(check_password(UNUSABLE_PASSWORD_PREFIX, encoded))
  222. self.assertFalse(check_password('', encoded))
  223. self.assertFalse(check_password('lètmein', encoded))
  224. self.assertFalse(check_password('lètmeinz', encoded))
  225. with self.assertRaisesMessage(ValueError, 'Unknown password hashing algorith'):
  226. identify_hasher(encoded)
  227. # Assert that the unusable passwords actually contain a random part.
  228. # This might fail one day due to a hash collision.
  229. self.assertNotEqual(encoded, make_password(None), "Random password collision?")
  230. def test_unspecified_password(self):
  231. """
  232. Makes sure specifying no plain password with a valid encoded password
  233. returns `False`.
  234. """
  235. self.assertFalse(check_password(None, make_password('lètmein')))
  236. def test_bad_algorithm(self):
  237. msg = (
  238. "Unknown password hashing algorithm '%s'. Did you specify it in "
  239. "the PASSWORD_HASHERS setting?"
  240. )
  241. with self.assertRaisesMessage(ValueError, msg % 'lolcat'):
  242. make_password('lètmein', hasher='lolcat')
  243. with self.assertRaisesMessage(ValueError, msg % 'lolcat'):
  244. identify_hasher('lolcat$salt$hash')
  245. def test_is_password_usable(self):
  246. passwords = ('lètmein_badencoded', '', None)
  247. for password in passwords:
  248. with self.subTest(password=password):
  249. self.assertIs(is_password_usable(password), True)
  250. def test_low_level_pbkdf2(self):
  251. hasher = PBKDF2PasswordHasher()
  252. encoded = hasher.encode('lètmein', 'seasalt2')
  253. self.assertEqual(encoded, 'pbkdf2_sha256$100000$seasalt2$Tl4GMr+Yt1zzO1sbKoUaDBdds5NkR3RxaDWuQsliFrI=')
  254. self.assertTrue(hasher.verify('lètmein', encoded))
  255. def test_low_level_pbkdf2_sha1(self):
  256. hasher = PBKDF2SHA1PasswordHasher()
  257. encoded = hasher.encode('lètmein', 'seasalt2')
  258. self.assertEqual(encoded, 'pbkdf2_sha1$100000$seasalt2$dK/dL+ySBZ5zoR0+Zk3SB/VsH0U=')
  259. self.assertTrue(hasher.verify('lètmein', encoded))
  260. @override_settings(
  261. PASSWORD_HASHERS=[
  262. 'django.contrib.auth.hashers.PBKDF2PasswordHasher',
  263. 'django.contrib.auth.hashers.SHA1PasswordHasher',
  264. 'django.contrib.auth.hashers.MD5PasswordHasher',
  265. ],
  266. )
  267. def test_upgrade(self):
  268. self.assertEqual('pbkdf2_sha256', get_hasher('default').algorithm)
  269. for algo in ('sha1', 'md5'):
  270. with self.subTest(algo=algo):
  271. encoded = make_password('lètmein', hasher=algo)
  272. state = {'upgraded': False}
  273. def setter(password):
  274. state['upgraded'] = True
  275. self.assertTrue(check_password('lètmein', encoded, setter))
  276. self.assertTrue(state['upgraded'])
  277. def test_no_upgrade(self):
  278. encoded = make_password('lètmein')
  279. state = {'upgraded': False}
  280. def setter():
  281. state['upgraded'] = True
  282. self.assertFalse(check_password('WRONG', encoded, setter))
  283. self.assertFalse(state['upgraded'])
  284. @override_settings(
  285. PASSWORD_HASHERS=[
  286. 'django.contrib.auth.hashers.PBKDF2PasswordHasher',
  287. 'django.contrib.auth.hashers.SHA1PasswordHasher',
  288. 'django.contrib.auth.hashers.MD5PasswordHasher',
  289. ],
  290. )
  291. def test_no_upgrade_on_incorrect_pass(self):
  292. self.assertEqual('pbkdf2_sha256', get_hasher('default').algorithm)
  293. for algo in ('sha1', 'md5'):
  294. with self.subTest(algo=algo):
  295. encoded = make_password('lètmein', hasher=algo)
  296. state = {'upgraded': False}
  297. def setter():
  298. state['upgraded'] = True
  299. self.assertFalse(check_password('WRONG', encoded, setter))
  300. self.assertFalse(state['upgraded'])
  301. def test_pbkdf2_upgrade(self):
  302. hasher = get_hasher('default')
  303. self.assertEqual('pbkdf2_sha256', hasher.algorithm)
  304. self.assertNotEqual(hasher.iterations, 1)
  305. old_iterations = hasher.iterations
  306. try:
  307. # Generate a password with 1 iteration.
  308. hasher.iterations = 1
  309. encoded = make_password('letmein')
  310. algo, iterations, salt, hash = encoded.split('$', 3)
  311. self.assertEqual(iterations, '1')
  312. state = {'upgraded': False}
  313. def setter(password):
  314. state['upgraded'] = True
  315. # No upgrade is triggered
  316. self.assertTrue(check_password('letmein', encoded, setter))
  317. self.assertFalse(state['upgraded'])
  318. # Revert to the old iteration count and ...
  319. hasher.iterations = old_iterations
  320. # ... check if the password would get updated to the new iteration count.
  321. self.assertTrue(check_password('letmein', encoded, setter))
  322. self.assertTrue(state['upgraded'])
  323. finally:
  324. hasher.iterations = old_iterations
  325. def test_pbkdf2_harden_runtime(self):
  326. hasher = get_hasher('default')
  327. self.assertEqual('pbkdf2_sha256', hasher.algorithm)
  328. with mock.patch.object(hasher, 'iterations', 1):
  329. encoded = make_password('letmein')
  330. with mock.patch.object(hasher, 'iterations', 6), \
  331. mock.patch.object(hasher, 'encode', side_effect=hasher.encode):
  332. hasher.harden_runtime('wrong_password', encoded)
  333. # Encode should get called once ...
  334. self.assertEqual(hasher.encode.call_count, 1)
  335. # ... with the original salt and 5 iterations.
  336. algorithm, iterations, salt, hash = encoded.split('$', 3)
  337. expected_call = (('wrong_password', salt, 5),)
  338. self.assertEqual(hasher.encode.call_args, expected_call)
  339. def test_pbkdf2_upgrade_new_hasher(self):
  340. hasher = get_hasher('default')
  341. self.assertEqual('pbkdf2_sha256', hasher.algorithm)
  342. self.assertNotEqual(hasher.iterations, 1)
  343. state = {'upgraded': False}
  344. def setter(password):
  345. state['upgraded'] = True
  346. with self.settings(PASSWORD_HASHERS=[
  347. 'auth_tests.test_hashers.PBKDF2SingleIterationHasher']):
  348. encoded = make_password('letmein')
  349. algo, iterations, salt, hash = encoded.split('$', 3)
  350. self.assertEqual(iterations, '1')
  351. # No upgrade is triggered
  352. self.assertTrue(check_password('letmein', encoded, setter))
  353. self.assertFalse(state['upgraded'])
  354. # Revert to the old iteration count and check if the password would get
  355. # updated to the new iteration count.
  356. with self.settings(PASSWORD_HASHERS=[
  357. 'django.contrib.auth.hashers.PBKDF2PasswordHasher',
  358. 'auth_tests.test_hashers.PBKDF2SingleIterationHasher']):
  359. self.assertTrue(check_password('letmein', encoded, setter))
  360. self.assertTrue(state['upgraded'])
  361. def test_check_password_calls_harden_runtime(self):
  362. hasher = get_hasher('default')
  363. encoded = make_password('letmein')
  364. with mock.patch.object(hasher, 'harden_runtime'), \
  365. mock.patch.object(hasher, 'must_update', return_value=True):
  366. # Correct password supplied, no hardening needed
  367. check_password('letmein', encoded)
  368. self.assertEqual(hasher.harden_runtime.call_count, 0)
  369. # Wrong password supplied, hardening needed
  370. check_password('wrong_password', encoded)
  371. self.assertEqual(hasher.harden_runtime.call_count, 1)
  372. class BasePasswordHasherTests(SimpleTestCase):
  373. not_implemented_msg = 'subclasses of BasePasswordHasher must provide %s() method'
  374. def setUp(self):
  375. self.hasher = BasePasswordHasher()
  376. def test_load_library_no_algorithm(self):
  377. msg = "Hasher 'BasePasswordHasher' doesn't specify a library attribute"
  378. with self.assertRaisesMessage(ValueError, msg):
  379. self.hasher._load_library()
  380. def test_load_library_importerror(self):
  381. PlainHasher = type('PlainHasher', (BasePasswordHasher,), {'algorithm': 'plain', 'library': 'plain'})
  382. msg = "Couldn't load 'PlainHasher' algorithm library: No module named 'plain'"
  383. with self.assertRaisesMessage(ValueError, msg):
  384. PlainHasher()._load_library()
  385. def test_attributes(self):
  386. self.assertIsNone(self.hasher.algorithm)
  387. self.assertIsNone(self.hasher.library)
  388. def test_encode(self):
  389. msg = self.not_implemented_msg % 'an encode'
  390. with self.assertRaisesMessage(NotImplementedError, msg):
  391. self.hasher.encode('password', 'salt')
  392. def test_harden_runtime(self):
  393. msg = 'subclasses of BasePasswordHasher should provide a harden_runtime() method'
  394. with self.assertWarns(Warning, msg=msg):
  395. self.hasher.harden_runtime('password', 'encoded')
  396. def test_must_update(self):
  397. self.assertIs(self.hasher.must_update('encoded'), False)
  398. def test_safe_summary(self):
  399. msg = self.not_implemented_msg % 'a safe_summary'
  400. with self.assertRaisesMessage(NotImplementedError, msg):
  401. self.hasher.safe_summary('encoded')
  402. def test_verify(self):
  403. msg = self.not_implemented_msg % 'a verify'
  404. with self.assertRaisesMessage(NotImplementedError, msg):
  405. self.hasher.verify('password', 'encoded')
  406. @skipUnless(argon2, "argon2-cffi not installed")
  407. @override_settings(PASSWORD_HASHERS=PASSWORD_HASHERS)
  408. class TestUtilsHashPassArgon2(SimpleTestCase):
  409. def test_argon2(self):
  410. encoded = make_password('lètmein', hasher='argon2')
  411. self.assertTrue(is_password_usable(encoded))
  412. self.assertTrue(encoded.startswith('argon2$'))
  413. self.assertTrue(check_password('lètmein', encoded))
  414. self.assertFalse(check_password('lètmeinz', encoded))
  415. self.assertEqual(identify_hasher(encoded).algorithm, 'argon2')
  416. # Blank passwords
  417. blank_encoded = make_password('', hasher='argon2')
  418. self.assertTrue(blank_encoded.startswith('argon2$'))
  419. self.assertTrue(is_password_usable(blank_encoded))
  420. self.assertTrue(check_password('', blank_encoded))
  421. self.assertFalse(check_password(' ', blank_encoded))
  422. # Old hashes without version attribute
  423. encoded = (
  424. 'argon2$argon2i$m=8,t=1,p=1$c29tZXNhbHQ$gwQOXSNhxiOxPOA0+PY10P9QFO'
  425. '4NAYysnqRt1GSQLE55m+2GYDt9FEjPMHhP2Cuf0nOEXXMocVrsJAtNSsKyfg'
  426. )
  427. self.assertTrue(check_password('secret', encoded))
  428. self.assertFalse(check_password('wrong', encoded))
  429. def test_argon2_upgrade(self):
  430. self._test_argon2_upgrade('time_cost', 'time cost', 1)
  431. self._test_argon2_upgrade('memory_cost', 'memory cost', 16)
  432. self._test_argon2_upgrade('parallelism', 'parallelism', 1)
  433. def test_argon2_version_upgrade(self):
  434. hasher = get_hasher('argon2')
  435. state = {'upgraded': False}
  436. encoded = (
  437. 'argon2$argon2i$m=8,t=1,p=1$c29tZXNhbHQ$gwQOXSNhxiOxPOA0+PY10P9QFO'
  438. '4NAYysnqRt1GSQLE55m+2GYDt9FEjPMHhP2Cuf0nOEXXMocVrsJAtNSsKyfg'
  439. )
  440. def setter(password):
  441. state['upgraded'] = True
  442. old_m = hasher.memory_cost
  443. old_t = hasher.time_cost
  444. old_p = hasher.parallelism
  445. try:
  446. hasher.memory_cost = 8
  447. hasher.time_cost = 1
  448. hasher.parallelism = 1
  449. self.assertTrue(check_password('secret', encoded, setter, 'argon2'))
  450. self.assertTrue(state['upgraded'])
  451. finally:
  452. hasher.memory_cost = old_m
  453. hasher.time_cost = old_t
  454. hasher.parallelism = old_p
  455. def _test_argon2_upgrade(self, attr, summary_key, new_value):
  456. hasher = get_hasher('argon2')
  457. self.assertEqual('argon2', hasher.algorithm)
  458. self.assertNotEqual(getattr(hasher, attr), new_value)
  459. old_value = getattr(hasher, attr)
  460. try:
  461. # Generate hash with attr set to 1
  462. setattr(hasher, attr, new_value)
  463. encoded = make_password('letmein', hasher='argon2')
  464. attr_value = hasher.safe_summary(encoded)[summary_key]
  465. self.assertEqual(attr_value, new_value)
  466. state = {'upgraded': False}
  467. def setter(password):
  468. state['upgraded'] = True
  469. # No upgrade is triggered.
  470. self.assertTrue(check_password('letmein', encoded, setter, 'argon2'))
  471. self.assertFalse(state['upgraded'])
  472. # Revert to the old rounds count and ...
  473. setattr(hasher, attr, old_value)
  474. # ... check if the password would get updated to the new count.
  475. self.assertTrue(check_password('letmein', encoded, setter, 'argon2'))
  476. self.assertTrue(state['upgraded'])
  477. finally:
  478. setattr(hasher, attr, old_value)