Lines Matching refs:crypt

8         raise unittest.SkipTest("The crypt module SEGFAULTs on ASAN/MSAN builds")
9 crypt = warnings_helper.import_deprecated("crypt")
14 crypt = None
19 @unittest.skipIf(crypt, 'import succeeded')
26 @unittest.skipUnless(crypt, 'crypt module is required')
30 cr = crypt.crypt('mypassword')
31 cr2 = crypt.crypt('mypassword', cr)
33 cr = crypt.crypt('mypassword', 'ab')
35 cr2 = crypt.crypt('mypassword', cr)
39 self.assertEqual(len(crypt._saltchars), 64)
40 for method in crypt.methods:
41 salt = crypt.mksalt(method)
47 for method in crypt.methods:
48 cr = crypt.crypt('assword', method)
50 cr2 = crypt.crypt('assword', cr)
52 cr = crypt.crypt('assword', crypt.mksalt(method))
56 self.assertTrue(len(crypt.methods) >= 1)
58 self.assertEqual(crypt.methods, [crypt.METHOD_BLOWFISH])
60 self.assertEqual(crypt.methods[-1], crypt.METHOD_CRYPT)
63 crypt
65 crypt.METHOD_SHA256 in crypt.methods or crypt.METHOD_SHA512 in crypt.methods
70 for method in (crypt.METHOD_SHA256, crypt.METHOD_SHA512):
72 salt = crypt.mksalt(method, rounds=rounds)
76 cr = crypt.crypt('mypassword', salt)
78 cr2 = crypt.crypt('mypassword', cr)
82 crypt and crypt.METHOD_BLOWFISH in crypt.methods, 'requires support of Blowfish'
86 salt = crypt.mksalt(crypt.METHOD_BLOWFISH, rounds=1 << log_rounds)
88 self.assertIn(len(salt) - crypt.METHOD_BLOWFISH.salt_chars, {6, 7})
89 cr = crypt.crypt('mypassword', salt)
91 cr2 = crypt.crypt('mypassword', cr)
95 for method in (crypt.METHOD_SHA256, crypt.METHOD_SHA512,
96 crypt.METHOD_BLOWFISH):
98 crypt.mksalt(method, rounds='4096')
100 crypt.mksalt(method, rounds=4096.0)
103 crypt.mksalt(method, rounds=rounds)
105 crypt.mksalt(crypt.METHOD_BLOWFISH, rounds=1000)
106 for method in (crypt.METHOD_CRYPT, crypt.METHOD_MD5):
108 crypt.mksalt(method, rounds=4096)