123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392 |
- # ===================================================================
- #
- # Copyright (c) 2015, Legrandin <helderijs@gmail.com>
- # All rights reserved.
- #
- # Redistribution and use in source and binary forms, with or without
- # modification, are permitted provided that the following conditions
- # are met:
- #
- # 1. Redistributions of source code must retain the above copyright
- # notice, this list of conditions and the following disclaimer.
- # 2. Redistributions in binary form must reproduce the above copyright
- # notice, this list of conditions and the following disclaimer in
- # the documentation and/or other materials provided with the
- # distribution.
- #
- # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- # "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- # LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
- # FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
- # COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
- # INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
- # BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
- # LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
- # CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
- # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
- # ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
- # POSSIBILITY OF SUCH DAMAGE.
- # ===================================================================
- import unittest
- from Crypto.SelfTest.st_common import list_test_cases
- from Crypto.Util._file_system import pycryptodome_filename
- from Crypto.Util.py3compat import b, unhexlify, bord, tostr
- from Crypto.Util.number import bytes_to_long
- from Crypto.Hash import SHAKE128
- from Crypto.PublicKey import ECC
- def load_file(filename, mode="rb"):
- fd = open(pycryptodome_filename([
- "Crypto",
- "SelfTest",
- "PublicKey",
- "test_vectors",
- "ECC",
- ], filename), mode)
- return fd.read()
- def compact(lines):
- ext = b("").join(lines)
- return unhexlify(tostr(ext).replace(" ", "").replace(":", ""))
- def create_ref_keys():
- key_lines = load_file("ecc_p256.txt").splitlines()
- private_key_d = bytes_to_long(compact(key_lines[2:5]))
- public_key_xy = compact(key_lines[6:11])
- assert bord(public_key_xy[0]) == 4 # Uncompressed
- public_key_x = bytes_to_long(public_key_xy[1:33])
- public_key_y = bytes_to_long(public_key_xy[33:])
- return (ECC.construct(curve="P-256", d=private_key_d),
- ECC.construct(curve="P-256", point_x=public_key_x, point_y=public_key_y))
- # Create reference key pair
- ref_private, ref_public = create_ref_keys()
- def get_fixed_prng():
- return SHAKE128.new().update(b("SEED")).read
- class TestImport(unittest.TestCase):
- def test_import_public_der(self):
- key_file = load_file("ecc_p256_public.der")
- key = ECC._import_subjectPublicKeyInfo(key_file)
- self.assertEqual(ref_public, key)
- key = ECC._import_der(key_file, None)
- self.assertEqual(ref_public, key)
- key = ECC.import_key(key_file)
- self.assertEqual(ref_public, key)
- def test_import_private_der(self):
- key_file = load_file("ecc_p256_private.der")
- key = ECC._import_private_der(key_file, None)
- self.assertEqual(ref_private, key)
- key = ECC._import_der(key_file, None)
- self.assertEqual(ref_private, key)
- key = ECC.import_key(key_file)
- self.assertEqual(ref_private, key)
- def test_import_private_pkcs8_clear(self):
- key_file = load_file("ecc_p256_private_p8_clear.der")
- key = ECC._import_der(key_file, None)
- self.assertEqual(ref_private, key)
- key = ECC.import_key(key_file)
- self.assertEqual(ref_private, key)
- def test_import_private_pkcs8_in_pem_clear(self):
- key_file = load_file("ecc_p256_private_p8_clear.pem")
- key = ECC.import_key(key_file)
- self.assertEqual(ref_private, key)
- def test_import_private_pkcs8_encrypted_1(self):
- key_file = load_file("ecc_p256_private_p8.der")
- key = ECC._import_der(key_file, "secret")
- self.assertEqual(ref_private, key)
- key = ECC.import_key(key_file, "secret")
- self.assertEqual(ref_private, key)
- def test_import_private_pkcs8_encrypted_2(self):
- key_file = load_file("ecc_p256_private_p8.pem")
- key = ECC.import_key(key_file, "secret")
- self.assertEqual(ref_private, key)
- def test_import_x509_der(self):
- key_file = load_file("ecc_p256_x509.der")
- key = ECC._import_der(key_file, None)
- self.assertEqual(ref_public, key)
- key = ECC.import_key(key_file)
- self.assertEqual(ref_public, key)
- def test_import_public_pem(self):
- key_file = load_file("ecc_p256_public.pem")
- key = ECC.import_key(key_file)
- self.assertEqual(ref_public, key)
- def test_import_private_pem(self):
- key_file = load_file("ecc_p256_private.pem")
- key = ECC.import_key(key_file)
- self.assertEqual(ref_private, key)
- def test_import_private_pem_encrypted(self):
- for algo in "des3", : # TODO: , "aes128", "aes192", "aes256_gcm":
- key_file = load_file("ecc_p256_private_enc_%s.pem" % algo)
- key = ECC.import_key(key_file, "secret")
- self.assertEqual(ref_private, key)
- key = ECC.import_key(tostr(key_file), b("secret"))
- self.assertEqual(ref_private, key)
- def test_import_x509_pem(self):
- key_file = load_file("ecc_p256_x509.pem")
- key = ECC.import_key(key_file)
- self.assertEqual(ref_public, key)
- def test_import_openssh(self):
- key_file = load_file("ecc_p256_public_openssh.txt")
- key = ECC._import_openssh(key_file)
- self.assertEqual(ref_public, key)
- key = ECC.import_key(key_file)
- self.assertEqual(ref_public, key)
- class TestExport(unittest.TestCase):
- def test_export_public_der(self):
- key_file = load_file("ecc_p256_public.der")
- encoded = ref_public._export_subjectPublicKeyInfo()
- self.assertEqual(key_file, encoded)
- # ---
- encoded = ref_public.export_key(format="DER")
- self.assertEqual(key_file, encoded)
- def test_export_private_der(self):
- key_file = load_file("ecc_p256_private.der")
- encoded = ref_private._export_private_der()
- self.assertEqual(key_file, encoded)
- # ---
- encoded = ref_private.export_key(format="DER", use_pkcs8=False)
- self.assertEqual(key_file, encoded)
- def test_export_private_pkcs8_clear(self):
- key_file = load_file("ecc_p256_private_p8_clear.der")
- encoded = ref_private._export_pkcs8()
- self.assertEqual(key_file, encoded)
- # ---
- encoded = ref_private.export_key(format="DER")
- self.assertEqual(key_file, encoded)
- def test_export_private_pkcs8_encrypted(self):
- encoded = ref_private._export_pkcs8(passphrase="secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- # This should prove that the output is password-protected
- self.assertRaises(ValueError, ECC._import_pkcs8, encoded, None)
- decoded = ECC._import_pkcs8(encoded, "secret")
- self.assertEqual(ref_private, decoded)
- # ---
- encoded = ref_private.export_key(format="DER",
- passphrase="secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- decoded = ECC.import_key(encoded, "secret")
- self.assertEqual(ref_private, decoded)
- def test_export_public_pem(self):
- key_file = load_file("ecc_p256_public.pem", "rt").strip()
- encoded = ref_private._export_public_pem()
- self.assertEqual(key_file, encoded)
- # ---
- encoded = ref_public.export_key(format="PEM")
- self.assertEqual(key_file, encoded)
- def test_export_private_pem_clear(self):
- key_file = load_file("ecc_p256_private.pem", "rt").strip()
- encoded = ref_private._export_private_pem(None)
- self.assertEqual(key_file, encoded)
- # ---
- encoded = ref_private.export_key(format="PEM", use_pkcs8=False)
- self.assertEqual(key_file, encoded)
- def test_export_private_pem_encrypted(self):
- encoded = ref_private._export_private_pem(passphrase=b("secret"))
- # This should prove that the output is password-protected
- self.assertRaises(ValueError, ECC.import_key, encoded)
- assert "EC PRIVATE KEY" in encoded
- decoded = ECC.import_key(encoded, "secret")
- self.assertEqual(ref_private, decoded)
- # ---
- encoded = ref_private.export_key(format="PEM",
- passphrase="secret",
- use_pkcs8=False)
- decoded = ECC.import_key(encoded, "secret")
- self.assertEqual(ref_private, decoded)
- def test_export_private_pkcs8_and_pem_1(self):
- # PKCS8 inside PEM with both unencrypted
- key_file = load_file("ecc_p256_private_p8_clear.pem", "rt").strip()
- encoded = ref_private._export_private_clear_pkcs8_in_clear_pem()
- self.assertEqual(key_file, encoded)
- # ---
- encoded = ref_private.export_key(format="PEM")
- self.assertEqual(key_file, encoded)
- def test_export_private_pkcs8_and_pem_2(self):
- # PKCS8 inside PEM with PKCS8 encryption
- encoded = ref_private._export_private_encrypted_pkcs8_in_clear_pem("secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- # This should prove that the output is password-protected
- self.assertRaises(ValueError, ECC.import_key, encoded)
- assert "ENCRYPTED PRIVATE KEY" in encoded
- decoded = ECC.import_key(encoded, "secret")
- self.assertEqual(ref_private, decoded)
- # ---
- encoded = ref_private.export_key(format="PEM",
- passphrase="secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- decoded = ECC.import_key(encoded, "secret")
- self.assertEqual(ref_private, decoded)
- def test_export_openssh(self):
- key_file = load_file("ecc_p256_public_openssh.txt", "rt")
- encoded = ref_public._export_openssh()
- self.assertEquals(key_file, encoded)
- # ---
- encoded = ref_public.export_key(format="OpenSSH")
- self.assertEquals(key_file, encoded)
- def test_prng(self):
- # Test that password-protected containers use the provided PRNG
- encoded1 = ref_private.export_key(format="PEM",
- passphrase="secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC",
- randfunc=get_fixed_prng())
- encoded2 = ref_private.export_key(format="PEM",
- passphrase="secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC",
- randfunc=get_fixed_prng())
- self.assertEquals(encoded1, encoded2)
- # ---
- encoded1 = ref_private.export_key(format="PEM",
- use_pkcs8=False,
- passphrase="secret",
- randfunc=get_fixed_prng())
- encoded2 = ref_private.export_key(format="PEM",
- use_pkcs8=False,
- passphrase="secret",
- randfunc=get_fixed_prng())
- self.assertEquals(encoded1, encoded2)
- def test_byte_or_string_passphrase(self):
- encoded1 = ref_private.export_key(format="PEM",
- use_pkcs8=False,
- passphrase="secret",
- randfunc=get_fixed_prng())
- encoded2 = ref_private.export_key(format="PEM",
- use_pkcs8=False,
- passphrase=b("secret"),
- randfunc=get_fixed_prng())
- self.assertEquals(encoded1, encoded2)
- def test_error_params1(self):
- # Unknown format
- self.assertRaises(ValueError, ref_private.export_key, format="XXX")
- # Missing 'protection' parameter when PKCS#8 is used
- ref_private.export_key(format="PEM", passphrase="secret",
- use_pkcs8=False)
- self.assertRaises(ValueError, ref_private.export_key, format="PEM",
- passphrase="secret")
- # DER format but no PKCS#8
- self.assertRaises(ValueError, ref_private.export_key, format="DER",
- passphrase="secret",
- use_pkcs8=False,
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- # Incorrect parameters for public keys
- self.assertRaises(ValueError, ref_public.export_key, format="DER",
- use_pkcs8=False)
- # Empty password
- self.assertRaises(ValueError, ref_private.export_key, format="PEM",
- passphrase="", use_pkcs8=False)
- self.assertRaises(ValueError, ref_private.export_key, format="PEM",
- passphrase="",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- # No private keys with OpenSSH
- self.assertRaises(ValueError, ref_private.export_key, format="OpenSSH",
- passphrase="secret")
- def get_tests(config={}):
- tests = []
- tests += list_test_cases(TestImport)
- tests += list_test_cases(TestExport)
- return tests
- if __name__ == '__main__':
- suite = lambda: unittest.TestSuite(get_tests())
- unittest.main(defaultTest='suite')
|