Index: third_party/google-endpoints/Crypto/SelfTest/Cipher/test_XOR.py |
diff --git a/third_party/google-endpoints/Crypto/SelfTest/Cipher/test_XOR.py b/third_party/google-endpoints/Crypto/SelfTest/Cipher/test_XOR.py |
new file mode 100644 |
index 0000000000000000000000000000000000000000..a4d542aca980c0bfd43787b6c9127f1a17770db8 |
--- /dev/null |
+++ b/third_party/google-endpoints/Crypto/SelfTest/Cipher/test_XOR.py |
@@ -0,0 +1,72 @@ |
+# -*- coding: utf-8 -*- |
+# |
+# SelfTest/Cipher/XOR.py: Self-test for the XOR "cipher" |
+# |
+# Written in 2008 by Dwayne C. Litzenberger <dlitz@dlitz.net> |
+# |
+# =================================================================== |
+# The contents of this file are dedicated to the public domain. To |
+# the extent that dedication to the public domain is not available, |
+# everyone is granted a worldwide, perpetual, royalty-free, |
+# non-exclusive license to exercise all rights associated with the |
+# contents of this file for any purpose whatsoever. |
+# No rights are reserved. |
+# |
+# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, |
+# EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF |
+# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND |
+# NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS |
+# BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN |
+# ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN |
+# CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE |
+# SOFTWARE. |
+# =================================================================== |
+ |
+"""Self-test suite for Crypto.Cipher.XOR""" |
+ |
+import unittest |
+ |
+__revision__ = "$Id$" |
+ |
+from Crypto.Util.py3compat import * |
+ |
+# This is a list of (plaintext, ciphertext, key) tuples. |
+test_data = [ |
+ # Test vectors written from scratch. (Nobody posts XOR test vectors on the web? How disappointing.) |
+ ('01', '01', |
+ '00', |
+ 'zero key'), |
+ |
+ ('0102040810204080', '0003050911214181', |
+ '01', |
+ '1-byte key'), |
+ |
+ ('0102040810204080', 'cda8c8a2dc8a8c2a', |
+ 'ccaa', |
+ '2-byte key'), |
+ |
+ ('ff'*64, 'fffefdfcfbfaf9f8f7f6f5f4f3f2f1f0efeeedecebeae9e8e7e6e5e4e3e2e1e0'*2, |
+ '000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f', |
+ '32-byte key'), |
+] |
+ |
+class TruncationSelfTest(unittest.TestCase): |
+ |
+ def runTest(self): |
+ """33-byte key (should raise ValueError under current implementation)""" |
+ # Crypto.Cipher.XOR previously truncated its inputs at 32 bytes. Now |
+ # it should raise a ValueError if the length is too long. |
+ self.assertRaises(ValueError, XOR.new, "x"*33) |
+ |
+def get_tests(config={}): |
+ global XOR |
+ from Crypto.Cipher import XOR |
+ from common import make_stream_tests |
+ return make_stream_tests(XOR, "XOR", test_data) + [TruncationSelfTest()] |
+ |
+if __name__ == '__main__': |
+ import unittest |
+ suite = lambda: unittest.TestSuite(get_tests()) |
+ unittest.main(defaultTest='suite') |
+ |
+# vim:set ts=4 sw=4 sts=4 expandtab: |