[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [stem/master] Initially create test strings as bytes



commit af3a9fdf7207eb66788ffe5c24971af72d224101
Author: Damian Johnson <atagar@xxxxxxxxxxxxxx>
Date:   Mon Mar 13 09:34:28 2017 -0700

    Initially create test strings as bytes
    
    Might as well construct our test input as bytes, rather than converting to
    them.
---
 stem/descriptor/server_descriptor.py |   1 +
 test/unit/descriptor/certificate.py  | 116 ++++++++++++-----------------------
 2 files changed, 39 insertions(+), 78 deletions(-)

diff --git a/stem/descriptor/server_descriptor.py b/stem/descriptor/server_descriptor.py
index dfb1bc5..76173a0 100644
--- a/stem/descriptor/server_descriptor.py
+++ b/stem/descriptor/server_descriptor.py
@@ -764,6 +764,7 @@ class RelayDescriptor(ServerDescriptor):
 
         if self.onion_key_crosscert:
           onion_key_crosscert_digest = self._digest_for_signature(self.onion_key, self.onion_key_crosscert)
+
           if onion_key_crosscert_digest != self.onion_key_crosscert_digest():
             raise ValueError('Decrypted onion-key-crosscert digest does not match local digest (calculated: %s, local: %s)' % (onion_key_crosscert_digest, self.onion_key_crosscert_digest()))
 
diff --git a/test/unit/descriptor/certificate.py b/test/unit/descriptor/certificate.py
index 0603a32..2f2f728 100644
--- a/test/unit/descriptor/certificate.py
+++ b/test/unit/descriptor/certificate.py
@@ -12,84 +12,51 @@ import test.runner
 class TestCertificate(unittest.TestCase):
   def test_with_invalid_version(self):
     cert_bytes = b'\x02\x04'
-    self.assertRaisesRegexp(
-      ValueError,
-      'Unknown Certificate version',
-      stem.descriptor.certificate._parse_certificate,
-      cert_bytes,
-      None
-    )
+    self.assertRaisesRegexp(ValueError, 'Unknown Certificate version', stem.descriptor.certificate._parse_certificate, cert_bytes, None)
 
   def test_with_invalid_type(self):
     cert_bytes = b'\x01\x07'
-    self.assertRaisesRegexp(
-      ValueError,
-      'Unknown Certificate type',
-      stem.descriptor.certificate._parse_certificate,
-      cert_bytes,
-      None
-    )
+    self.assertRaisesRegexp(ValueError, 'Unknown Certificate type', stem.descriptor.certificate._parse_certificate, cert_bytes, None)
 
   def test_parse_extensions_truncated_extension(self):
-    cert_bytes = '\x00' * 39  # First 40 bytes are standard fields
-    cert_bytes += '\x01'  # n_extensions = 1
-    cert_bytes += '\x00\x08'  # extension length = 8 bytes
-    cert_bytes += '\x04'      # ext_type = 0x04
-    cert_bytes += stem.descriptor.certificate.SIGNATURE_LENGTH * '\x00'  # pad empty signature block
-
-    self.assertRaisesRegexp(
-      ValueError,
-      'Certificate contained truncated extension',
-      stem.descriptor.certificate._parse_extensions,
-      stem.util.str_tools._to_bytes(cert_bytes)
-    )
+    cert_bytes = b'\x00' * 39  # First 40 bytes are standard fields
+    cert_bytes += b'\x01'      # n_extensions = 1
+    cert_bytes += b'\x00\x08'  # extension length = 8 bytes
+    cert_bytes += b'\x04'      # ext_type = 0x04
+    cert_bytes += stem.descriptor.certificate.SIGNATURE_LENGTH * b'\x00'  # pad empty signature block
+
+    self.assertRaisesRegexp(ValueError, 'Certificate contained truncated extension', stem.descriptor.certificate._parse_extensions, cert_bytes)
 
   def test_parse_extensions_invalid_certificate_extension_type(self):
-    cert_bytes = '\x00' * 39  # First 40 bytes are standard fields
-    cert_bytes += '\x01'   # n_extensions = 1
-    cert_bytes += '\x00\x08'  # extension length = 8 bytes
-    cert_bytes += '\x00' * 6  # pad out to 8 bytes
-    cert_bytes += stem.descriptor.certificate.SIGNATURE_LENGTH * '\x00'  # pad empty signature block
-
-    self.assertRaisesRegexp(
-      ValueError,
-      'Invalid certificate extension type:',
-      stem.descriptor.certificate._parse_extensions,
-      stem.util.str_tools._to_bytes(cert_bytes)
-    )
+    cert_bytes = b'\x00' * 39  # First 40 bytes are standard fields
+    cert_bytes += b'\x01'      # n_extensions = 1
+    cert_bytes += b'\x00\x08'  # extension length = 8 bytes
+    cert_bytes += b'\x00' * 6  # pad out to 8 bytes
+    cert_bytes += stem.descriptor.certificate.SIGNATURE_LENGTH * b'\x00'  # pad empty signature block
+
+    self.assertRaisesRegexp(ValueError, 'Invalid certificate extension type:', stem.descriptor.certificate._parse_extensions, cert_bytes)
 
   def test_parse_extensions_invalid_n_extensions_count(self):
-    cert_bytes = '\x00' * 39  # First 40 bytes are standard fields
-    cert_bytes += '\x02'    # n_extensions = 2
-    cert_bytes += '\x00\x08'  # extension length = 8 bytes
-    cert_bytes += '\x04'    # certificate type
-    cert_bytes += '\x00' * 5  # pad out to 8 bytes
-    cert_bytes += stem.descriptor.certificate.SIGNATURE_LENGTH * '\x00'  # pad empty signature block
-
-    self.assertRaisesRegexp(
-      ValueError,
-      'n_extensions was 2 but parsed 1',
-      stem.descriptor.certificate._parse_extensions,
-      stem.util.str_tools._to_bytes(cert_bytes)
-    )
+    cert_bytes = b'\x00' * 39  # First 40 bytes are standard fields
+    cert_bytes += b'\x02'      # n_extensions = 2
+    cert_bytes += b'\x00\x08'  # extension length = 8 bytes
+    cert_bytes += b'\x04'      # certificate type
+    cert_bytes += b'\x00' * 5  # pad out to 8 bytes
+    cert_bytes += stem.descriptor.certificate.SIGNATURE_LENGTH * b'\x00'  # pad empty signature block
+
+    self.assertRaisesRegexp(ValueError, 'n_extensions was 2 but parsed 1', stem.descriptor.certificate._parse_extensions, cert_bytes)
 
   def test_ed25519_key_certificate_without_extensions(self):
-    cert_bytes = '\x01\x04' + '\x00' * 37  # First 40 bytes are standard fields
-    cert_bytes += '\x00'   # n_extensions = 0
-    cert_bytes += stem.descriptor.certificate.SIGNATURE_LENGTH * '\x00'  # pad empty signature block
-
-    self.assertRaisesRegexp(
-      ValueError,
-      'Ed25519KeyCertificate missing SignedWithEd25519KeyCertificateExtension extension',
-      stem.descriptor.certificate._parse_certificate,
-      stem.util.str_tools._to_bytes(cert_bytes),
-      None,
-      validate = True
-    )
+    cert_bytes = b'\x01\x04' + b'\x00' * 37  # First 40 bytes are standard fields
+    cert_bytes += b'\x00'   # n_extensions = 0
+    cert_bytes += stem.descriptor.certificate.SIGNATURE_LENGTH * b'\x00'  # pad empty signature block
+
+    exc_msg = 'Ed25519KeyCertificate missing SignedWithEd25519KeyCertificateExtension extension'
+    self.assertRaisesRegexp(ValueError, exc_msg, stem.descriptor.certificate._parse_certificate, cert_bytes, None, validate = True)
 
   def test_certificate_with_invalid_signature(self):
     if not stem.prereq._is_pynacl_available():
-      test.runner.skip(self, '(require pynacl module)')
+      test.runner.skip(self, '(requires pynacl module)')
       return
 
     import nacl.signing
@@ -98,17 +65,10 @@ class TestCertificate(unittest.TestCase):
     master_key = nacl.signing.SigningKey.generate()
     master_key_base64 = master_key.encode(nacl.encoding.Base64Encoder)
 
-    cert_bytes = '\x01\x04' + '\x00' * 37  # 40 byte preamble of standard fields
-    cert_bytes += '\x01'  # n_extensions = 1
-    cert_bytes += '\x00\x08'  # extentsion length = 8 bytes
-    cert_bytes += '\x04' + '\x00' * 5  # certificate type + padding out to 8 bytes
-    cert_bytes += stem.descriptor.certificate.SIGNATURE_LENGTH * '\x00'  # empty signature block
-
-    self.assertRaisesRegexp(
-      ValueError,
-      'Ed25519KeyCertificate signature invalid',
-      stem.descriptor.certificate._parse_certificate,
-      stem.util.str_tools._to_bytes(cert_bytes),
-      master_key_base64,
-      validate = True
-    )
+    cert_bytes = b'\x01\x04' + b'\x00' * 37  # 40 byte preamble of standard fields
+    cert_bytes += b'\x01'  # n_extensions = 1
+    cert_bytes += b'\x00\x08'  # extentsion length = 8 bytes
+    cert_bytes += b'\x04' + b'\x00' * 5  # certificate type + padding out to 8 bytes
+    cert_bytes += stem.descriptor.certificate.SIGNATURE_LENGTH * b'\x00'  # empty signature block
+
+    self.assertRaisesRegexp(ValueError, 'Ed25519KeyCertificate signature invalid', stem.descriptor.certificate._parse_certificate, cert_bytes, master_key_base64, validate = True)



_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits