From 698d0fbbda6a3d390bf34ec6f7a9bcd8a8862c5b Mon Sep 17 00:00:00 2001 From: philsmd Date: Wed, 26 Aug 2020 12:49:54 +0200 Subject: [PATCH] tests: added Python 3 support and make it default --- docs/changes.txt | 1 + tools/install_modules.sh | 10 +++++----- tools/test_modules/m11700.pm | 5 ++--- tools/test_modules/m11750.pm | 4 ++-- tools/test_modules/m11760.pm | 4 ++-- tools/test_modules/m11800.pm | 4 ++-- tools/test_modules/m11850.pm | 4 ++-- tools/test_modules/m11860.pm | 4 ++-- tools/test_modules/m20011.pm | 36 ++++++++++++++++++------------------ tools/test_modules/m20012.pm | 36 ++++++++++++++++++------------------ tools/test_modules/m20013.pm | 36 ++++++++++++++++++------------------ 11 files changed, 72 insertions(+), 72 deletions(-) diff --git a/docs/changes.txt b/docs/changes.txt index d0c494452..3be8a4d82 100644 --- a/docs/changes.txt +++ b/docs/changes.txt @@ -32,6 +32,7 @@ - Hash-Mode 13200 (AxCrypt): Changed the name to AxCrypt 1 to avoid confusion - Hash-Mode 13300 (AxCrypt in-memory SHA1): Changed the name to AxCrypt 1 in-memory SHA1 +- Unit tests: Added Python 3 support for all of the Python code in our test framework * changes v6.1.0 -> v6.1.1 diff --git a/tools/install_modules.sh b/tools/install_modules.sh index b8c578a3f..61d016d2c 100755 --- a/tools/install_modules.sh +++ b/tools/install_modules.sh @@ -63,13 +63,13 @@ cpan install Authen::Passphrase::LANManager \ ERRORS=$((ERRORS+$?)) -pip2 install pygost +pip install pygost -# pip2 uninstall -y pycryptoplus pycrypto pycryptodome +# pip uninstall -y pycryptoplus pycrypto pycryptodome -pip2 install pycryptoplus -pip2 uninstall -y pycryptodome -pip2 install pycrypto +pip install pycryptoplus +pip uninstall -y pycryptodome +pip install pycrypto ERRORS=$((ERRORS+$?)) diff --git a/tools/test_modules/m11700.pm b/tools/test_modules/m11700.pm index 94603d172..52e05c9b1 100644 --- a/tools/test_modules/m11700.pm +++ b/tools/test_modules/m11700.pm @@ -16,18 +16,17 @@ sub module_generate_hash # PyGOST outputs digests in little-endian order, while the kernels # expect them in big-endian; hence the digest[::-1] mirroring. - # Using sys.stdout.write instead of print to disable \n character. my $python_code = <<"END_CODE"; import binascii import sys from pygost import gost34112012256 digest = gost34112012256.new (b"$word").digest () -sys.stdout.write (binascii.hexlify (digest[::-1])) +print (binascii.hexlify (digest[::-1]).decode (), end = "") END_CODE - my $hash = `python2 -c '$python_code'`; + my $hash = `python -c '$python_code'`; return $hash; } diff --git a/tools/test_modules/m11750.pm b/tools/test_modules/m11750.pm index 73d28cae7..8175e8b01 100644 --- a/tools/test_modules/m11750.pm +++ b/tools/test_modules/m11750.pm @@ -23,11 +23,11 @@ from pygost import gost34112012256 key = b"$word" msg = b"$salt" digest = hmac.new (key, msg, gost34112012256).digest () -sys.stdout.write (binascii.hexlify (digest[::-1])) +print (binascii.hexlify (digest[::-1]).decode (), end = "") END_CODE - my $digest = `python2 -c '$python_code'`; + my $digest = `python -c '$python_code'`; my $hash = sprintf ("%s:%s", $digest, $salt); diff --git a/tools/test_modules/m11760.pm b/tools/test_modules/m11760.pm index e1edcbaee..badaa1504 100644 --- a/tools/test_modules/m11760.pm +++ b/tools/test_modules/m11760.pm @@ -23,11 +23,11 @@ from pygost import gost34112012256 key = b"$salt" msg = b"$word" digest = hmac.new (key, msg, gost34112012256).digest () -sys.stdout.write (binascii.hexlify (digest[::-1])) +print (binascii.hexlify (digest[::-1]).decode (), end = "") END_CODE - my $digest = `python2 -c '$python_code'`; + my $digest = `python -c '$python_code'`; my $hash = sprintf ("%s:%s", $digest, $salt); diff --git a/tools/test_modules/m11800.pm b/tools/test_modules/m11800.pm index 7dd297847..c6b350d4f 100644 --- a/tools/test_modules/m11800.pm +++ b/tools/test_modules/m11800.pm @@ -20,11 +20,11 @@ import binascii import sys from pygost import gost34112012512 digest = gost34112012512.new (b"$word").digest () -sys.stdout.write (binascii.hexlify (digest[::-1])) +print (binascii.hexlify (digest[::-1]).decode (), end = "") END_CODE - my $hash = `python2 -c '$python_code'`; + my $hash = `python -c '$python_code'`; return $hash; } diff --git a/tools/test_modules/m11850.pm b/tools/test_modules/m11850.pm index 21bb4dc3c..e93a31dac 100644 --- a/tools/test_modules/m11850.pm +++ b/tools/test_modules/m11850.pm @@ -24,11 +24,11 @@ from pygost import gost34112012512 key = b"$word" msg = b"$salt" digest = hmac.new (key, msg, gost34112012512).digest () -sys.stdout.write (binascii.hexlify (digest[::-1])) +print (binascii.hexlify (digest[::-1]).decode (), end = "") END_CODE - my $digest = `python2 -c '$python_code'`; + my $digest = `python -c '$python_code'`; my $hash = sprintf ("%s:%s", $digest, $salt); diff --git a/tools/test_modules/m11860.pm b/tools/test_modules/m11860.pm index 17d78fc8c..37e9cbd8c 100644 --- a/tools/test_modules/m11860.pm +++ b/tools/test_modules/m11860.pm @@ -24,11 +24,11 @@ from pygost import gost34112012512 key = b"$salt" msg = b"$word" digest = hmac.new (key, msg, gost34112012512).digest () -sys.stdout.write (binascii.hexlify (digest[::-1])) +print (binascii.hexlify (digest[::-1]).decode (), end = "") END_CODE - my $digest = `python2 -c '$python_code'`; + my $digest = `python -c '$python_code'`; my $hash = sprintf ("%s:%s", $digest, $salt); diff --git a/tools/test_modules/m20011.pm b/tools/test_modules/m20011.pm index 2d69ffe91..18ef71468 100644 --- a/tools/test_modules/m20011.pm +++ b/tools/test_modules/m20011.pm @@ -34,11 +34,11 @@ key = (key1, key2) cipher = AES.new (key, AES.MODE_XTS) -sequence = "01".decode ("hex") +sequence = b"\x01" encrypted = cipher.encrypt (base64.b64decode (data), sequence) -print encrypted.encode ("hex") +print (encrypted.hex ()) END_CODE @@ -48,7 +48,7 @@ END_CODE $python_code =~ s/key_tweak/"$key_tweak"/; $python_code =~ s/data/"$data_base64"/; - my $output_buf = `python2 -c '$python_code'`; + my $output_buf = `python -c '$python_code'`; $output_buf =~ s/[\r\n]//g; @@ -77,11 +77,11 @@ key = (key1, key2) cipher = AES.new (key, AES.MODE_XTS) -sequence = "01".decode ("hex") +sequence = b"\x01" decrypted = cipher.decrypt (base64.b64decode (data), sequence) -print decrypted.encode ("hex") +print (decrypted.hex ()) END_CODE @@ -91,7 +91,7 @@ END_CODE $python_code =~ s/key_tweak/"$key_tweak"/; $python_code =~ s/data/"$data_base64"/; - my $output_buf = `python2 -c '$python_code'`; + my $output_buf = `python -c '$python_code'`; $output_buf =~ s/[\r\n]//g; @@ -122,11 +122,11 @@ key = (key1, key2) cipher = python_Twofish.new (key, python_Twofish.MODE_XTS) -sequence = "01".decode ("hex") +sequence = b"\x01" encrypted = cipher.encrypt (base64.b64decode (data), sequence) -print encrypted.encode ("hex") +print (encrypted.hex ()) END_CODE @@ -136,7 +136,7 @@ END_CODE $python_code =~ s/key_tweak/"$key_tweak"/; $python_code =~ s/data/"$data_base64"/; - my $output_buf = `python2 -c '$python_code'`; + my $output_buf = `python -c '$python_code'`; $output_buf =~ s/[\r\n]//g; @@ -165,11 +165,11 @@ key = (key1, key2) cipher = python_Twofish.new (key, python_Twofish.MODE_XTS) -sequence = "01".decode ("hex") +sequence = b"\x01" decrypted = cipher.decrypt (base64.b64decode (data), sequence) -print decrypted.encode ("hex") +print (decrypted.hex ()) END_CODE @@ -179,7 +179,7 @@ END_CODE $python_code =~ s/key_tweak/"$key_tweak"/; $python_code =~ s/data/"$data_base64"/; - my $output_buf = `python2 -c '$python_code'`; + my $output_buf = `python -c '$python_code'`; $output_buf =~ s/[\r\n]//g; @@ -210,11 +210,11 @@ key = (key1, key2) cipher = python_Serpent.new (key, python_Serpent.MODE_XTS) -sequence = "01".decode ("hex") +sequence = b"\x01" encrypted = cipher.encrypt (base64.b64decode (data), sequence) -print encrypted.encode ("hex") +print (encrypted.hex ()) END_CODE @@ -224,7 +224,7 @@ END_CODE $python_code =~ s/key_tweak/"$key_tweak"/; $python_code =~ s/data/"$data_base64"/; - my $output_buf = `python2 -c '$python_code'`; + my $output_buf = `python -c '$python_code'`; $output_buf =~ s/[\r\n]//g; @@ -253,11 +253,11 @@ key = (key1, key2) cipher = python_Serpent.new (key, python_Serpent.MODE_XTS) -sequence = "01".decode ("hex") +sequence = b"\x01" decrypted = cipher.decrypt (base64.b64decode (data), sequence) -print decrypted.encode ("hex") +print (decrypted.hex ()) END_CODE @@ -267,7 +267,7 @@ END_CODE $python_code =~ s/key_tweak/"$key_tweak"/; $python_code =~ s/data/"$data_base64"/; - my $output_buf = `python2 -c '$python_code'`; + my $output_buf = `python -c '$python_code'`; $output_buf =~ s/[\r\n]//g; diff --git a/tools/test_modules/m20012.pm b/tools/test_modules/m20012.pm index 0a945efd2..93ed77dca 100644 --- a/tools/test_modules/m20012.pm +++ b/tools/test_modules/m20012.pm @@ -34,11 +34,11 @@ key = (key1, key2) cipher = AES.new (key, AES.MODE_XTS) -sequence = "01".decode ("hex") +sequence = b"\x01" encrypted = cipher.encrypt (base64.b64decode (data), sequence) -print encrypted.encode ("hex") +print (encrypted.hex ()) END_CODE @@ -48,7 +48,7 @@ END_CODE $python_code =~ s/key_tweak/"$key_tweak"/; $python_code =~ s/data/"$data_base64"/; - my $output_buf = `python2 -c '$python_code'`; + my $output_buf = `python -c '$python_code'`; $output_buf =~ s/[\r\n]//g; @@ -77,11 +77,11 @@ key = (key1, key2) cipher = AES.new (key, AES.MODE_XTS) -sequence = "01".decode ("hex") +sequence = b"\x01" decrypted = cipher.decrypt (base64.b64decode (data), sequence) -print decrypted.encode ("hex") +print (decrypted.hex ()) END_CODE @@ -91,7 +91,7 @@ END_CODE $python_code =~ s/key_tweak/"$key_tweak"/; $python_code =~ s/data/"$data_base64"/; - my $output_buf = `python2 -c '$python_code'`; + my $output_buf = `python -c '$python_code'`; $output_buf =~ s/[\r\n]//g; @@ -122,11 +122,11 @@ key = (key1, key2) cipher = python_Twofish.new (key, python_Twofish.MODE_XTS) -sequence = "01".decode ("hex") +sequence = b"\x01" encrypted = cipher.encrypt (base64.b64decode (data), sequence) -print encrypted.encode ("hex") +print (encrypted.hex ()) END_CODE @@ -136,7 +136,7 @@ END_CODE $python_code =~ s/key_tweak/"$key_tweak"/; $python_code =~ s/data/"$data_base64"/; - my $output_buf = `python2 -c '$python_code'`; + my $output_buf = `python -c '$python_code'`; $output_buf =~ s/[\r\n]//g; @@ -165,11 +165,11 @@ key = (key1, key2) cipher = python_Twofish.new (key, python_Twofish.MODE_XTS) -sequence = "01".decode ("hex") +sequence = b"\x01" decrypted = cipher.decrypt (base64.b64decode (data), sequence) -print decrypted.encode ("hex") +print (decrypted.hex ()) END_CODE @@ -179,7 +179,7 @@ END_CODE $python_code =~ s/key_tweak/"$key_tweak"/; $python_code =~ s/data/"$data_base64"/; - my $output_buf = `python2 -c '$python_code'`; + my $output_buf = `python -c '$python_code'`; $output_buf =~ s/[\r\n]//g; @@ -210,11 +210,11 @@ key = (key1, key2) cipher = python_Serpent.new (key, python_Serpent.MODE_XTS) -sequence = "01".decode ("hex") +sequence = b"\x01" encrypted = cipher.encrypt (base64.b64decode (data), sequence) -print encrypted.encode ("hex") +print (encrypted.hex ()) END_CODE @@ -224,7 +224,7 @@ END_CODE $python_code =~ s/key_tweak/"$key_tweak"/; $python_code =~ s/data/"$data_base64"/; - my $output_buf = `python2 -c '$python_code'`; + my $output_buf = `python -c '$python_code'`; $output_buf =~ s/[\r\n]//g; @@ -253,11 +253,11 @@ key = (key1, key2) cipher = python_Serpent.new (key, python_Serpent.MODE_XTS) -sequence = "01".decode ("hex") +sequence = b"\x01" decrypted = cipher.decrypt (base64.b64decode (data), sequence) -print decrypted.encode ("hex") +print (decrypted.hex ()) END_CODE @@ -267,7 +267,7 @@ END_CODE $python_code =~ s/key_tweak/"$key_tweak"/; $python_code =~ s/data/"$data_base64"/; - my $output_buf = `python2 -c '$python_code'`; + my $output_buf = `python -c '$python_code'`; $output_buf =~ s/[\r\n]//g; diff --git a/tools/test_modules/m20013.pm b/tools/test_modules/m20013.pm index 5f8c08dc9..f5563f339 100644 --- a/tools/test_modules/m20013.pm +++ b/tools/test_modules/m20013.pm @@ -34,11 +34,11 @@ key = (key1, key2) cipher = AES.new (key, AES.MODE_XTS) -sequence = "01".decode ("hex") +sequence = b"\x01" encrypted = cipher.encrypt (base64.b64decode (data), sequence) -print encrypted.encode ("hex") +print (encrypted.hex ()) END_CODE @@ -48,7 +48,7 @@ END_CODE $python_code =~ s/key_tweak/"$key_tweak"/; $python_code =~ s/data/"$data_base64"/; - my $output_buf = `python2 -c '$python_code'`; + my $output_buf = `python -c '$python_code'`; $output_buf =~ s/[\r\n]//g; @@ -77,11 +77,11 @@ key = (key1, key2) cipher = AES.new (key, AES.MODE_XTS) -sequence = "01".decode ("hex") +sequence = b"\x01" decrypted = cipher.decrypt (base64.b64decode (data), sequence) -print decrypted.encode ("hex") +print (decrypted.hex ()) END_CODE @@ -91,7 +91,7 @@ END_CODE $python_code =~ s/key_tweak/"$key_tweak"/; $python_code =~ s/data/"$data_base64"/; - my $output_buf = `python2 -c '$python_code'`; + my $output_buf = `python -c '$python_code'`; $output_buf =~ s/[\r\n]//g; @@ -122,11 +122,11 @@ key = (key1, key2) cipher = python_Twofish.new (key, python_Twofish.MODE_XTS) -sequence = "01".decode ("hex") +sequence = b"\x01" encrypted = cipher.encrypt (base64.b64decode (data), sequence) -print encrypted.encode ("hex") +print (encrypted.hex ()) END_CODE @@ -136,7 +136,7 @@ END_CODE $python_code =~ s/key_tweak/"$key_tweak"/; $python_code =~ s/data/"$data_base64"/; - my $output_buf = `python2 -c '$python_code'`; + my $output_buf = `python -c '$python_code'`; $output_buf =~ s/[\r\n]//g; @@ -165,11 +165,11 @@ key = (key1, key2) cipher = python_Twofish.new (key, python_Twofish.MODE_XTS) -sequence = "01".decode ("hex") +sequence = b"\x01" decrypted = cipher.decrypt (base64.b64decode (data), sequence) -print decrypted.encode ("hex") +print (decrypted.hex ()) END_CODE @@ -179,7 +179,7 @@ END_CODE $python_code =~ s/key_tweak/"$key_tweak"/; $python_code =~ s/data/"$data_base64"/; - my $output_buf = `python2 -c '$python_code'`; + my $output_buf = `python -c '$python_code'`; $output_buf =~ s/[\r\n]//g; @@ -210,11 +210,11 @@ key = (key1, key2) cipher = python_Serpent.new (key, python_Serpent.MODE_XTS) -sequence = "01".decode ("hex") +sequence = b"\x01" encrypted = cipher.encrypt (base64.b64decode (data), sequence) -print encrypted.encode ("hex") +print (encrypted.hex ()) END_CODE @@ -224,7 +224,7 @@ END_CODE $python_code =~ s/key_tweak/"$key_tweak"/; $python_code =~ s/data/"$data_base64"/; - my $output_buf = `python2 -c '$python_code'`; + my $output_buf = `python -c '$python_code'`; $output_buf =~ s/[\r\n]//g; @@ -253,11 +253,11 @@ key = (key1, key2) cipher = python_Serpent.new (key, python_Serpent.MODE_XTS) -sequence = "01".decode ("hex") +sequence = b"\x01" decrypted = cipher.decrypt (base64.b64decode (data), sequence) -print decrypted.encode ("hex") +print (decrypted.hex ()) END_CODE @@ -267,7 +267,7 @@ END_CODE $python_code =~ s/key_tweak/"$key_tweak"/; $python_code =~ s/data/"$data_base64"/; - my $output_buf = `python2 -c '$python_code'`; + my $output_buf = `python -c '$python_code'`; $output_buf =~ s/[\r\n]//g;