test_hashers.py 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527
  1. # -*- coding: utf-8 -*-
  2. from __future__ import unicode_literals
  3. from unittest import skipUnless
  4. from django.conf.global_settings import PASSWORD_HASHERS
  5. from django.contrib.auth.hashers import (
  6. UNUSABLE_PASSWORD_PREFIX, UNUSABLE_PASSWORD_SUFFIX_LENGTH,
  7. BasePasswordHasher, PBKDF2PasswordHasher, PBKDF2SHA1PasswordHasher,
  8. check_password, get_hasher, identify_hasher, is_password_usable,
  9. make_password,
  10. )
  11. from django.test import SimpleTestCase, mock
  12. from django.test.utils import override_settings
  13. from django.utils import six
  14. from django.utils.encoding import force_bytes
  15. try:
  16. import crypt
  17. except ImportError:
  18. crypt = None
  19. else:
  20. # On some platforms (e.g. OpenBSD), crypt.crypt() always return None.
  21. if crypt.crypt('', '') is None:
  22. crypt = None
  23. try:
  24. import bcrypt
  25. except ImportError:
  26. bcrypt = None
  27. try:
  28. import argon2
  29. except ImportError:
  30. argon2 = None
  31. class PBKDF2SingleIterationHasher(PBKDF2PasswordHasher):
  32. iterations = 1
  33. @override_settings(PASSWORD_HASHERS=PASSWORD_HASHERS)
  34. class TestUtilsHashPass(SimpleTestCase):
  35. def test_simple(self):
  36. encoded = make_password('lètmein')
  37. self.assertTrue(encoded.startswith('pbkdf2_sha256$'))
  38. self.assertTrue(is_password_usable(encoded))
  39. self.assertTrue(check_password('lètmein', encoded))
  40. self.assertFalse(check_password('lètmeinz', encoded))
  41. # Blank passwords
  42. blank_encoded = make_password('')
  43. self.assertTrue(blank_encoded.startswith('pbkdf2_sha256$'))
  44. self.assertTrue(is_password_usable(blank_encoded))
  45. self.assertTrue(check_password('', blank_encoded))
  46. self.assertFalse(check_password(' ', blank_encoded))
  47. def test_pbkdf2(self):
  48. encoded = make_password('lètmein', 'seasalt', 'pbkdf2_sha256')
  49. self.assertEqual(encoded, 'pbkdf2_sha256$30000$seasalt$VrX+V8drCGo68wlvy6rfu8i1d1pfkdeXA4LJkRGJodY=')
  50. self.assertTrue(is_password_usable(encoded))
  51. self.assertTrue(check_password('lètmein', encoded))
  52. self.assertFalse(check_password('lètmeinz', encoded))
  53. self.assertEqual(identify_hasher(encoded).algorithm, "pbkdf2_sha256")
  54. # Blank passwords
  55. blank_encoded = make_password('', 'seasalt', 'pbkdf2_sha256')
  56. self.assertTrue(blank_encoded.startswith('pbkdf2_sha256$'))
  57. self.assertTrue(is_password_usable(blank_encoded))
  58. self.assertTrue(check_password('', blank_encoded))
  59. self.assertFalse(check_password(' ', blank_encoded))
  60. @override_settings(PASSWORD_HASHERS=['django.contrib.auth.hashers.SHA1PasswordHasher'])
  61. def test_sha1(self):
  62. encoded = make_password('lètmein', 'seasalt', 'sha1')
  63. self.assertEqual(encoded, 'sha1$seasalt$cff36ea83f5706ce9aa7454e63e431fc726b2dc8')
  64. self.assertTrue(is_password_usable(encoded))
  65. self.assertTrue(check_password('lètmein', encoded))
  66. self.assertFalse(check_password('lètmeinz', encoded))
  67. self.assertEqual(identify_hasher(encoded).algorithm, "sha1")
  68. # Blank passwords
  69. blank_encoded = make_password('', 'seasalt', 'sha1')
  70. self.assertTrue(blank_encoded.startswith('sha1$'))
  71. self.assertTrue(is_password_usable(blank_encoded))
  72. self.assertTrue(check_password('', blank_encoded))
  73. self.assertFalse(check_password(' ', blank_encoded))
  74. @override_settings(PASSWORD_HASHERS=['django.contrib.auth.hashers.MD5PasswordHasher'])
  75. def test_md5(self):
  76. encoded = make_password('lètmein', 'seasalt', 'md5')
  77. self.assertEqual(encoded, 'md5$seasalt$3f86d0d3d465b7b458c231bf3555c0e3')
  78. self.assertTrue(is_password_usable(encoded))
  79. self.assertTrue(check_password('lètmein', encoded))
  80. self.assertFalse(check_password('lètmeinz', encoded))
  81. self.assertEqual(identify_hasher(encoded).algorithm, "md5")
  82. # Blank passwords
  83. blank_encoded = make_password('', 'seasalt', 'md5')
  84. self.assertTrue(blank_encoded.startswith('md5$'))
  85. self.assertTrue(is_password_usable(blank_encoded))
  86. self.assertTrue(check_password('', blank_encoded))
  87. self.assertFalse(check_password(' ', blank_encoded))
  88. @override_settings(PASSWORD_HASHERS=['django.contrib.auth.hashers.UnsaltedMD5PasswordHasher'])
  89. def test_unsalted_md5(self):
  90. encoded = make_password('lètmein', '', 'unsalted_md5')
  91. self.assertEqual(encoded, '88a434c88cca4e900f7874cd98123f43')
  92. self.assertTrue(is_password_usable(encoded))
  93. self.assertTrue(check_password('lètmein', encoded))
  94. self.assertFalse(check_password('lètmeinz', encoded))
  95. self.assertEqual(identify_hasher(encoded).algorithm, "unsalted_md5")
  96. # Alternate unsalted syntax
  97. alt_encoded = "md5$$%s" % encoded
  98. self.assertTrue(is_password_usable(alt_encoded))
  99. self.assertTrue(check_password('lètmein', alt_encoded))
  100. self.assertFalse(check_password('lètmeinz', alt_encoded))
  101. # Blank passwords
  102. blank_encoded = make_password('', '', 'unsalted_md5')
  103. self.assertTrue(is_password_usable(blank_encoded))
  104. self.assertTrue(check_password('', blank_encoded))
  105. self.assertFalse(check_password(' ', blank_encoded))
  106. @override_settings(PASSWORD_HASHERS=['django.contrib.auth.hashers.UnsaltedSHA1PasswordHasher'])
  107. def test_unsalted_sha1(self):
  108. encoded = make_password('lètmein', '', 'unsalted_sha1')
  109. self.assertEqual(encoded, 'sha1$$6d138ca3ae545631b3abd71a4f076ce759c5700b')
  110. self.assertTrue(is_password_usable(encoded))
  111. self.assertTrue(check_password('lètmein', encoded))
  112. self.assertFalse(check_password('lètmeinz', encoded))
  113. self.assertEqual(identify_hasher(encoded).algorithm, "unsalted_sha1")
  114. # Raw SHA1 isn't acceptable
  115. alt_encoded = encoded[6:]
  116. self.assertFalse(check_password('lètmein', alt_encoded))
  117. # Blank passwords
  118. blank_encoded = make_password('', '', 'unsalted_sha1')
  119. self.assertTrue(blank_encoded.startswith('sha1$'))
  120. self.assertTrue(is_password_usable(blank_encoded))
  121. self.assertTrue(check_password('', blank_encoded))
  122. self.assertFalse(check_password(' ', blank_encoded))
  123. @skipUnless(crypt, "no crypt module to generate password.")
  124. @override_settings(PASSWORD_HASHERS=['django.contrib.auth.hashers.CryptPasswordHasher'])
  125. def test_crypt(self):
  126. encoded = make_password('lètmei', 'ab', 'crypt')
  127. self.assertEqual(encoded, 'crypt$$ab1Hv2Lg7ltQo')
  128. self.assertTrue(is_password_usable(encoded))
  129. self.assertTrue(check_password('lètmei', encoded))
  130. self.assertFalse(check_password('lètmeiz', encoded))
  131. self.assertEqual(identify_hasher(encoded).algorithm, "crypt")
  132. # Blank passwords
  133. blank_encoded = make_password('', 'ab', 'crypt')
  134. self.assertTrue(blank_encoded.startswith('crypt$'))
  135. self.assertTrue(is_password_usable(blank_encoded))
  136. self.assertTrue(check_password('', blank_encoded))
  137. self.assertFalse(check_password(' ', blank_encoded))
  138. @skipUnless(bcrypt, "bcrypt not installed")
  139. def test_bcrypt_sha256(self):
  140. encoded = make_password('lètmein', hasher='bcrypt_sha256')
  141. self.assertTrue(is_password_usable(encoded))
  142. self.assertTrue(encoded.startswith('bcrypt_sha256$'))
  143. self.assertTrue(check_password('lètmein', encoded))
  144. self.assertFalse(check_password('lètmeinz', encoded))
  145. self.assertEqual(identify_hasher(encoded).algorithm, "bcrypt_sha256")
  146. # Verify that password truncation no longer works
  147. password = (
  148. 'VSK0UYV6FFQVZ0KG88DYN9WADAADZO1CTSIVDJUNZSUML6IBX7LN7ZS3R5'
  149. 'JGB3RGZ7VI7G7DJQ9NI8BQFSRPTG6UWTTVESA5ZPUN'
  150. )
  151. encoded = make_password(password, hasher='bcrypt_sha256')
  152. self.assertTrue(check_password(password, encoded))
  153. self.assertFalse(check_password(password[:72], encoded))
  154. # Blank passwords
  155. blank_encoded = make_password('', hasher='bcrypt_sha256')
  156. self.assertTrue(blank_encoded.startswith('bcrypt_sha256$'))
  157. self.assertTrue(is_password_usable(blank_encoded))
  158. self.assertTrue(check_password('', blank_encoded))
  159. self.assertFalse(check_password(' ', blank_encoded))
  160. @skipUnless(bcrypt, "bcrypt not installed")
  161. def test_bcrypt(self):
  162. encoded = make_password('lètmein', hasher='bcrypt')
  163. self.assertTrue(is_password_usable(encoded))
  164. self.assertTrue(encoded.startswith('bcrypt$'))
  165. self.assertTrue(check_password('lètmein', encoded))
  166. self.assertFalse(check_password('lètmeinz', encoded))
  167. self.assertEqual(identify_hasher(encoded).algorithm, "bcrypt")
  168. # Blank passwords
  169. blank_encoded = make_password('', hasher='bcrypt')
  170. self.assertTrue(blank_encoded.startswith('bcrypt$'))
  171. self.assertTrue(is_password_usable(blank_encoded))
  172. self.assertTrue(check_password('', blank_encoded))
  173. self.assertFalse(check_password(' ', blank_encoded))
  174. @skipUnless(bcrypt, "bcrypt not installed")
  175. def test_bcrypt_upgrade(self):
  176. hasher = get_hasher('bcrypt')
  177. self.assertEqual('bcrypt', hasher.algorithm)
  178. self.assertNotEqual(hasher.rounds, 4)
  179. old_rounds = hasher.rounds
  180. try:
  181. # Generate a password with 4 rounds.
  182. hasher.rounds = 4
  183. encoded = make_password('letmein', hasher='bcrypt')
  184. rounds = hasher.safe_summary(encoded)['work factor']
  185. self.assertEqual(rounds, '04')
  186. state = {'upgraded': False}
  187. def setter(password):
  188. state['upgraded'] = True
  189. # Check that no upgrade is triggered.
  190. self.assertTrue(check_password('letmein', encoded, setter, 'bcrypt'))
  191. self.assertFalse(state['upgraded'])
  192. # Revert to the old rounds count and ...
  193. hasher.rounds = old_rounds
  194. # ... check if the password would get updated to the new count.
  195. self.assertTrue(check_password('letmein', encoded, setter, 'bcrypt'))
  196. self.assertTrue(state['upgraded'])
  197. finally:
  198. hasher.rounds = old_rounds
  199. @skipUnless(bcrypt, "bcrypt not installed")
  200. def test_bcrypt_harden_runtime(self):
  201. hasher = get_hasher('bcrypt')
  202. self.assertEqual('bcrypt', hasher.algorithm)
  203. with mock.patch.object(hasher, 'rounds', 4):
  204. encoded = make_password('letmein', hasher='bcrypt')
  205. with mock.patch.object(hasher, 'rounds', 6), \
  206. mock.patch.object(hasher, 'encode', side_effect=hasher.encode):
  207. hasher.harden_runtime('wrong_password', encoded)
  208. # Increasing rounds from 4 to 6 means an increase of 4 in workload,
  209. # therefore hardening should run 3 times to make the timing the
  210. # same (the original encode() call already ran once).
  211. self.assertEqual(hasher.encode.call_count, 3)
  212. # Get the original salt (includes the original workload factor)
  213. algorithm, data = encoded.split('$', 1)
  214. expected_call = (('wrong_password', force_bytes(data[:29])),)
  215. self.assertEqual(hasher.encode.call_args_list, [expected_call] * 3)
  216. def test_unusable(self):
  217. encoded = make_password(None)
  218. self.assertEqual(len(encoded), len(UNUSABLE_PASSWORD_PREFIX) + UNUSABLE_PASSWORD_SUFFIX_LENGTH)
  219. self.assertFalse(is_password_usable(encoded))
  220. self.assertFalse(check_password(None, encoded))
  221. self.assertFalse(check_password(encoded, encoded))
  222. self.assertFalse(check_password(UNUSABLE_PASSWORD_PREFIX, encoded))
  223. self.assertFalse(check_password('', encoded))
  224. self.assertFalse(check_password('lètmein', encoded))
  225. self.assertFalse(check_password('lètmeinz', encoded))
  226. with self.assertRaises(ValueError):
  227. identify_hasher(encoded)
  228. # Assert that the unusable passwords actually contain a random part.
  229. # This might fail one day due to a hash collision.
  230. self.assertNotEqual(encoded, make_password(None), "Random password collision?")
  231. def test_unspecified_password(self):
  232. """
  233. Makes sure specifying no plain password with a valid encoded password
  234. returns `False`.
  235. """
  236. self.assertFalse(check_password(None, make_password('lètmein')))
  237. def test_bad_algorithm(self):
  238. with self.assertRaises(ValueError):
  239. make_password('lètmein', hasher='lolcat')
  240. with self.assertRaises(ValueError):
  241. identify_hasher('lolcat$salt$hash')
  242. def test_bad_encoded(self):
  243. self.assertFalse(is_password_usable('lètmein_badencoded'))
  244. self.assertFalse(is_password_usable(''))
  245. def test_low_level_pbkdf2(self):
  246. hasher = PBKDF2PasswordHasher()
  247. encoded = hasher.encode('lètmein', 'seasalt2')
  248. self.assertEqual(encoded, 'pbkdf2_sha256$30000$seasalt2$a75qzbogeVhNFeMqhdgyyoqGKpIzYUo651sq57RERew=')
  249. self.assertTrue(hasher.verify('lètmein', encoded))
  250. def test_low_level_pbkdf2_sha1(self):
  251. hasher = PBKDF2SHA1PasswordHasher()
  252. encoded = hasher.encode('lètmein', 'seasalt2')
  253. self.assertEqual(encoded, 'pbkdf2_sha1$30000$seasalt2$pMzU1zNPcydf6wjnJFbiVKwgULc=')
  254. self.assertTrue(hasher.verify('lètmein', encoded))
  255. @override_settings(
  256. PASSWORD_HASHERS=[
  257. 'django.contrib.auth.hashers.PBKDF2PasswordHasher',
  258. 'django.contrib.auth.hashers.SHA1PasswordHasher',
  259. 'django.contrib.auth.hashers.MD5PasswordHasher',
  260. ],
  261. )
  262. def test_upgrade(self):
  263. self.assertEqual('pbkdf2_sha256', get_hasher('default').algorithm)
  264. for algo in ('sha1', 'md5'):
  265. encoded = make_password('lètmein', hasher=algo)
  266. state = {'upgraded': False}
  267. def setter(password):
  268. state['upgraded'] = True
  269. self.assertTrue(check_password('lètmein', encoded, setter))
  270. self.assertTrue(state['upgraded'])
  271. def test_no_upgrade(self):
  272. encoded = make_password('lètmein')
  273. state = {'upgraded': False}
  274. def setter():
  275. state['upgraded'] = True
  276. self.assertFalse(check_password('WRONG', encoded, setter))
  277. self.assertFalse(state['upgraded'])
  278. @override_settings(
  279. PASSWORD_HASHERS=[
  280. 'django.contrib.auth.hashers.PBKDF2PasswordHasher',
  281. 'django.contrib.auth.hashers.SHA1PasswordHasher',
  282. 'django.contrib.auth.hashers.MD5PasswordHasher',
  283. ],
  284. )
  285. def test_no_upgrade_on_incorrect_pass(self):
  286. self.assertEqual('pbkdf2_sha256', get_hasher('default').algorithm)
  287. for algo in ('sha1', 'md5'):
  288. encoded = make_password('lètmein', hasher=algo)
  289. state = {'upgraded': False}
  290. def setter():
  291. state['upgraded'] = True
  292. self.assertFalse(check_password('WRONG', encoded, setter))
  293. self.assertFalse(state['upgraded'])
  294. def test_pbkdf2_upgrade(self):
  295. hasher = get_hasher('default')
  296. self.assertEqual('pbkdf2_sha256', hasher.algorithm)
  297. self.assertNotEqual(hasher.iterations, 1)
  298. old_iterations = hasher.iterations
  299. try:
  300. # Generate a password with 1 iteration.
  301. hasher.iterations = 1
  302. encoded = make_password('letmein')
  303. algo, iterations, salt, hash = encoded.split('$', 3)
  304. self.assertEqual(iterations, '1')
  305. state = {'upgraded': False}
  306. def setter(password):
  307. state['upgraded'] = True
  308. # Check that no upgrade is triggered
  309. self.assertTrue(check_password('letmein', encoded, setter))
  310. self.assertFalse(state['upgraded'])
  311. # Revert to the old iteration count and ...
  312. hasher.iterations = old_iterations
  313. # ... check if the password would get updated to the new iteration count.
  314. self.assertTrue(check_password('letmein', encoded, setter))
  315. self.assertTrue(state['upgraded'])
  316. finally:
  317. hasher.iterations = old_iterations
  318. def test_pbkdf2_harden_runtime(self):
  319. hasher = get_hasher('default')
  320. self.assertEqual('pbkdf2_sha256', hasher.algorithm)
  321. with mock.patch.object(hasher, 'iterations', 1):
  322. encoded = make_password('letmein')
  323. with mock.patch.object(hasher, 'iterations', 6), \
  324. mock.patch.object(hasher, 'encode', side_effect=hasher.encode):
  325. hasher.harden_runtime('wrong_password', encoded)
  326. # Encode should get called once ...
  327. self.assertEqual(hasher.encode.call_count, 1)
  328. # ... with the original salt and 5 iterations.
  329. algorithm, iterations, salt, hash = encoded.split('$', 3)
  330. expected_call = (('wrong_password', salt, 5),)
  331. self.assertEqual(hasher.encode.call_args, expected_call)
  332. def test_pbkdf2_upgrade_new_hasher(self):
  333. hasher = get_hasher('default')
  334. self.assertEqual('pbkdf2_sha256', hasher.algorithm)
  335. self.assertNotEqual(hasher.iterations, 1)
  336. state = {'upgraded': False}
  337. def setter(password):
  338. state['upgraded'] = True
  339. with self.settings(PASSWORD_HASHERS=[
  340. 'auth_tests.test_hashers.PBKDF2SingleIterationHasher']):
  341. encoded = make_password('letmein')
  342. algo, iterations, salt, hash = encoded.split('$', 3)
  343. self.assertEqual(iterations, '1')
  344. # Check that no upgrade is triggered
  345. self.assertTrue(check_password('letmein', encoded, setter))
  346. self.assertFalse(state['upgraded'])
  347. # Revert to the old iteration count and check if the password would get
  348. # updated to the new iteration count.
  349. with self.settings(PASSWORD_HASHERS=[
  350. 'django.contrib.auth.hashers.PBKDF2PasswordHasher',
  351. 'auth_tests.test_hashers.PBKDF2SingleIterationHasher']):
  352. self.assertTrue(check_password('letmein', encoded, setter))
  353. self.assertTrue(state['upgraded'])
  354. def test_check_password_calls_harden_runtime(self):
  355. hasher = get_hasher('default')
  356. encoded = make_password('letmein')
  357. with mock.patch.object(hasher, 'harden_runtime'), \
  358. mock.patch.object(hasher, 'must_update', return_value=True):
  359. # Correct password supplied, no hardening needed
  360. check_password('letmein', encoded)
  361. self.assertEqual(hasher.harden_runtime.call_count, 0)
  362. # Wrong password supplied, hardening needed
  363. check_password('wrong_password', encoded)
  364. self.assertEqual(hasher.harden_runtime.call_count, 1)
  365. def test_load_library_no_algorithm(self):
  366. with self.assertRaises(ValueError) as e:
  367. BasePasswordHasher()._load_library()
  368. self.assertEqual("Hasher 'BasePasswordHasher' doesn't specify a library attribute", str(e.exception))
  369. def test_load_library_importerror(self):
  370. PlainHasher = type(str('PlainHasher'), (BasePasswordHasher,), {'algorithm': 'plain', 'library': 'plain'})
  371. # Python 3 adds quotes around module name
  372. msg = "Couldn't load 'PlainHasher' algorithm library: No module named '?plain'?"
  373. with six.assertRaisesRegex(self, ValueError, msg):
  374. PlainHasher()._load_library()
  375. @skipUnless(argon2, "argon2-cffi not installed")
  376. @override_settings(PASSWORD_HASHERS=PASSWORD_HASHERS)
  377. class TestUtilsHashPassArgon2(SimpleTestCase):
  378. def test_argon2(self):
  379. encoded = make_password('lètmein', hasher='argon2')
  380. self.assertTrue(is_password_usable(encoded))
  381. self.assertTrue(encoded.startswith('argon2$'))
  382. self.assertTrue(check_password('lètmein', encoded))
  383. self.assertFalse(check_password('lètmeinz', encoded))
  384. self.assertEqual(identify_hasher(encoded).algorithm, 'argon2')
  385. # Blank passwords
  386. blank_encoded = make_password('', hasher='argon2')
  387. self.assertTrue(blank_encoded.startswith('argon2$'))
  388. self.assertTrue(is_password_usable(blank_encoded))
  389. self.assertTrue(check_password('', blank_encoded))
  390. self.assertFalse(check_password(' ', blank_encoded))
  391. # Old hashes without version attribute
  392. encoded = (
  393. 'argon2$argon2i$m=8,t=1,p=1$c29tZXNhbHQ$gwQOXSNhxiOxPOA0+PY10P9QFO'
  394. '4NAYysnqRt1GSQLE55m+2GYDt9FEjPMHhP2Cuf0nOEXXMocVrsJAtNSsKyfg'
  395. )
  396. self.assertTrue(check_password('secret', encoded))
  397. self.assertFalse(check_password('wrong', encoded))
  398. def test_argon2_upgrade(self):
  399. self._test_argon2_upgrade('time_cost', 'time cost', 1)
  400. self._test_argon2_upgrade('memory_cost', 'memory cost', 16)
  401. self._test_argon2_upgrade('parallelism', 'parallelism', 1)
  402. def test_argon2_version_upgrade(self):
  403. hasher = get_hasher('argon2')
  404. state = {'upgraded': False}
  405. encoded = (
  406. 'argon2$argon2i$m=8,t=1,p=1$c29tZXNhbHQ$gwQOXSNhxiOxPOA0+PY10P9QFO'
  407. '4NAYysnqRt1GSQLE55m+2GYDt9FEjPMHhP2Cuf0nOEXXMocVrsJAtNSsKyfg'
  408. )
  409. def setter(password):
  410. state['upgraded'] = True
  411. old_m = hasher.memory_cost
  412. old_t = hasher.time_cost
  413. old_p = hasher.parallelism
  414. try:
  415. hasher.memory_cost = 8
  416. hasher.time_cost = 1
  417. hasher.parallelism = 1
  418. self.assertTrue(check_password('secret', encoded, setter, 'argon2'))
  419. self.assertTrue(state['upgraded'])
  420. finally:
  421. hasher.memory_cost = old_m
  422. hasher.time_cost = old_t
  423. hasher.parallelism = old_p
  424. def _test_argon2_upgrade(self, attr, summary_key, new_value):
  425. hasher = get_hasher('argon2')
  426. self.assertEqual('argon2', hasher.algorithm)
  427. self.assertNotEqual(getattr(hasher, attr), new_value)
  428. old_value = getattr(hasher, attr)
  429. try:
  430. # Generate hash with attr set to 1
  431. setattr(hasher, attr, new_value)
  432. encoded = make_password('letmein', hasher='argon2')
  433. attr_value = hasher.safe_summary(encoded)[summary_key]
  434. self.assertEqual(attr_value, new_value)
  435. state = {'upgraded': False}
  436. def setter(password):
  437. state['upgraded'] = True
  438. # Check that no upgrade is triggered.
  439. self.assertTrue(check_password('letmein', encoded, setter, 'argon2'))
  440. self.assertFalse(state['upgraded'])
  441. # Revert to the old rounds count and ...
  442. setattr(hasher, attr, old_value)
  443. # ... check if the password would get updated to the new count.
  444. self.assertTrue(check_password('letmein', encoded, setter, 'argon2'))
  445. self.assertTrue(state['upgraded'])
  446. finally:
  447. setattr(hasher, attr, old_value)