slight update
This commit is contained in:
45
env/lib/python3.12/site-packages/Crypto/SelfTest/Protocol/__init__.py
vendored
Normal file
45
env/lib/python3.12/site-packages/Crypto/SelfTest/Protocol/__init__.py
vendored
Normal file
@ -0,0 +1,45 @@
|
||||
# -*- coding: utf-8 -*-
|
||||
#
|
||||
# SelfTest/Protocol/__init__.py: Self-tests for Crypto.Protocol
|
||||
#
|
||||
# Written in 2008 by Dwayne C. Litzenberger <dlitz@dlitz.net>
|
||||
#
|
||||
# ===================================================================
|
||||
# The contents of this file are dedicated to the public domain. To
|
||||
# the extent that dedication to the public domain is not available,
|
||||
# everyone is granted a worldwide, perpetual, royalty-free,
|
||||
# non-exclusive license to exercise all rights associated with the
|
||||
# contents of this file for any purpose whatsoever.
|
||||
# No rights are reserved.
|
||||
#
|
||||
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||||
# EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||||
# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
||||
# NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
|
||||
# BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
|
||||
# ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
||||
# CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||
# SOFTWARE.
|
||||
# ===================================================================
|
||||
|
||||
"""Self-test for Crypto.Protocol"""
|
||||
|
||||
__revision__ = "$Id$"
|
||||
|
||||
def get_tests(config={}):
|
||||
tests = []
|
||||
from Crypto.SelfTest.Protocol import test_rfc1751; tests += test_rfc1751.get_tests(config=config)
|
||||
from Crypto.SelfTest.Protocol import test_KDF; tests += test_KDF.get_tests(config=config)
|
||||
from Crypto.SelfTest.Protocol import test_ecdh; tests += test_ecdh.get_tests(config=config)
|
||||
|
||||
from Crypto.SelfTest.Protocol import test_SecretSharing;
|
||||
tests += test_SecretSharing.get_tests(config=config)
|
||||
|
||||
return tests
|
||||
|
||||
if __name__ == '__main__':
|
||||
import unittest
|
||||
suite = lambda: unittest.TestSuite(get_tests())
|
||||
unittest.main(defaultTest='suite')
|
||||
|
||||
# vim:set ts=4 sw=4 sts=4 expandtab:
|
BIN
env/lib/python3.12/site-packages/Crypto/SelfTest/Protocol/__pycache__/__init__.cpython-312.pyc
vendored
Normal file
BIN
env/lib/python3.12/site-packages/Crypto/SelfTest/Protocol/__pycache__/__init__.cpython-312.pyc
vendored
Normal file
Binary file not shown.
BIN
env/lib/python3.12/site-packages/Crypto/SelfTest/Protocol/__pycache__/test_KDF.cpython-312.pyc
vendored
Normal file
BIN
env/lib/python3.12/site-packages/Crypto/SelfTest/Protocol/__pycache__/test_KDF.cpython-312.pyc
vendored
Normal file
Binary file not shown.
Binary file not shown.
BIN
env/lib/python3.12/site-packages/Crypto/SelfTest/Protocol/__pycache__/test_ecdh.cpython-312.pyc
vendored
Normal file
BIN
env/lib/python3.12/site-packages/Crypto/SelfTest/Protocol/__pycache__/test_ecdh.cpython-312.pyc
vendored
Normal file
Binary file not shown.
BIN
env/lib/python3.12/site-packages/Crypto/SelfTest/Protocol/__pycache__/test_rfc1751.cpython-312.pyc
vendored
Normal file
BIN
env/lib/python3.12/site-packages/Crypto/SelfTest/Protocol/__pycache__/test_rfc1751.cpython-312.pyc
vendored
Normal file
Binary file not shown.
809
env/lib/python3.12/site-packages/Crypto/SelfTest/Protocol/test_KDF.py
vendored
Normal file
809
env/lib/python3.12/site-packages/Crypto/SelfTest/Protocol/test_KDF.py
vendored
Normal file
@ -0,0 +1,809 @@
|
||||
# -*- coding: utf-8 -*-
|
||||
#
|
||||
# SelfTest/Protocol/test_KDF.py: Self-test for key derivation functions
|
||||
#
|
||||
# ===================================================================
|
||||
# The contents of this file are dedicated to the public domain. To
|
||||
# the extent that dedication to the public domain is not available,
|
||||
# everyone is granted a worldwide, perpetual, royalty-free,
|
||||
# non-exclusive license to exercise all rights associated with the
|
||||
# contents of this file for any purpose whatsoever.
|
||||
# No rights are reserved.
|
||||
#
|
||||
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||||
# EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||||
# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
||||
# NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
|
||||
# BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
|
||||
# ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
||||
# CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||
# SOFTWARE.
|
||||
# ===================================================================
|
||||
|
||||
import re
|
||||
import unittest
|
||||
from binascii import unhexlify
|
||||
|
||||
from Crypto.Util.py3compat import b, bchr
|
||||
|
||||
from Crypto.SelfTest.st_common import list_test_cases
|
||||
from Crypto.SelfTest.loader import load_test_vectors, load_test_vectors_wycheproof
|
||||
from Crypto.Hash import SHA1, HMAC, SHA256, MD5, SHA224, SHA384, SHA512
|
||||
from Crypto.Cipher import AES, DES3
|
||||
|
||||
from Crypto.Protocol.KDF import (PBKDF1, PBKDF2, _S2V, HKDF, scrypt,
|
||||
bcrypt, bcrypt_check,
|
||||
SP800_108_Counter)
|
||||
|
||||
from Crypto.Protocol.KDF import _bcrypt_decode
|
||||
|
||||
|
||||
def t2b(t):
|
||||
if t is None:
|
||||
return None
|
||||
t2 = t.replace(" ", "").replace("\n", "")
|
||||
return unhexlify(b(t2))
|
||||
|
||||
|
||||
class TestVector(object):
|
||||
pass
|
||||
|
||||
|
||||
class PBKDF1_Tests(unittest.TestCase):
|
||||
|
||||
# List of tuples with test data.
|
||||
# Each tuple is made up by:
|
||||
# Item #0: a pass phrase
|
||||
# Item #1: salt (8 bytes encoded in hex)
|
||||
# Item #2: output key length
|
||||
# Item #3: iterations to use
|
||||
# Item #4: expected result (encoded in hex)
|
||||
_testData = (
|
||||
# From http://www.di-mgt.com.au/cryptoKDFs.html#examplespbkdf
|
||||
("password", "78578E5A5D63CB06", 16, 1000, "DC19847E05C64D2FAF10EBFB4A3D2A20"),
|
||||
)
|
||||
|
||||
def test1(self):
|
||||
v = self._testData[0]
|
||||
res = PBKDF1(v[0], t2b(v[1]), v[2], v[3], SHA1)
|
||||
self.assertEqual(res, t2b(v[4]))
|
||||
|
||||
|
||||
class PBKDF2_Tests(unittest.TestCase):
|
||||
|
||||
# List of tuples with test data.
|
||||
# Each tuple is made up by:
|
||||
# Item #0: a pass phrase
|
||||
# Item #1: salt (encoded in hex)
|
||||
# Item #2: output key length
|
||||
# Item #3: iterations to use
|
||||
# Item #4: hash module
|
||||
# Item #5: expected result (encoded in hex)
|
||||
_testData = (
|
||||
# From http://www.di-mgt.com.au/cryptoKDFs.html#examplespbkdf
|
||||
("password","78578E5A5D63CB06",24,2048, SHA1, "BFDE6BE94DF7E11DD409BCE20A0255EC327CB936FFE93643"),
|
||||
# From RFC 6050
|
||||
("password","73616c74", 20, 1, SHA1, "0c60c80f961f0e71f3a9b524af6012062fe037a6"),
|
||||
("password","73616c74", 20, 2, SHA1, "ea6c014dc72d6f8ccd1ed92ace1d41f0d8de8957"),
|
||||
("password","73616c74", 20, 4096, SHA1, "4b007901b765489abead49d926f721d065a429c1"),
|
||||
("passwordPASSWORDpassword","73616c7453414c5473616c7453414c5473616c7453414c5473616c7453414c5473616c74",
|
||||
25, 4096, SHA1, "3d2eec4fe41c849b80c8d83662c0e44a8b291a964cf2f07038"),
|
||||
( 'pass\x00word',"7361006c74",16,4096, SHA1, "56fa6aa75548099dcc37d7f03425e0c3"),
|
||||
# From draft-josefsson-scrypt-kdf-01, Chapter 10
|
||||
( 'passwd', '73616c74', 64, 1, SHA256, "55ac046e56e3089fec1691c22544b605f94185216dde0465e68b9d57c20dacbc49ca9cccf179b645991664b39d77ef317c71b845b1e30bd509112041d3a19783"),
|
||||
( 'Password', '4e61436c', 64, 80000, SHA256, "4ddcd8f60b98be21830cee5ef22701f9641a4418d04c0414aeff08876b34ab56a1d425a1225833549adb841b51c9b3176a272bdebba1d078478f62b397f33c8d"),
|
||||
)
|
||||
|
||||
def test1(self):
|
||||
# Test only for HMAC-SHA1 as PRF
|
||||
|
||||
def prf_SHA1(p,s):
|
||||
return HMAC.new(p,s,SHA1).digest()
|
||||
|
||||
def prf_SHA256(p,s):
|
||||
return HMAC.new(p,s,SHA256).digest()
|
||||
|
||||
for i in range(len(self._testData)):
|
||||
v = self._testData[i]
|
||||
password = v[0]
|
||||
salt = t2b(v[1])
|
||||
out_len = v[2]
|
||||
iters = v[3]
|
||||
hash_mod = v[4]
|
||||
expected = t2b(v[5])
|
||||
|
||||
if hash_mod is SHA1:
|
||||
res = PBKDF2(password, salt, out_len, iters)
|
||||
self.assertEqual(res, expected)
|
||||
|
||||
res = PBKDF2(password, salt, out_len, iters, prf_SHA1)
|
||||
self.assertEqual(res, expected)
|
||||
else:
|
||||
res = PBKDF2(password, salt, out_len, iters, prf_SHA256)
|
||||
self.assertEqual(res, expected)
|
||||
|
||||
def test2(self):
|
||||
# Verify that prf and hmac_hash_module are mutual exclusive
|
||||
def prf_SHA1(p,s):
|
||||
return HMAC.new(p,s,SHA1).digest()
|
||||
|
||||
self.assertRaises(ValueError, PBKDF2, b("xxx"), b("yyy"), 16, 100,
|
||||
prf=prf_SHA1, hmac_hash_module=SHA1)
|
||||
|
||||
def test3(self):
|
||||
# Verify that hmac_hash_module works like prf
|
||||
|
||||
password = b("xxx")
|
||||
salt = b("yyy")
|
||||
|
||||
for hashmod in (MD5, SHA1, SHA224, SHA256, SHA384, SHA512):
|
||||
|
||||
pr1 = PBKDF2(password, salt, 16, 100,
|
||||
prf=lambda p, s: HMAC.new(p,s,hashmod).digest())
|
||||
pr2 = PBKDF2(password, salt, 16, 100, hmac_hash_module=hashmod)
|
||||
|
||||
self.assertEqual(pr1, pr2)
|
||||
|
||||
def test4(self):
|
||||
# Verify that PBKDF2 can take bytes or strings as password or salt
|
||||
k1 = PBKDF2("xxx", b("yyy"), 16, 10)
|
||||
k2 = PBKDF2(b("xxx"), b("yyy"), 16, 10)
|
||||
self.assertEqual(k1, k2)
|
||||
|
||||
k1 = PBKDF2(b("xxx"), "yyy", 16, 10)
|
||||
k2 = PBKDF2(b("xxx"), b("yyy"), 16, 10)
|
||||
self.assertEqual(k1, k2)
|
||||
|
||||
|
||||
class S2V_Tests(unittest.TestCase):
|
||||
|
||||
# Sequence of test vectors.
|
||||
# Each test vector is made up by:
|
||||
# Item #0: a tuple of strings
|
||||
# Item #1: an AES key
|
||||
# Item #2: the result
|
||||
# Item #3: the cipher module S2V is based on
|
||||
# Everything is hex encoded
|
||||
_testData = [
|
||||
|
||||
# RFC5297, A.1
|
||||
(
|
||||
( '101112131415161718191a1b1c1d1e1f2021222324252627',
|
||||
'112233445566778899aabbccddee' ),
|
||||
'fffefdfcfbfaf9f8f7f6f5f4f3f2f1f0',
|
||||
'85632d07c6e8f37f950acd320a2ecc93',
|
||||
AES
|
||||
),
|
||||
|
||||
# RFC5297, A.2
|
||||
(
|
||||
( '00112233445566778899aabbccddeeffdeaddadadeaddadaffeeddcc'+
|
||||
'bbaa99887766554433221100',
|
||||
'102030405060708090a0',
|
||||
'09f911029d74e35bd84156c5635688c0',
|
||||
'7468697320697320736f6d6520706c61'+
|
||||
'696e7465787420746f20656e63727970'+
|
||||
'74207573696e67205349562d414553'),
|
||||
'7f7e7d7c7b7a79787776757473727170',
|
||||
'7bdb6e3b432667eb06f4d14bff2fbd0f',
|
||||
AES
|
||||
),
|
||||
|
||||
]
|
||||
|
||||
def test1(self):
|
||||
"""Verify correctness of test vector"""
|
||||
for tv in self._testData:
|
||||
s2v = _S2V.new(t2b(tv[1]), tv[3])
|
||||
for s in tv[0]:
|
||||
s2v.update(t2b(s))
|
||||
result = s2v.derive()
|
||||
self.assertEqual(result, t2b(tv[2]))
|
||||
|
||||
def test2(self):
|
||||
"""Verify that no more than 127(AES) and 63(TDES)
|
||||
components are accepted."""
|
||||
key = bchr(0) * 8 + bchr(255) * 8
|
||||
for module in (AES, DES3):
|
||||
s2v = _S2V.new(key, module)
|
||||
max_comps = module.block_size*8-1
|
||||
for i in range(max_comps):
|
||||
s2v.update(b("XX"))
|
||||
self.assertRaises(TypeError, s2v.update, b("YY"))
|
||||
|
||||
|
||||
class HKDF_Tests(unittest.TestCase):
|
||||
|
||||
# Test vectors from RFC5869, Appendix A
|
||||
# Each tuple is made up by:
|
||||
# Item #0: hash module
|
||||
# Item #1: secret
|
||||
# Item #2: salt
|
||||
# Item #3: context
|
||||
# Item #4: expected result
|
||||
_test_vector = (
|
||||
(
|
||||
SHA256,
|
||||
"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b",
|
||||
"000102030405060708090a0b0c",
|
||||
"f0f1f2f3f4f5f6f7f8f9",
|
||||
42,
|
||||
"3cb25f25faacd57a90434f64d0362f2a" +
|
||||
"2d2d0a90cf1a5a4c5db02d56ecc4c5bf" +
|
||||
"34007208d5b887185865"
|
||||
),
|
||||
(
|
||||
SHA256,
|
||||
"000102030405060708090a0b0c0d0e0f" +
|
||||
"101112131415161718191a1b1c1d1e1f" +
|
||||
"202122232425262728292a2b2c2d2e2f" +
|
||||
"303132333435363738393a3b3c3d3e3f" +
|
||||
"404142434445464748494a4b4c4d4e4f",
|
||||
"606162636465666768696a6b6c6d6e6f" +
|
||||
"707172737475767778797a7b7c7d7e7f" +
|
||||
"808182838485868788898a8b8c8d8e8f" +
|
||||
"909192939495969798999a9b9c9d9e9f" +
|
||||
"a0a1a2a3a4a5a6a7a8a9aaabacadaeaf",
|
||||
"b0b1b2b3b4b5b6b7b8b9babbbcbdbebf" +
|
||||
"c0c1c2c3c4c5c6c7c8c9cacbcccdcecf" +
|
||||
"d0d1d2d3d4d5d6d7d8d9dadbdcdddedf" +
|
||||
"e0e1e2e3e4e5e6e7e8e9eaebecedeeef" +
|
||||
"f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
|
||||
82,
|
||||
"b11e398dc80327a1c8e7f78c596a4934" +
|
||||
"4f012eda2d4efad8a050cc4c19afa97c" +
|
||||
"59045a99cac7827271cb41c65e590e09" +
|
||||
"da3275600c2f09b8367793a9aca3db71" +
|
||||
"cc30c58179ec3e87c14c01d5c1f3434f" +
|
||||
"1d87"
|
||||
),
|
||||
(
|
||||
SHA256,
|
||||
"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b",
|
||||
None,
|
||||
None,
|
||||
42,
|
||||
"8da4e775a563c18f715f802a063c5a31" +
|
||||
"b8a11f5c5ee1879ec3454e5f3c738d2d" +
|
||||
"9d201395faa4b61a96c8"
|
||||
),
|
||||
(
|
||||
SHA1,
|
||||
"0b0b0b0b0b0b0b0b0b0b0b",
|
||||
"000102030405060708090a0b0c",
|
||||
"f0f1f2f3f4f5f6f7f8f9",
|
||||
42,
|
||||
"085a01ea1b10f36933068b56efa5ad81" +
|
||||
"a4f14b822f5b091568a9cdd4f155fda2" +
|
||||
"c22e422478d305f3f896"
|
||||
),
|
||||
(
|
||||
SHA1,
|
||||
"000102030405060708090a0b0c0d0e0f" +
|
||||
"101112131415161718191a1b1c1d1e1f" +
|
||||
"202122232425262728292a2b2c2d2e2f" +
|
||||
"303132333435363738393a3b3c3d3e3f" +
|
||||
"404142434445464748494a4b4c4d4e4f",
|
||||
"606162636465666768696a6b6c6d6e6f" +
|
||||
"707172737475767778797a7b7c7d7e7f" +
|
||||
"808182838485868788898a8b8c8d8e8f" +
|
||||
"909192939495969798999a9b9c9d9e9f" +
|
||||
"a0a1a2a3a4a5a6a7a8a9aaabacadaeaf",
|
||||
"b0b1b2b3b4b5b6b7b8b9babbbcbdbebf" +
|
||||
"c0c1c2c3c4c5c6c7c8c9cacbcccdcecf" +
|
||||
"d0d1d2d3d4d5d6d7d8d9dadbdcdddedf" +
|
||||
"e0e1e2e3e4e5e6e7e8e9eaebecedeeef" +
|
||||
"f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
|
||||
82,
|
||||
"0bd770a74d1160f7c9f12cd5912a06eb" +
|
||||
"ff6adcae899d92191fe4305673ba2ffe" +
|
||||
"8fa3f1a4e5ad79f3f334b3b202b2173c" +
|
||||
"486ea37ce3d397ed034c7f9dfeb15c5e" +
|
||||
"927336d0441f4c4300e2cff0d0900b52" +
|
||||
"d3b4"
|
||||
),
|
||||
(
|
||||
SHA1,
|
||||
"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b",
|
||||
"",
|
||||
"",
|
||||
42,
|
||||
"0ac1af7002b3d761d1e55298da9d0506" +
|
||||
"b9ae52057220a306e07b6b87e8df21d0" +
|
||||
"ea00033de03984d34918"
|
||||
),
|
||||
(
|
||||
SHA1,
|
||||
"0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c",
|
||||
None,
|
||||
"",
|
||||
42,
|
||||
"2c91117204d745f3500d636a62f64f0a" +
|
||||
"b3bae548aa53d423b0d1f27ebba6f5e5" +
|
||||
"673a081d70cce7acfc48"
|
||||
)
|
||||
)
|
||||
|
||||
def test1(self):
|
||||
for tv in self._test_vector:
|
||||
secret, salt, info, exp = [ t2b(tv[x]) for x in (1,2,3,5) ]
|
||||
key_len, hashmod = [ tv[x] for x in (4,0) ]
|
||||
|
||||
output = HKDF(secret, key_len, salt, hashmod, 1, info)
|
||||
self.assertEqual(output, exp)
|
||||
|
||||
def test2(self):
|
||||
ref = HKDF(b("XXXXXX"), 12, b("YYYY"), SHA1)
|
||||
|
||||
# Same output, but this time split over 2 keys
|
||||
key1, key2 = HKDF(b("XXXXXX"), 6, b("YYYY"), SHA1, 2)
|
||||
self.assertEqual((ref[:6], ref[6:]), (key1, key2))
|
||||
|
||||
# Same output, but this time split over 3 keys
|
||||
key1, key2, key3 = HKDF(b("XXXXXX"), 4, b("YYYY"), SHA1, 3)
|
||||
self.assertEqual((ref[:4], ref[4:8], ref[8:]), (key1, key2, key3))
|
||||
|
||||
|
||||
class scrypt_Tests(unittest.TestCase):
|
||||
|
||||
# Test vectors taken from
|
||||
# https://tools.ietf.org/html/rfc7914
|
||||
# - password
|
||||
# - salt
|
||||
# - N
|
||||
# - r
|
||||
# - p
|
||||
data = (
|
||||
(
|
||||
"",
|
||||
"",
|
||||
16, # 2K
|
||||
1,
|
||||
1,
|
||||
"""
|
||||
77 d6 57 62 38 65 7b 20 3b 19 ca 42 c1 8a 04 97
|
||||
f1 6b 48 44 e3 07 4a e8 df df fa 3f ed e2 14 42
|
||||
fc d0 06 9d ed 09 48 f8 32 6a 75 3a 0f c8 1f 17
|
||||
e8 d3 e0 fb 2e 0d 36 28 cf 35 e2 0c 38 d1 89 06
|
||||
"""
|
||||
),
|
||||
(
|
||||
"password",
|
||||
"NaCl",
|
||||
1024, # 1M
|
||||
8,
|
||||
16,
|
||||
"""
|
||||
fd ba be 1c 9d 34 72 00 78 56 e7 19 0d 01 e9 fe
|
||||
7c 6a d7 cb c8 23 78 30 e7 73 76 63 4b 37 31 62
|
||||
2e af 30 d9 2e 22 a3 88 6f f1 09 27 9d 98 30 da
|
||||
c7 27 af b9 4a 83 ee 6d 83 60 cb df a2 cc 06 40
|
||||
"""
|
||||
),
|
||||
(
|
||||
"pleaseletmein",
|
||||
"SodiumChloride",
|
||||
16384, # 16M
|
||||
8,
|
||||
1,
|
||||
"""
|
||||
70 23 bd cb 3a fd 73 48 46 1c 06 cd 81 fd 38 eb
|
||||
fd a8 fb ba 90 4f 8e 3e a9 b5 43 f6 54 5d a1 f2
|
||||
d5 43 29 55 61 3f 0f cf 62 d4 97 05 24 2a 9a f9
|
||||
e6 1e 85 dc 0d 65 1e 40 df cf 01 7b 45 57 58 87
|
||||
"""
|
||||
),
|
||||
(
|
||||
"pleaseletmein",
|
||||
"SodiumChloride",
|
||||
1048576, # 1G
|
||||
8,
|
||||
1,
|
||||
"""
|
||||
21 01 cb 9b 6a 51 1a ae ad db be 09 cf 70 f8 81
|
||||
ec 56 8d 57 4a 2f fd 4d ab e5 ee 98 20 ad aa 47
|
||||
8e 56 fd 8f 4b a5 d0 9f fa 1c 6d 92 7c 40 f4 c3
|
||||
37 30 40 49 e8 a9 52 fb cb f4 5c 6f a7 7a 41 a4
|
||||
"""
|
||||
),
|
||||
)
|
||||
|
||||
def setUp(self):
|
||||
new_test_vectors = []
|
||||
for tv in self.data:
|
||||
new_tv = TestVector()
|
||||
new_tv.P = b(tv[0])
|
||||
new_tv.S = b(tv[1])
|
||||
new_tv.N = tv[2]
|
||||
new_tv.r = tv[3]
|
||||
new_tv.p = tv[4]
|
||||
new_tv.output = t2b(tv[5])
|
||||
new_tv.dkLen = len(new_tv.output)
|
||||
new_test_vectors.append(new_tv)
|
||||
self.data = new_test_vectors
|
||||
|
||||
def test2(self):
|
||||
|
||||
for tv in self.data:
|
||||
try:
|
||||
output = scrypt(tv.P, tv.S, tv.dkLen, tv.N, tv.r, tv.p)
|
||||
except ValueError as e:
|
||||
if " 2 " in str(e) and tv.N >= 1048576:
|
||||
import warnings
|
||||
warnings.warn("Not enough memory to unit test scrypt() with N=1048576", RuntimeWarning)
|
||||
continue
|
||||
else:
|
||||
raise e
|
||||
self.assertEqual(output, tv.output)
|
||||
|
||||
def test3(self):
|
||||
ref = scrypt(b("password"), b("salt"), 12, 16, 1, 1)
|
||||
|
||||
# Same output, but this time split over 2 keys
|
||||
key1, key2 = scrypt(b("password"), b("salt"), 6, 16, 1, 1, 2)
|
||||
self.assertEqual((ref[:6], ref[6:]), (key1, key2))
|
||||
|
||||
# Same output, but this time split over 3 keys
|
||||
key1, key2, key3 = scrypt(b("password"), b("salt"), 4, 16, 1, 1, 3)
|
||||
self.assertEqual((ref[:4], ref[4:8], ref[8:]), (key1, key2, key3))
|
||||
|
||||
|
||||
class bcrypt_Tests(unittest.TestCase):
|
||||
|
||||
def test_negative_cases(self):
|
||||
self.assertRaises(ValueError, bcrypt, b"1" * 73, 10)
|
||||
self.assertRaises(ValueError, bcrypt, b"1" * 10, 3)
|
||||
self.assertRaises(ValueError, bcrypt, b"1" * 10, 32)
|
||||
self.assertRaises(ValueError, bcrypt, b"1" * 10, 4, salt=b"")
|
||||
self.assertRaises(ValueError, bcrypt, b"1" * 10, 4, salt=b"1")
|
||||
self.assertRaises(ValueError, bcrypt, b"1" * 10, 4, salt=b"1" * 17)
|
||||
self.assertRaises(ValueError, bcrypt, b"1\x00" * 10, 4)
|
||||
|
||||
def test_bytearray_mismatch(self):
|
||||
ref = bcrypt("pwd", 4)
|
||||
bcrypt_check("pwd", ref)
|
||||
bref = bytearray(ref)
|
||||
bcrypt_check("pwd", bref)
|
||||
|
||||
wrong = ref[:-1] + bchr(bref[-1] ^ 0x01)
|
||||
self.assertRaises(ValueError, bcrypt_check, "pwd", wrong)
|
||||
|
||||
wrong = b"x" + ref[1:]
|
||||
self.assertRaises(ValueError, bcrypt_check, "pwd", wrong)
|
||||
|
||||
# https://github.com/patrickfav/bcrypt/wiki/Published-Test-Vectors
|
||||
|
||||
def test_empty_password(self):
|
||||
# password, cost, salt, bcrypt hash
|
||||
tvs = [
|
||||
(b"", 4, b"zVHmKQtGGQob.b/Nc7l9NO", b"$2a$04$zVHmKQtGGQob.b/Nc7l9NO8UlrYcW05FiuCj/SxsFO/ZtiN9.mNzy"),
|
||||
(b"", 5, b"zVHmKQtGGQob.b/Nc7l9NO", b"$2a$05$zVHmKQtGGQob.b/Nc7l9NOWES.1hkVBgy5IWImh9DOjKNU8atY4Iy"),
|
||||
(b"", 6, b"zVHmKQtGGQob.b/Nc7l9NO", b"$2a$06$zVHmKQtGGQob.b/Nc7l9NOjOl7l4oz3WSh5fJ6414Uw8IXRAUoiaO"),
|
||||
(b"", 7, b"zVHmKQtGGQob.b/Nc7l9NO", b"$2a$07$zVHmKQtGGQob.b/Nc7l9NOBsj1dQpBA1HYNGpIETIByoNX9jc.hOi"),
|
||||
(b"", 8, b"zVHmKQtGGQob.b/Nc7l9NO", b"$2a$08$zVHmKQtGGQob.b/Nc7l9NOiLTUh/9MDpX86/DLyEzyiFjqjBFePgO"),
|
||||
]
|
||||
|
||||
for (idx, (password, cost, salt64, result)) in enumerate(tvs):
|
||||
x = bcrypt(password, cost, salt=_bcrypt_decode(salt64))
|
||||
self.assertEqual(x, result)
|
||||
bcrypt_check(password, result)
|
||||
|
||||
def test_random_password_and_salt_short_pw(self):
|
||||
# password, cost, salt, bcrypt hash
|
||||
tvs = [
|
||||
(b"<.S.2K(Zq'", 4, b"VYAclAMpaXY/oqAo9yUpku", b"$2a$04$VYAclAMpaXY/oqAo9yUpkuWmoYywaPzyhu56HxXpVltnBIfmO9tgu"),
|
||||
(b"5.rApO%5jA", 5, b"kVNDrnYKvbNr5AIcxNzeIu", b"$2a$05$kVNDrnYKvbNr5AIcxNzeIuRcyIF5cZk6UrwHGxENbxP5dVv.WQM/G"),
|
||||
(b"oW++kSrQW^", 6, b"QLKkRMH9Am6irtPeSKN5sO", b"$2a$06$QLKkRMH9Am6irtPeSKN5sObJGr3j47cO6Pdf5JZ0AsJXuze0IbsNm"),
|
||||
(b"ggJ\\KbTnDG", 7, b"4H896R09bzjhapgCPS/LYu", b"$2a$07$4H896R09bzjhapgCPS/LYuMzAQluVgR5iu/ALF8L8Aln6lzzYXwbq"),
|
||||
(b"49b0:;VkH/", 8, b"hfvO2retKrSrx5f2RXikWe", b"$2a$08$hfvO2retKrSrx5f2RXikWeFWdtSesPlbj08t/uXxCeZoHRWDz/xFe"),
|
||||
(b">9N^5jc##'", 9, b"XZLvl7rMB3EvM0c1.JHivu", b"$2a$09$XZLvl7rMB3EvM0c1.JHivuIDPJWeNJPTVrpjZIEVRYYB/mF6cYgJK"),
|
||||
(b"\\$ch)s4WXp", 10, b"aIjpMOLK5qiS9zjhcHR5TO", b"$2a$10$aIjpMOLK5qiS9zjhcHR5TOU7v2NFDmcsBmSFDt5EHOgp/jeTF3O/q"),
|
||||
(b"RYoj\\_>2P7", 12, b"esIAHiQAJNNBrsr5V13l7.", b"$2a$12$esIAHiQAJNNBrsr5V13l7.RFWWJI2BZFtQlkFyiWXjou05GyuREZa"),
|
||||
]
|
||||
|
||||
for (idx, (password, cost, salt64, result)) in enumerate(tvs):
|
||||
x = bcrypt(password, cost, salt=_bcrypt_decode(salt64))
|
||||
self.assertEqual(x, result)
|
||||
bcrypt_check(password, result)
|
||||
|
||||
def test_random_password_and_salt_long_pw(self):
|
||||
# password, cost, salt, bcrypt hash
|
||||
tvs = [
|
||||
(b"^Q&\"]A`%/A(BVGt>QaX0M-#<Q148&f", 4, b"vrRP5vQxyD4LrqiLd/oWRO", b"$2a$04$vrRP5vQxyD4LrqiLd/oWROgrrGINsw3gb4Ga5x2sn01jNmiLVECl6"),
|
||||
(b"nZa!rRf\\U;OL;R?>1ghq_+\":Y0CRmY", 5, b"YuQvhokOGVnevctykUYpKu", b"$2a$05$YuQvhokOGVnevctykUYpKutZD2pWeGGYn3auyLOasguMY3/0BbIyq"),
|
||||
(b"F%uN/j>[GuB7-jB'_Yj!Tnb7Y!u^6)", 6, b"5L3vpQ0tG9O7k5gQ8nAHAe", b"$2a$06$5L3vpQ0tG9O7k5gQ8nAHAe9xxQiOcOLh8LGcI0PLWhIznsDt.S.C6"),
|
||||
(b"Z>BobP32ub\"Cfe*Q<<WUq3rc=[GJr-", 7, b"hp8IdLueqE6qFh1zYycUZ.", b"$2a$07$hp8IdLueqE6qFh1zYycUZ.twmUH8eSTPQAEpdNXKMlwms9XfKqfea"),
|
||||
(b"Ik&8N['7*[1aCc1lOm8\\jWeD*H$eZM", 8, b"2ANDTYCB9m7vf0Prh7rSru", b"$2a$08$2ANDTYCB9m7vf0Prh7rSrupqpO3jJOkIz2oW/QHB4lCmK7qMytGV6"),
|
||||
(b"O)=%3[E$*q+>-q-=tRSjOBh8\\mLNW.", 9, b"nArqOfdCsD9kIbVnAixnwe", b"$2a$09$nArqOfdCsD9kIbVnAixnwe6s8QvyPYWtQBpEXKir2OJF9/oNBsEFe"),
|
||||
(b"/MH51`!BP&0tj3%YCA;Xk%e3S`o\\EI", 10, b"ePiAc.s.yoBi3B6p1iQUCe", b"$2a$10$ePiAc.s.yoBi3B6p1iQUCezn3mraLwpVJ5XGelVyYFKyp5FZn/y.u"),
|
||||
(b"ptAP\"mcg6oH.\";c0U2_oll.OKi<!ku", 12, b"aroG/pwwPj1tU5fl9a9pkO", b"$2a$12$aroG/pwwPj1tU5fl9a9pkO4rydAmkXRj/LqfHZOSnR6LGAZ.z.jwa"),
|
||||
]
|
||||
|
||||
for (idx, (password, cost, salt64, result)) in enumerate(tvs):
|
||||
x = bcrypt(password, cost, salt=_bcrypt_decode(salt64))
|
||||
self.assertEqual(x, result)
|
||||
bcrypt_check(password, result)
|
||||
|
||||
def test_same_password_and_random_salt(self):
|
||||
# password, cost, salt, bcrypt hash
|
||||
tvs = [
|
||||
(b"Q/A:k3DP;X@=<0\"hg&9c", 4, b"wbgDTvLMtyjQlNK7fjqwyO", b"$2a$04$wbgDTvLMtyjQlNK7fjqwyOakBoACQuYh11.VsKNarF4xUIOBWgD6S"),
|
||||
(b"Q/A:k3DP;X@=<0\"hg&9c", 5, b"zbAaOmloOhxiKItjznRqru", b"$2a$05$zbAaOmloOhxiKItjznRqrunRqHlu3MAa7pMGv26Rr3WwyfGcwoRm6"),
|
||||
(b"Q/A:k3DP;X@=<0\"hg&9c", 6, b"aOK0bWUvLI0qLkc3ti5jyu", b"$2a$06$aOK0bWUvLI0qLkc3ti5jyuAIQoqRzuqoK09kQqQ6Ou/YKDhW50/qa"),
|
||||
]
|
||||
|
||||
for (idx, (password, cost, salt64, result)) in enumerate(tvs):
|
||||
x = bcrypt(password, cost, salt=_bcrypt_decode(salt64))
|
||||
self.assertEqual(x, result)
|
||||
bcrypt_check(password, result)
|
||||
|
||||
def test_same_password_and_salt_increasing_cost_factor(self):
|
||||
# password, cost, salt, bcrypt hash
|
||||
tvs = [
|
||||
(b"o<&+X'F4AQ8H,LU,N`&r", 4, b"BK5u.QHk1Driey7bvnFTH.", b"$2a$04$BK5u.QHk1Driey7bvnFTH.3smGwxd91PtoK2GxH5nZ7pcBsYX4lMq"),
|
||||
(b"o<&+X'F4AQ8H,LU,N`&r", 5, b"BK5u.QHk1Driey7bvnFTH.", b"$2a$05$BK5u.QHk1Driey7bvnFTH.t5P.jZvFBMzDB1IY4PwkkRPOyVbEtFG"),
|
||||
(b"o<&+X'F4AQ8H,LU,N`&r", 6, b"BK5u.QHk1Driey7bvnFTH.", b"$2a$06$BK5u.QHk1Driey7bvnFTH.6Ea1Z5db2p25CPXZbxb/3OyKQagg3pa"),
|
||||
(b"o<&+X'F4AQ8H,LU,N`&r", 7, b"BK5u.QHk1Driey7bvnFTH.", b"$2a$07$BK5u.QHk1Driey7bvnFTH.sruuQi8Lhv/0LWKDvNp3AGFk7ltdkm6"),
|
||||
(b"o<&+X'F4AQ8H,LU,N`&r", 8, b"BK5u.QHk1Driey7bvnFTH.", b"$2a$08$BK5u.QHk1Driey7bvnFTH.IE7KsaUzc4m7gzAMlyUPUeiYyACWe0q"),
|
||||
(b"o<&+X'F4AQ8H,LU,N`&r", 9, b"BK5u.QHk1Driey7bvnFTH.", b"$2a$09$BK5u.QHk1Driey7bvnFTH.1v4Xj1dwkp44QNg0cVAoQt4FQMMrvnS"),
|
||||
(b"o<&+X'F4AQ8H,LU,N`&r", 10, b"BK5u.QHk1Driey7bvnFTH.", b"$2a$10$BK5u.QHk1Driey7bvnFTH.ESINe9YntUMcVgFDfkC.Vbhc9vMhNX2"),
|
||||
(b"o<&+X'F4AQ8H,LU,N`&r", 12, b"BK5u.QHk1Driey7bvnFTH.", b"$2a$12$BK5u.QHk1Driey7bvnFTH.QM1/nnGe/f5cTzb6XTTi/vMzcAnycqG"),
|
||||
]
|
||||
|
||||
for (idx, (password, cost, salt64, result)) in enumerate(tvs):
|
||||
x = bcrypt(password, cost, salt=_bcrypt_decode(salt64))
|
||||
self.assertEqual(x, result)
|
||||
bcrypt_check(password, result)
|
||||
|
||||
def test_long_passwords(self):
|
||||
# password, cost, salt, bcrypt hash
|
||||
tvs = [
|
||||
(b"g*3Q45=\"8NNgpT&mbMJ$Omfr.#ZeW?FP=CE$#roHd?97uL0F-]`?u73c\"\\[.\"*)qU34@VG",
|
||||
4, b"T2XJ5MOWvHQZRijl8LIKkO", b"$2a$04$T2XJ5MOWvHQZRijl8LIKkOQKIyX75KBfuLsuRYOJz5OjwBNF2lM8a"),
|
||||
(b"\\M+*8;&QE=Ll[>5?Ui\"^ai#iQH7ZFtNMfs3AROnIncE9\"BNNoEgO[[*Yk8;RQ(#S,;I+aT",
|
||||
5, b"wgkOlGNXIVE2fWkT3gyRoO", b"$2a$05$wgkOlGNXIVE2fWkT3gyRoOqWi4gbi1Wv2Q2Jx3xVs3apl1w.Wtj8C"),
|
||||
(b"M.E1=dt<.L0Q&p;94NfGm_Oo23+Kpl@M5?WIAL.[@/:'S)W96G8N^AWb7_smmC]>7#fGoB",
|
||||
6, b"W9zTCl35nEvUukhhFzkKMe", b"$2a$06$W9zTCl35nEvUukhhFzkKMekjT9/pj7M0lihRVEZrX3m8/SBNZRX7i"),
|
||||
]
|
||||
|
||||
for (idx, (password, cost, salt64, result)) in enumerate(tvs):
|
||||
x = bcrypt(password, cost, salt=_bcrypt_decode(salt64))
|
||||
self.assertEqual(x, result)
|
||||
bcrypt_check(password, result)
|
||||
|
||||
def test_increasing_password_length(self):
|
||||
# password, cost, salt, bcrypt hash
|
||||
tvs = [
|
||||
(b"a", 4, b"5DCebwootqWMCp59ISrMJ.", b"$2a$04$5DCebwootqWMCp59ISrMJ.l4WvgHIVg17ZawDIrDM2IjlE64GDNQS"),
|
||||
(b"aa", 4, b"5DCebwootqWMCp59ISrMJ.", b"$2a$04$5DCebwootqWMCp59ISrMJ.AyUxBk.ThHlsLvRTH7IqcG7yVHJ3SXq"),
|
||||
(b"aaa", 4, b"5DCebwootqWMCp59ISrMJ.", b"$2a$04$5DCebwootqWMCp59ISrMJ.BxOVac5xPB6XFdRc/ZrzM9FgZkqmvbW"),
|
||||
(b"aaaa", 4, b"5DCebwootqWMCp59ISrMJ.", b"$2a$04$5DCebwootqWMCp59ISrMJ.Qbr209bpCtfl5hN7UQlG/L4xiD3AKau"),
|
||||
(b"aaaaa", 4, b"5DCebwootqWMCp59ISrMJ.", b"$2a$04$5DCebwootqWMCp59ISrMJ.oWszihPjDZI0ypReKsaDOW1jBl7oOii"),
|
||||
(b"aaaaaa", 4, b"5DCebwootqWMCp59ISrMJ.", b"$2a$04$5DCebwootqWMCp59ISrMJ./k.Xxn9YiqtV/sxh3EHbnOHd0Qsq27K"),
|
||||
(b"aaaaaaa", 4, b"5DCebwootqWMCp59ISrMJ.", b"$2a$04$5DCebwootqWMCp59ISrMJ.PYJqRFQbgRbIjMd5VNKmdKS4sBVOyDe"),
|
||||
(b"aaaaaaaa", 4, b"5DCebwootqWMCp59ISrMJ.", b"$2a$04$5DCebwootqWMCp59ISrMJ..VMYfzaw1wP/SGxowpLeGf13fxCCt.q"),
|
||||
(b"aaaaaaaaa", 4, b"5DCebwootqWMCp59ISrMJ.", b"$2a$04$5DCebwootqWMCp59ISrMJ.5B0p054nO5WgAD1n04XslDY/bqY9RJi"),
|
||||
(b"aaaaaaaaaa", 4, b"5DCebwootqWMCp59ISrMJ.", b"$2a$04$5DCebwootqWMCp59ISrMJ.INBTgqm7sdlBJDg.J5mLMSRK25ri04y"),
|
||||
(b"aaaaaaaaaaa", 4, b"5DCebwootqWMCp59ISrMJ.", b"$2a$04$5DCebwootqWMCp59ISrMJ.s3y7CdFD0OR5p6rsZw/eZ.Dla40KLfm"),
|
||||
(b"aaaaaaaaaaaa", 4, b"5DCebwootqWMCp59ISrMJ.", b"$2a$04$5DCebwootqWMCp59ISrMJ.Jx742Djra6Q7PqJWnTAS.85c28g.Siq"),
|
||||
(b"aaaaaaaaaaaaa", 4, b"5DCebwootqWMCp59ISrMJ.", b"$2a$04$5DCebwootqWMCp59ISrMJ.oKMXW3EZcPHcUV0ib5vDBnh9HojXnLu"),
|
||||
(b"aaaaaaaaaaaaaa", 4, b"5DCebwootqWMCp59ISrMJ.", b"$2a$04$5DCebwootqWMCp59ISrMJ.w6nIjWpDPNSH5pZUvLjC1q25ONEQpeS"),
|
||||
(b"aaaaaaaaaaaaaaa", 4, b"5DCebwootqWMCp59ISrMJ.", b"$2a$04$5DCebwootqWMCp59ISrMJ.k1b2/r9A/hxdwKEKurg6OCn4MwMdiGq"),
|
||||
(b"aaaaaaaaaaaaaaaa", 4, b"5DCebwootqWMCp59ISrMJ.", b"$2a$04$5DCebwootqWMCp59ISrMJ.3prCNHVX1Ws.7Hm2bJxFUnQOX9f7DFa"),
|
||||
]
|
||||
|
||||
for (idx, (password, cost, salt64, result)) in enumerate(tvs):
|
||||
x = bcrypt(password, cost, salt=_bcrypt_decode(salt64))
|
||||
self.assertEqual(x, result)
|
||||
bcrypt_check(password, result)
|
||||
|
||||
def test_non_ascii_characters(self):
|
||||
# password, cost, salt, bcrypt hash
|
||||
tvs = [
|
||||
("àèìòùÀÈÌÒÙáéíóúýÁÉÍÓÚÝðÐ", 4, b"D3qS2aoTVyqM7z8v8crLm.", b"$2a$04$D3qS2aoTVyqM7z8v8crLm.3nKt4CzBZJbyFB.ZebmfCvRw7BGs.Xm"),
|
||||
("àèìòùÀÈÌÒÙáéíóúýÁÉÍÓÚÝðÐ", 5, b"VA1FujiOCMPkUHQ8kF7IaO", b"$2a$05$VA1FujiOCMPkUHQ8kF7IaOg7NGaNvpxwWzSluQutxEVmbZItRTsAa"),
|
||||
("àèìòùÀÈÌÒÙáéíóúýÁÉÍÓÚÝðÐ", 6, b"TXiaNrPeBSz5ugiQlehRt.", b"$2a$06$TXiaNrPeBSz5ugiQlehRt.gwpeDQnXWteQL4z2FulouBr6G7D9KUi"),
|
||||
("âêîôûÂÊÎÔÛãñõÃÑÕäëïöüÿ", 4, b"YTn1Qlvps8e1odqMn6G5x.", b"$2a$04$YTn1Qlvps8e1odqMn6G5x.85pqKql6w773EZJAExk7/BatYAI4tyO"),
|
||||
("âêîôûÂÊÎÔÛãñõÃÑÕäëïöüÿ", 5, b"C.8k5vJKD2NtfrRI9o17DO", b"$2a$05$C.8k5vJKD2NtfrRI9o17DOfIW0XnwItA529vJnh2jzYTb1QdoY0py"),
|
||||
("âêîôûÂÊÎÔÛãñõÃÑÕäëïöüÿ", 6, b"xqfRPj3RYAgwurrhcA6uRO", b"$2a$06$xqfRPj3RYAgwurrhcA6uROtGlXDp/U6/gkoDYHwlubtcVcNft5.vW"),
|
||||
("ÄËÏÖÜŸåÅæÆœŒßçÇøØ¢¿¡€", 4, b"y8vGgMmr9EdyxP9rmMKjH.", b"$2a$04$y8vGgMmr9EdyxP9rmMKjH.wv2y3r7yRD79gykQtmb3N3zrwjKsyay"),
|
||||
("ÄËÏÖÜŸåÅæÆœŒßçÇøØ¢¿¡€", 5, b"iYH4XIKAOOm/xPQs7xKP1u", b"$2a$05$iYH4XIKAOOm/xPQs7xKP1upD0cWyMn3Jf0ZWiizXbEkVpS41K1dcO"),
|
||||
("ÄËÏÖÜŸåÅæÆœŒßçÇøØ¢¿¡€", 6, b"wCOob.D0VV8twafNDB2ape", b"$2a$06$wCOob.D0VV8twafNDB2apegiGD5nqF6Y1e6K95q6Y.R8C4QGd265q"),
|
||||
("ΔημοσιεύθηκεστηνΕφημερίδατης", 4, b"E5SQtS6P4568MDXW7cyUp.", b"$2a$04$E5SQtS6P4568MDXW7cyUp.18wfDisKZBxifnPZjAI1d/KTYMfHPYO"),
|
||||
("АБбВвГгДдЕеЁёЖжЗзИиЙйКкЛлМмН", 4, b"03e26gQFHhQwRNf81/ww9.", b"$2a$04$03e26gQFHhQwRNf81/ww9.p1UbrNwxpzWjLuT.zpTLH4t/w5WhAhC"),
|
||||
("нОоПпРрСсТтУуФфХхЦцЧчШшЩщЪъЫыЬьЭэЮю", 4, b"PHNoJwpXCfe32nUtLv2Upu", b"$2a$04$PHNoJwpXCfe32nUtLv2UpuhJXOzd4k7IdFwnEpYwfJVCZ/f/.8Pje"),
|
||||
("電电電島岛島兔兔兎龜龟亀國国国區区区", 4, b"wU4/0i1TmNl2u.1jIwBX.u", b"$2a$04$wU4/0i1TmNl2u.1jIwBX.uZUaOL3Rc5ID7nlQRloQh6q5wwhV/zLW"),
|
||||
("诶比伊艾弗豆贝尔维吾艾尺开艾丝维贼德", 4, b"P4kreGLhCd26d4WIy7DJXu", b"$2a$04$P4kreGLhCd26d4WIy7DJXusPkhxLvBouzV6OXkL5EB0jux0osjsry"),
|
||||
]
|
||||
|
||||
for (idx, (password, cost, salt64, result)) in enumerate(tvs):
|
||||
x = bcrypt(password, cost, salt=_bcrypt_decode(salt64))
|
||||
self.assertEqual(x, result)
|
||||
bcrypt_check(password, result)
|
||||
|
||||
def test_special_case_salt(self):
|
||||
# password, cost, salt, bcrypt hash
|
||||
tvs = [
|
||||
("-O_=*N!2JP", 4, b"......................", b"$2a$04$......................JjuKLOX9OOwo5PceZZXSkaLDvdmgb82"),
|
||||
("7B[$Q<4b>U", 5, b"......................", b"$2a$05$......................DRiedDQZRL3xq5A5FL8y7/6NM8a2Y5W"),
|
||||
(">d5-I_8^.h", 6, b"......................", b"$2a$06$......................5Mq1Ng8jgDY.uHNU4h5p/x6BedzNH2W"),
|
||||
(")V`/UM/]1t", 4, b".OC/.OC/.OC/.OC/.OC/.O", b"$2a$04$.OC/.OC/.OC/.OC/.OC/.OQIvKRDAam.Hm5/IaV/.hc7P8gwwIbmi"),
|
||||
(":@t2.bWuH]", 5, b".OC/.OC/.OC/.OC/.OC/.O", b"$2a$05$.OC/.OC/.OC/.OC/.OC/.ONDbUvdOchUiKmQORX6BlkPofa/QxW9e"),
|
||||
("b(#KljF5s\"", 6, b".OC/.OC/.OC/.OC/.OC/.O", b"$2a$06$.OC/.OC/.OC/.OC/.OC/.OHfTd9e7svOu34vi1PCvOcAEq07ST7.K"),
|
||||
("@3YaJ^Xs]*", 4, b"eGA.eGA.eGA.eGA.eGA.e.", b"$2a$04$eGA.eGA.eGA.eGA.eGA.e.stcmvh.R70m.0jbfSFVxlONdj1iws0C"),
|
||||
("'\"5\\!k*C(p", 5, b"eGA.eGA.eGA.eGA.eGA.e.", b"$2a$05$eGA.eGA.eGA.eGA.eGA.e.vR37mVSbfdHwu.F0sNMvgn8oruQRghy"),
|
||||
("edEu7C?$'W", 6, b"eGA.eGA.eGA.eGA.eGA.e.", b"$2a$06$eGA.eGA.eGA.eGA.eGA.e.tSq0FN8MWHQXJXNFnHTPQKtA.n2a..G"),
|
||||
("N7dHmg\\PI^", 4, b"999999999999999999999u", b"$2a$04$999999999999999999999uCZfA/pLrlyngNDMq89r1uUk.bQ9icOu"),
|
||||
("\"eJuHh!)7*", 5, b"999999999999999999999u", b"$2a$05$999999999999999999999uj8Pfx.ufrJFAoWFLjapYBS5vVEQQ/hK"),
|
||||
("ZeDRJ:_tu:", 6, b"999999999999999999999u", b"$2a$06$999999999999999999999u6RB0P9UmbdbQgjoQFEJsrvrKe.BoU6q"),
|
||||
]
|
||||
|
||||
for (idx, (password, cost, salt64, result)) in enumerate(tvs):
|
||||
x = bcrypt(password, cost, salt=_bcrypt_decode(salt64))
|
||||
self.assertEqual(x, result)
|
||||
bcrypt_check(password, result)
|
||||
|
||||
|
||||
class TestVectorsHKDFWycheproof(unittest.TestCase):
|
||||
|
||||
def __init__(self, wycheproof_warnings):
|
||||
unittest.TestCase.__init__(self)
|
||||
self._wycheproof_warnings = wycheproof_warnings
|
||||
self._id = "None"
|
||||
|
||||
def add_tests(self, filename):
|
||||
|
||||
def filter_algo(root):
|
||||
algo_name = root['algorithm']
|
||||
if algo_name == "HKDF-SHA-1":
|
||||
return SHA1
|
||||
elif algo_name == "HKDF-SHA-256":
|
||||
return SHA256
|
||||
elif algo_name == "HKDF-SHA-384":
|
||||
return SHA384
|
||||
elif algo_name == "HKDF-SHA-512":
|
||||
return SHA512
|
||||
else:
|
||||
raise ValueError("Unknown algorithm " + algo_name)
|
||||
|
||||
def filter_size(unit):
|
||||
return int(unit['size'])
|
||||
|
||||
result = load_test_vectors_wycheproof(("Protocol", "wycheproof"),
|
||||
filename,
|
||||
"Wycheproof HMAC (%s)" % filename,
|
||||
root_tag={'hash_module': filter_algo},
|
||||
unit_tag={'size': filter_size})
|
||||
return result
|
||||
|
||||
def setUp(self):
|
||||
self.tv = []
|
||||
self.add_tests("hkdf_sha1_test.json")
|
||||
self.add_tests("hkdf_sha256_test.json")
|
||||
self.add_tests("hkdf_sha384_test.json")
|
||||
self.add_tests("hkdf_sha512_test.json")
|
||||
|
||||
def shortDescription(self):
|
||||
return self._id
|
||||
|
||||
def warn(self, tv):
|
||||
if tv.warning and self._wycheproof_warnings:
|
||||
import warnings
|
||||
warnings.warn("Wycheproof warning: %s (%s)" % (self._id, tv.comment))
|
||||
|
||||
def test_verify(self, tv):
|
||||
self._id = "Wycheproof HKDF Test #%d (%s, %s)" % (tv.id, tv.comment, tv.filename)
|
||||
|
||||
try:
|
||||
key = HKDF(tv.ikm, tv.size, tv.salt, tv.hash_module, 1, tv.info)
|
||||
except ValueError:
|
||||
assert not tv.valid
|
||||
else:
|
||||
if key != tv.okm:
|
||||
assert not tv.valid
|
||||
else:
|
||||
assert tv.valid
|
||||
self.warn(tv)
|
||||
|
||||
def runTest(self):
|
||||
for tv in self.tv:
|
||||
self.test_verify(tv)
|
||||
|
||||
|
||||
def load_hash_by_name(hash_name):
|
||||
return __import__("Crypto.Hash." + hash_name, globals(), locals(), ["new"])
|
||||
|
||||
|
||||
class SP800_180_Counter_Tests(unittest.TestCase):
|
||||
|
||||
def test_negative_zeroes(self):
|
||||
def prf(s, x):
|
||||
return HMAC.new(s, x, SHA256).digest()
|
||||
|
||||
try:
|
||||
_ = SP800_108_Counter(b'0' * 16, 1, prf, label=b'A\x00B')
|
||||
except ValueError:
|
||||
self.fail('SP800_108_Counter failed with zero in label')
|
||||
self.assertRaises(ValueError, SP800_108_Counter, b'0' * 16, 1, prf,
|
||||
context=b'A\x00B')
|
||||
|
||||
def test_multiple_keys(self):
|
||||
def prf(s, x):
|
||||
return HMAC.new(s, x, SHA256).digest()
|
||||
|
||||
key = b'0' * 16
|
||||
expected = SP800_108_Counter(key, 2*3*23, prf)
|
||||
for r in (1, 2, 3, 23):
|
||||
dks = SP800_108_Counter(key, r, prf, 138//r)
|
||||
self.assertEqual(len(dks), 138//r)
|
||||
self.assertEqual(len(dks[0]), r)
|
||||
self.assertEqual(b''.join(dks), expected)
|
||||
|
||||
|
||||
def add_tests_sp800_108_counter(cls):
|
||||
|
||||
test_vectors_sp800_108_counter = load_test_vectors(("Protocol", ),
|
||||
"KDF_SP800_108_COUNTER.txt",
|
||||
"NIST SP 800 108 KDF Counter Mode",
|
||||
{'count': lambda x: int(x)},
|
||||
) or []
|
||||
|
||||
mac_type = None
|
||||
for idx, tv in enumerate(test_vectors_sp800_108_counter):
|
||||
|
||||
if isinstance(tv, str):
|
||||
res = re.match(r"\[HMAC-(SHA-[0-9]+)\]", tv)
|
||||
if res:
|
||||
hash_name = res.group(1).replace("-", "")
|
||||
hash_module = load_hash_by_name(hash_name)
|
||||
mac_type = "hmac"
|
||||
continue
|
||||
res = re.match(r"\[CMAC-AES-128\]", tv)
|
||||
if res:
|
||||
mac_type = "cmac"
|
||||
continue
|
||||
assert res
|
||||
|
||||
if mac_type == "hmac":
|
||||
def prf(s, x, hash_module=hash_module):
|
||||
return HMAC.new(s, x, hash_module).digest()
|
||||
elif mac_type == "cmac":
|
||||
def prf(s, x, hash_module=hash_module):
|
||||
return CMAC.new(s, x, AES).digest()
|
||||
continue
|
||||
|
||||
def kdf_test(self, prf=prf, kin=tv.kin, label=tv.label,
|
||||
context=tv.context, kout=tv.kout, count=tv.count):
|
||||
result = SP800_108_Counter(kin, len(kout), prf, 1, label, context)
|
||||
assert(len(result) == len(kout))
|
||||
self.assertEqual(result, kout)
|
||||
|
||||
setattr(cls, "test_kdf_sp800_108_counter_%d" % idx, kdf_test)
|
||||
|
||||
|
||||
add_tests_sp800_108_counter(SP800_180_Counter_Tests)
|
||||
|
||||
|
||||
def get_tests(config={}):
|
||||
wycheproof_warnings = config.get('wycheproof_warnings')
|
||||
|
||||
if not config.get('slow_tests'):
|
||||
PBKDF2_Tests._testData = PBKDF2_Tests._testData[:3]
|
||||
scrypt_Tests.data = scrypt_Tests.data[:3]
|
||||
|
||||
tests = []
|
||||
tests += list_test_cases(PBKDF1_Tests)
|
||||
tests += list_test_cases(PBKDF2_Tests)
|
||||
tests += list_test_cases(S2V_Tests)
|
||||
tests += list_test_cases(HKDF_Tests)
|
||||
tests += [TestVectorsHKDFWycheproof(wycheproof_warnings)]
|
||||
tests += list_test_cases(scrypt_Tests)
|
||||
tests += list_test_cases(bcrypt_Tests)
|
||||
tests += list_test_cases(SP800_180_Counter_Tests)
|
||||
|
||||
return tests
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
suite = lambda: unittest.TestSuite(get_tests())
|
||||
unittest.main(defaultTest='suite')
|
267
env/lib/python3.12/site-packages/Crypto/SelfTest/Protocol/test_SecretSharing.py
vendored
Normal file
267
env/lib/python3.12/site-packages/Crypto/SelfTest/Protocol/test_SecretSharing.py
vendored
Normal file
@ -0,0 +1,267 @@
|
||||
#
|
||||
# SelfTest/Protocol/test_secret_sharing.py: Self-test for secret sharing protocols
|
||||
#
|
||||
# ===================================================================
|
||||
#
|
||||
# Copyright (c) 2014, Legrandin <helderijs@gmail.com>
|
||||
# All rights reserved.
|
||||
#
|
||||
# Redistribution and use in source and binary forms, with or without
|
||||
# modification, are permitted provided that the following conditions
|
||||
# are met:
|
||||
#
|
||||
# 1. Redistributions of source code must retain the above copyright
|
||||
# notice, this list of conditions and the following disclaimer.
|
||||
# 2. Redistributions in binary form must reproduce the above copyright
|
||||
# notice, this list of conditions and the following disclaimer in
|
||||
# the documentation and/or other materials provided with the
|
||||
# distribution.
|
||||
#
|
||||
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
||||
# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
||||
# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
||||
# FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
||||
# COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
||||
# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
||||
# BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||
# LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
|
||||
# CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
|
||||
# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
||||
# POSSIBILITY OF SUCH DAMAGE.
|
||||
# ===================================================================
|
||||
|
||||
from unittest import main, TestCase, TestSuite
|
||||
from binascii import unhexlify, hexlify
|
||||
|
||||
from Crypto.Util.py3compat import *
|
||||
from Crypto.SelfTest.st_common import list_test_cases
|
||||
|
||||
from Crypto.Protocol.SecretSharing import Shamir, _Element, \
|
||||
_mult_gf2, _div_gf2
|
||||
|
||||
class GF2_Tests(TestCase):
|
||||
|
||||
def test_mult_gf2(self):
|
||||
# Prove mult by zero
|
||||
x = _mult_gf2(0,0)
|
||||
self.assertEqual(x, 0)
|
||||
|
||||
# Prove mult by unity
|
||||
x = _mult_gf2(34, 1)
|
||||
self.assertEqual(x, 34)
|
||||
|
||||
z = 3 # (x+1)
|
||||
y = _mult_gf2(z, z)
|
||||
self.assertEqual(y, 5) # (x+1)^2 = x^2 + 1
|
||||
y = _mult_gf2(y, z)
|
||||
self.assertEqual(y, 15) # (x+1)^3 = x^3 + x^2 + x + 1
|
||||
y = _mult_gf2(y, z)
|
||||
self.assertEqual(y, 17) # (x+1)^4 = x^4 + 1
|
||||
|
||||
# Prove linearity works
|
||||
comps = [1, 4, 128, 2**34]
|
||||
sum_comps = 1+4+128+2**34
|
||||
y = 908
|
||||
z = _mult_gf2(sum_comps, y)
|
||||
w = 0
|
||||
for x in comps:
|
||||
w ^= _mult_gf2(x, y)
|
||||
self.assertEqual(w, z)
|
||||
|
||||
def test_div_gf2(self):
|
||||
from Crypto.Util.number import size as deg
|
||||
|
||||
x, y = _div_gf2(567, 7)
|
||||
self.assertTrue(deg(y) < deg(7))
|
||||
|
||||
w = _mult_gf2(x, 7) ^ y
|
||||
self.assertEqual(567, w)
|
||||
|
||||
x, y = _div_gf2(7, 567)
|
||||
self.assertEqual(x, 0)
|
||||
self.assertEqual(y, 7)
|
||||
|
||||
class Element_Tests(TestCase):
|
||||
|
||||
def test1(self):
|
||||
# Test encondings
|
||||
e = _Element(256)
|
||||
self.assertEqual(int(e), 256)
|
||||
self.assertEqual(e.encode(), bchr(0)*14 + b("\x01\x00"))
|
||||
|
||||
e = _Element(bchr(0)*14 + b("\x01\x10"))
|
||||
self.assertEqual(int(e), 0x110)
|
||||
self.assertEqual(e.encode(), bchr(0)*14 + b("\x01\x10"))
|
||||
|
||||
# Only 16 byte string are a valid encoding
|
||||
self.assertRaises(ValueError, _Element, bchr(0))
|
||||
|
||||
def test2(self):
|
||||
# Test addition
|
||||
e = _Element(0x10)
|
||||
f = _Element(0x0A)
|
||||
self.assertEqual(int(e+f), 0x1A)
|
||||
|
||||
def test3(self):
|
||||
# Test multiplication
|
||||
zero = _Element(0)
|
||||
one = _Element(1)
|
||||
two = _Element(2)
|
||||
|
||||
x = _Element(6) * zero
|
||||
self.assertEqual(int(x), 0)
|
||||
|
||||
x = _Element(6) * one
|
||||
self.assertEqual(int(x), 6)
|
||||
|
||||
x = _Element(2**127) * two
|
||||
self.assertEqual(int(x), 1 + 2 + 4 + 128)
|
||||
|
||||
def test4(self):
|
||||
# Test inversion
|
||||
one = _Element(1)
|
||||
|
||||
x = one.inverse()
|
||||
self.assertEqual(int(x), 1)
|
||||
|
||||
x = _Element(82323923)
|
||||
y = x.inverse()
|
||||
self.assertEqual(int(x * y), 1)
|
||||
|
||||
class Shamir_Tests(TestCase):
|
||||
|
||||
def test1(self):
|
||||
# Test splitting
|
||||
shares = Shamir.split(2, 3, bchr(90)*16)
|
||||
self.assertEqual(len(shares), 3)
|
||||
for index in range(3):
|
||||
self.assertEqual(shares[index][0], index+1)
|
||||
self.assertEqual(len(shares[index][1]), 16)
|
||||
|
||||
def test2(self):
|
||||
# Test recombine
|
||||
from itertools import permutations
|
||||
|
||||
test_vectors = (
|
||||
(2, "d9fe73909bae28b3757854c0af7ad405",
|
||||
"1-594ae8964294174d95c33756d2504170",
|
||||
"2-d897459d29da574eb40e93ec552ffe6e",
|
||||
"3-5823de9bf0e068b054b5f07a28056b1b",
|
||||
"4-db2c1f8bff46d748f795da995bd080cb"),
|
||||
(2, "bf4f902d9a7efafd1f3ffd9291fd5de9",
|
||||
"1-557bd3b0748064b533469722d1cc7935",
|
||||
"2-6b2717164783c66d47cd28f2119f14d0",
|
||||
"3-8113548ba97d58256bb4424251ae300c",
|
||||
"4-179e9e5a218483ddaeda57539139cf04"),
|
||||
(3, "ec96aa5c14c9faa699354cf1da74e904",
|
||||
"1-64579fbf1908d66f7239bf6e2b4e41e1",
|
||||
"2-6cd9428df8017b52322561e8c672ae3e",
|
||||
"3-e418776ef5c0579bd9299277374806dd",
|
||||
"4-ab3f77a0107398d23b323e581bb43f5d",
|
||||
"5-23fe42431db2b41bd03ecdc7ea8e97ac"),
|
||||
(3, "44cf249b68b80fcdc27b47be60c2c145",
|
||||
"1-d6515a3905cd755119b86e311c801e31",
|
||||
"2-16693d9ac9f10c254036ced5f8917fa3",
|
||||
"3-84f74338a48476b99bf5e75a84d3a0d1",
|
||||
"4-3fe8878dc4a5d35811cf3cbcd33dbe52",
|
||||
"5-ad76f92fa9d0a9c4ca0c1533af7f6132"),
|
||||
(5, "5398717c982db935d968eebe53a47f5a",
|
||||
"1-be7be2dd4c068e7ef576aaa1b1c11b01",
|
||||
"2-f821f5848441cb98b3eb467e2733ee21",
|
||||
"3-25ee52f53e203f6e29a0297b5ab486b5",
|
||||
"4-fc9fb58ef74dab947fbf9acd9d5d83cd",
|
||||
"5-b1949cce46d81552e65f248d3f74cc5c",
|
||||
"6-d64797f59977c4d4a7956ad916da7699",
|
||||
"7-ab608a6546a8b9af8820ff832b1135c7"),
|
||||
(5, "4a78db90fbf35da5545d2fb728e87596",
|
||||
"1-08daf9a25d8aa184cfbf02b30a0ed6a0",
|
||||
"2-dda28261e36f0b14168c2cf153fb734e",
|
||||
"3-e9fdec5505d674a57f9836c417c1ecaa",
|
||||
"4-4dce5636ae06dee42d2c82e65f06c735",
|
||||
"5-3963dc118afc2ba798fa1d452b28ef00",
|
||||
"6-6dfe6ff5b09e94d2f84c382b12f42424",
|
||||
"7-6faea9d4d4a4e201bf6c90b9000630c3"),
|
||||
(10, "eccbf6d66d680b49b073c4f1ddf804aa",
|
||||
"01-7d8ac32fe4ae209ead1f3220fda34466",
|
||||
"02-f9144e76988aad647d2e61353a6e96d5",
|
||||
"03-b14c3b80179203363922d60760271c98",
|
||||
"04-770bb2a8c28f6cee89e00f4d5cc7f861",
|
||||
"05-6e3d7073ea368334ef67467871c66799",
|
||||
"06-248792bc74a98ce024477c13c8fb5f8d",
|
||||
"07-fcea4640d2db820c0604851e293d2487",
|
||||
"08-2776c36fb714bb1f8525a0be36fc7dba",
|
||||
"09-6ee7ac8be773e473a4bf75ee5f065762",
|
||||
"10-33657fc073354cf91d4a68c735aacfc8",
|
||||
"11-7645c65094a5868bf225c516fdee2d0c",
|
||||
"12-840485aacb8226631ecd9c70e3018086"),
|
||||
(10, "377e63bdbb5f7d4dc58a483d035212bb",
|
||||
"01-32c53260103be431c843b1a633afe3bd",
|
||||
"02-0107eb16cb8695084d452d2cc50bc7d6",
|
||||
"03-df1e5c66cd755287fb0446faccd72a06",
|
||||
"04-361bbcd5d40797f49dfa1898652da197",
|
||||
"05-160d3ad1512f7dec7fd9344aed318591",
|
||||
"06-659af6d95df4f25beca4fb9bfee3b7e8",
|
||||
"07-37f3b208977bad50b3724566b72bfa9d",
|
||||
"08-6c1de2dfc69c2986142c26a8248eb316",
|
||||
"09-5e19220837a396bd4bc8cd685ff314c3",
|
||||
"10-86e7b864fb0f3d628e46d50c1ba92f1c",
|
||||
"11-065d0082c80b1aea18f4abe0c49df72e",
|
||||
"12-84a09430c1d20ea9f388f3123c3733a3"),
|
||||
)
|
||||
|
||||
def get_share(p):
|
||||
pos = p.find('-')
|
||||
return int(p[:pos]), unhexlify(p[pos + 1:])
|
||||
|
||||
for tv in test_vectors:
|
||||
k = tv[0]
|
||||
secret = unhexlify(tv[1])
|
||||
max_perms = 10
|
||||
for perm, shares_idx in enumerate(permutations(range(2, len(tv)), k)):
|
||||
if perm > max_perms:
|
||||
break
|
||||
shares = [ get_share(tv[x]) for x in shares_idx ]
|
||||
result = Shamir.combine(shares, True)
|
||||
self.assertEqual(secret, result)
|
||||
|
||||
def test3(self):
|
||||
# Loopback split/recombine
|
||||
secret = unhexlify(b("000102030405060708090a0b0c0d0e0f"))
|
||||
|
||||
shares = Shamir.split(2, 3, secret)
|
||||
|
||||
secret2 = Shamir.combine(shares[:2])
|
||||
self.assertEqual(secret, secret2)
|
||||
|
||||
secret3 = Shamir.combine([ shares[0], shares[2] ])
|
||||
self.assertEqual(secret, secret3)
|
||||
|
||||
def test4(self):
|
||||
# Loopback split/recombine (SSSS)
|
||||
secret = unhexlify(b("000102030405060708090a0b0c0d0e0f"))
|
||||
|
||||
shares = Shamir.split(2, 3, secret, ssss=True)
|
||||
|
||||
secret2 = Shamir.combine(shares[:2], ssss=True)
|
||||
self.assertEqual(secret, secret2)
|
||||
|
||||
def test5(self):
|
||||
# Detect duplicate shares
|
||||
secret = unhexlify(b("000102030405060708090a0b0c0d0e0f"))
|
||||
|
||||
shares = Shamir.split(2, 3, secret)
|
||||
self.assertRaises(ValueError, Shamir.combine, (shares[0], shares[0]))
|
||||
|
||||
|
||||
def get_tests(config={}):
|
||||
tests = []
|
||||
tests += list_test_cases(GF2_Tests)
|
||||
tests += list_test_cases(Element_Tests)
|
||||
tests += list_test_cases(Shamir_Tests)
|
||||
return tests
|
||||
|
||||
if __name__ == '__main__':
|
||||
suite = lambda: TestSuite(get_tests())
|
||||
main(defaultTest='suite')
|
||||
|
619
env/lib/python3.12/site-packages/Crypto/SelfTest/Protocol/test_ecdh.py
vendored
Normal file
619
env/lib/python3.12/site-packages/Crypto/SelfTest/Protocol/test_ecdh.py
vendored
Normal file
@ -0,0 +1,619 @@
|
||||
import re
|
||||
import base64
|
||||
import unittest
|
||||
from binascii import hexlify, unhexlify
|
||||
|
||||
from Crypto.Util.py3compat import bord
|
||||
|
||||
from Crypto.Hash import SHA256
|
||||
from Crypto.PublicKey import ECC
|
||||
from Crypto.SelfTest.st_common import list_test_cases
|
||||
from Crypto.SelfTest.loader import load_test_vectors, load_test_vectors_wycheproof
|
||||
|
||||
from Crypto.Protocol import DH
|
||||
from Crypto.Protocol.DH import (key_agreement,
|
||||
import_x25519_public_key,
|
||||
import_x25519_private_key)
|
||||
|
||||
|
||||
class FIPS_ECDH_Tests_KAT(unittest.TestCase):
|
||||
pass
|
||||
|
||||
|
||||
test_vectors_verify = load_test_vectors(("Protocol", ),
|
||||
"KAS_ECC_CDH_PrimitiveTest.txt",
|
||||
"ECC CDH Primitive (SP800-56A Section 5.7.1.2)",
|
||||
{
|
||||
'qcavsx': lambda x: int(x, 16),
|
||||
'qcavsy': lambda x: int(x, 16),
|
||||
'diut': lambda x: int(x, 16),
|
||||
'qiutx': lambda x: int(x, 16),
|
||||
'qiuty': lambda x: int(x, 16),
|
||||
}) or []
|
||||
|
||||
for idx, tv in enumerate(test_vectors_verify):
|
||||
|
||||
# Stand-alone header with curve name
|
||||
if isinstance(tv, str):
|
||||
res = re.match(r"\[([A-Za-z0-9-]+)\]", tv)
|
||||
assert res
|
||||
curve_name = res.group(1)
|
||||
continue
|
||||
|
||||
public_key = ECC.construct(curve=curve_name,
|
||||
point_x=tv.qcavsx,
|
||||
point_y=tv.qcavsy)
|
||||
|
||||
private_key = ECC.construct(curve=curve_name,
|
||||
d=tv.diut)
|
||||
|
||||
exp_response = tv.ziut
|
||||
|
||||
def ecdh_test(self,
|
||||
public_key=public_key,
|
||||
private_key=private_key,
|
||||
exp_response=exp_response):
|
||||
z = key_agreement(
|
||||
static_pub=public_key,
|
||||
static_priv=private_key,
|
||||
kdf=lambda x: x)
|
||||
self.assertEqual(z, exp_response)
|
||||
|
||||
def ecdh_test_rev(self,
|
||||
public_key=public_key,
|
||||
private_key=private_key,
|
||||
exp_response=exp_response):
|
||||
z = key_agreement(
|
||||
static_pub=public_key,
|
||||
static_priv=private_key,
|
||||
kdf=lambda x: x)
|
||||
self.assertEqual(z, exp_response)
|
||||
|
||||
setattr(FIPS_ECDH_Tests_KAT, "test_verify_positive_%d" % idx, ecdh_test)
|
||||
if idx == 1:
|
||||
setattr(FIPS_ECDH_Tests_KAT, "test_verify_positive_rev_%d" % idx, ecdh_test_rev)
|
||||
|
||||
|
||||
class TestVectorsECDHWycheproof(unittest.TestCase):
|
||||
|
||||
desc = "Wycheproof ECDH tests"
|
||||
|
||||
def add_tests(self, filename):
|
||||
|
||||
def curve(g):
|
||||
return g['curve']
|
||||
|
||||
def private(u):
|
||||
return int(u['private'], 16)
|
||||
|
||||
result = load_test_vectors_wycheproof(("Protocol", "wycheproof"),
|
||||
filename,
|
||||
"Wycheproof ECDH (%s)"
|
||||
% filename,
|
||||
group_tag={'curve': curve},
|
||||
unit_tag={'private': private},
|
||||
)
|
||||
self.tv += result
|
||||
|
||||
def setUp(self):
|
||||
self.tv = []
|
||||
self.desc = None
|
||||
|
||||
self.add_tests("ecdh_secp224r1_ecpoint_test.json")
|
||||
self.add_tests("ecdh_secp256r1_ecpoint_test.json")
|
||||
self.add_tests("ecdh_secp384r1_ecpoint_test.json")
|
||||
self.add_tests("ecdh_secp521r1_ecpoint_test.json")
|
||||
|
||||
self.add_tests("ecdh_secp224r1_test.json")
|
||||
self.add_tests("ecdh_secp256r1_test.json")
|
||||
self.add_tests("ecdh_secp384r1_test.json")
|
||||
self.add_tests("ecdh_secp521r1_test.json")
|
||||
|
||||
def shortDescription(self):
|
||||
return self.desc
|
||||
|
||||
def test_verify(self, tv):
|
||||
|
||||
if len(tv.public) == 0:
|
||||
return
|
||||
|
||||
try:
|
||||
if bord(tv.public[0]) == 4: # SEC1
|
||||
public_key = ECC.import_key(tv.public, curve_name=tv.curve)
|
||||
else:
|
||||
public_key = ECC.import_key(tv.public)
|
||||
except ValueError:
|
||||
assert tv.warning or not tv.valid
|
||||
return
|
||||
|
||||
private_key = ECC.construct(curve=tv.curve, d=tv.private)
|
||||
|
||||
try:
|
||||
z = key_agreement(static_pub=public_key,
|
||||
static_priv=private_key,
|
||||
kdf=lambda x: x)
|
||||
except ValueError:
|
||||
assert not tv.valid
|
||||
except TypeError as e:
|
||||
assert not tv.valid
|
||||
assert "incompatible curve" in str(e)
|
||||
else:
|
||||
self.assertEqual(z, tv.shared)
|
||||
assert tv.valid
|
||||
|
||||
def runTest(self):
|
||||
for tv in self.tv:
|
||||
self.desc = "Wycheproof ECDH Verify Test #%d (%s, %s)" % (tv.id, tv.comment, tv.filename)
|
||||
self.test_verify(tv)
|
||||
|
||||
|
||||
class ECDH_Tests(unittest.TestCase):
|
||||
|
||||
static_priv = ECC.import_key('-----BEGIN PRIVATE KEY-----\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg9VHFVKh2a1aVFifH\n+BiyNaRa2kttEg3165Ye/dJxJ7KhRANCAARImIEXro5ZOcyWU2mq/+d79FEZXtTA\nbKkz1aICQXihQdCMzRNbeNtC9LFLzhu1slRKJ2xsDAlw9r6w6vwtkRzr\n-----END PRIVATE KEY-----')
|
||||
static_pub = ECC.import_key('-----BEGIN PRIVATE KEY-----\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgHhmv8zmZ+Nw8fsZd\ns8tlZflyfw2NE1CRS9DWr3Y3O46hRANCAAS3hZVUCbk+uk3w4S/YOraEVGG+WYpk\nNO/vrwzufUUks2GV2OnBQESe0EBk4Jq8gn4ij8Lvs3rZX2yT+XfeATYd\n-----END PRIVATE KEY-----').public_key()
|
||||
|
||||
eph_priv = ECC.import_key('-----BEGIN PRIVATE KEY-----\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgGPdJmFFFKzLPspIr\nE1T2cEjeIf4ajS9CpneP0e2b3AyhRANCAAQBexAA5BYDcXHs2KOksTYUsst4HhPt\nkp0zkgI2virc3OGJFNGPaCCPfFCQJHwLRaEpiq3SoQlgoBwSc8ZPsl3y\n-----END PRIVATE KEY-----')
|
||||
|
||||
eph_pub = ECC.import_key('-----BEGIN PRIVATE KEY-----\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQghaVZXElSEGEojFKF\nOU0JCpxWUWHvWQUR81gwWrOp76ShRANCAATi1Ib2K+YR3AckD8wxypWef7pw5PRw\ntBaB3RDPyE7IjHZC6yu1DbcXoCdtaw+F5DM+4zpl59n5ZaIy/Yl1BdIy\n-----END PRIVATE KEY-----')
|
||||
|
||||
def test_1(self):
|
||||
# C(0, 2s)
|
||||
kdf = lambda x: SHA256.new(x).digest()
|
||||
z = key_agreement(
|
||||
kdf=kdf,
|
||||
static_pub=self.static_pub,
|
||||
static_priv=self.static_priv)
|
||||
self.assertEqual(hexlify(z),
|
||||
b"3960a1101d1193cbaffef4cc7202ebff783c22c6d2e0d5d530ffc66dc197ea9c")
|
||||
|
||||
def test_2(self):
|
||||
# C(2e, 2s)
|
||||
kdf = lambda x: SHA256.new(x).digest()
|
||||
z = key_agreement(
|
||||
kdf=kdf,
|
||||
static_pub=self.static_pub,
|
||||
static_priv=self.static_priv,
|
||||
eph_pub=self.eph_pub,
|
||||
eph_priv=self.eph_priv)
|
||||
self.assertEqual(hexlify(z),
|
||||
b"7447b733d40c8fab2c633b3dc61e4a8c742f3a6af7e16fb0cc486f5bdb5d6ba2")
|
||||
|
||||
def test_3(self):
|
||||
# C(1e, 2s)
|
||||
kdf = lambda x: SHA256.new(x).digest()
|
||||
z = key_agreement(
|
||||
kdf=kdf,
|
||||
static_pub=self.static_pub,
|
||||
static_priv=self.static_priv,
|
||||
eph_priv=self.eph_priv)
|
||||
self.assertEqual(hexlify(z),
|
||||
b"9e977ae45f33bf67f285d064d83e6632bcafe3a7d33fe571233bab4794ace759")
|
||||
|
||||
def test_4(self):
|
||||
# C(1e, 2s)
|
||||
kdf = lambda x: SHA256.new(x).digest()
|
||||
z = key_agreement(
|
||||
kdf=kdf,
|
||||
static_pub=self.static_pub,
|
||||
static_priv=self.static_priv,
|
||||
eph_pub=self.eph_pub)
|
||||
self.assertEqual(hexlify(z),
|
||||
b"c9532df6aa7e9dbe5fe85da31ee25ff19c179c88691ec4b8328cc2036dcdadf2")
|
||||
|
||||
def test_5(self):
|
||||
# C(2e, 1s) is not supported
|
||||
kdf = lambda x: SHA256.new(x).digest()
|
||||
self.assertRaises(ValueError,
|
||||
key_agreement,
|
||||
kdf=kdf,
|
||||
static_priv=self.static_priv,
|
||||
eph_pub=self.eph_pub,
|
||||
eph_priv=self.eph_priv)
|
||||
|
||||
def test_6(self):
|
||||
# C(2e, 1s) is not supported
|
||||
kdf = lambda x: SHA256.new(x).digest()
|
||||
self.assertRaises(ValueError,
|
||||
key_agreement,
|
||||
kdf=kdf,
|
||||
static_pub=self.static_pub,
|
||||
eph_pub=self.eph_pub,
|
||||
eph_priv=self.eph_priv)
|
||||
|
||||
def test_7(self):
|
||||
# C(2e, 0)
|
||||
kdf = lambda x: SHA256.new(x).digest()
|
||||
z = key_agreement(
|
||||
kdf=kdf,
|
||||
eph_pub=self.eph_pub,
|
||||
eph_priv=self.eph_priv)
|
||||
self.assertEqual(hexlify(z),
|
||||
b"feb257ebe063078b1391aac07913283d7b642ad7df61b46dfc9cd6f420bb896a")
|
||||
|
||||
def test_8(self):
|
||||
# C(1e, 1s)
|
||||
kdf = lambda x: SHA256.new(x).digest()
|
||||
z = key_agreement(
|
||||
kdf=kdf,
|
||||
static_priv=self.static_priv,
|
||||
eph_pub=self.eph_pub)
|
||||
self.assertEqual(hexlify(z),
|
||||
b"ee4dc995117476ed57fd17ff0ed44e9f0466d46b929443bc0db9380317583b04")
|
||||
|
||||
def test_9(self):
|
||||
# C(1e, 1s)
|
||||
kdf = lambda x: SHA256.new(x).digest()
|
||||
z = key_agreement(
|
||||
kdf=kdf,
|
||||
static_pub=self.static_pub,
|
||||
eph_priv=self.eph_priv)
|
||||
self.assertEqual(hexlify(z),
|
||||
b"2351cc2014f7c40468fa072b5d30f706eeaeef7507311cd8e59bab3b43f03c51")
|
||||
|
||||
def test_10(self):
|
||||
# No private (local) keys
|
||||
kdf = lambda x: SHA256.new(x).digest()
|
||||
self.assertRaises(ValueError,
|
||||
key_agreement,
|
||||
kdf=kdf,
|
||||
static_pub=self.static_pub,
|
||||
eph_pub=self.eph_pub)
|
||||
|
||||
def test_11(self):
|
||||
# No public (peer) keys
|
||||
kdf = lambda x: SHA256.new(x).digest()
|
||||
self.assertRaises(ValueError,
|
||||
key_agreement,
|
||||
kdf=kdf,
|
||||
static_priv=self.static_priv,
|
||||
eph_priv=self.eph_priv)
|
||||
|
||||
def test_12(self):
|
||||
# failure if kdf is missing
|
||||
self.assertRaises(ValueError,
|
||||
key_agreement,
|
||||
static_pub=self.static_pub,
|
||||
static_priv=self.static_priv)
|
||||
|
||||
|
||||
class X25519_Tests(unittest.TestCase):
|
||||
|
||||
def test_rfc7748_1(self):
|
||||
tvs = (
|
||||
("a546e36bf0527c9d3b16154b82465edd62144c0ac1fc5a18506a2244ba449ac4",
|
||||
"e6db6867583030db3594c1a424b15f7c726624ec26b3353b10a903a6d0ab1c4c",
|
||||
"c3da55379de9c6908e94ea4df28d084f32eccf03491c71f754b4075577a28552"),
|
||||
("4b66e9d4d1b4673c5ad22691957d6af5c11b6421e0ea01d42ca4169e7918ba0d",
|
||||
"e5210f12786811d3f4b7959d0538ae2c31dbe7106fc03c3efc4cd549c715a493",
|
||||
"95cbde9476e8907d7aade45cb4b873f88b595a68799fa152e6f8f7647aac7957"),
|
||||
)
|
||||
|
||||
for tv1, tv2, tv3 in tvs:
|
||||
priv_key = DH.import_x25519_private_key(unhexlify(tv1))
|
||||
pub_key = DH.import_x25519_public_key(unhexlify(tv2))
|
||||
result = key_agreement(static_pub=pub_key,
|
||||
static_priv=priv_key,
|
||||
kdf=lambda x: x)
|
||||
self.assertEqual(result, unhexlify(tv3))
|
||||
|
||||
def test_rfc7748_2(self):
|
||||
k = unhexlify("0900000000000000000000000000000000000000000000000000000000000000")
|
||||
|
||||
priv_key = DH.import_x25519_private_key(k)
|
||||
pub_key = DH.import_x25519_public_key(k)
|
||||
result = key_agreement(static_pub=pub_key,
|
||||
static_priv=priv_key,
|
||||
kdf=lambda x: x)
|
||||
self.assertEqual(
|
||||
result,
|
||||
unhexlify("422c8e7a6227d7bca1350b3e2bb7279f7897b87bb6854b783c60e80311ae3079")
|
||||
)
|
||||
|
||||
for _ in range(999):
|
||||
priv_key = DH.import_x25519_private_key(result)
|
||||
pub_key = DH.import_x25519_public_key(k)
|
||||
k = result
|
||||
result = key_agreement(static_pub=pub_key,
|
||||
static_priv=priv_key,
|
||||
kdf=lambda x: x)
|
||||
|
||||
self.assertEqual(
|
||||
result,
|
||||
unhexlify("684cf59ba83309552800ef566f2f4d3c1c3887c49360e3875f2eb94d99532c51")
|
||||
)
|
||||
|
||||
def test_rfc7748_3(self):
|
||||
tv1 = "77076d0a7318a57d3c16c17251b26645df4c2f87ebc0992ab177fba51db92c2a"
|
||||
tv2 = "8520f0098930a754748b7ddcb43ef75a0dbf3a0d26381af4eba4a98eaa9b4e6a"
|
||||
tv3 = "5dab087e624a8a4b79e17f8b83800ee66f3bb1292618b6fd1c2f8b27ff88e0eb"
|
||||
tv4 = "de9edb7d7b7dc1b4d35b61c2ece435373f8343c85b78674dadfc7e146f882b4f"
|
||||
tv5 = "4a5d9d5ba4ce2de1728e3bf480350f25e07e21c947d19e3376f09b3c1e161742"
|
||||
|
||||
alice_priv_key = DH.import_x25519_private_key(unhexlify(tv1))
|
||||
alice_pub_key = DH.import_x25519_public_key(unhexlify(tv2))
|
||||
bob_priv_key = DH.import_x25519_private_key(unhexlify(tv3))
|
||||
bob_pub_key = DH.import_x25519_public_key(unhexlify(tv4))
|
||||
secret = unhexlify(tv5)
|
||||
|
||||
result1 = key_agreement(static_pub=alice_pub_key,
|
||||
static_priv=bob_priv_key,
|
||||
kdf=lambda x: x)
|
||||
result2 = key_agreement(static_pub=bob_pub_key,
|
||||
static_priv=alice_priv_key,
|
||||
kdf=lambda x: x)
|
||||
self.assertEqual(result1, secret)
|
||||
self.assertEqual(result2, secret)
|
||||
|
||||
def test_weak(self):
|
||||
|
||||
weak_keys = (
|
||||
"0000000000000000000000000000000000000000000000000000000000000000",
|
||||
"0100000000000000000000000000000000000000000000000000000000000000",
|
||||
"e0eb7a7c3b41b8ae1656e3faf19fc46ada098deb9c32b1fd866205165f49b800",
|
||||
"5f9c95bca3508c24b1d0b1559c83ef5b04445cc4581c8e86d8224eddd09f1157",
|
||||
"ecffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f",
|
||||
"edffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f",
|
||||
"eeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f",
|
||||
# The implementation will accept these value, but only because
|
||||
# it will set the MSB to zero (as required by RFC7748, Section 5),
|
||||
# therefore leading to another public key (and to a point which is
|
||||
# not of low order anymore).
|
||||
# "cdeb7a7c3b41b8ae1656e3faf19fc46ada098deb9c32b1fd866205165f49b880",
|
||||
# "4c9c95bca3508c24b1d0b1559c83ef5b04445cc4581c8e86d8224eddd09f11d7",
|
||||
# "d9ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
|
||||
# "daffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
|
||||
# "dbffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
|
||||
)
|
||||
|
||||
for x in weak_keys:
|
||||
self.assertRaises(ValueError,
|
||||
DH.import_x25519_public_key,
|
||||
unhexlify(x))
|
||||
|
||||
|
||||
class X448_Tests(unittest.TestCase):
|
||||
|
||||
def test_rfc7748_1(self):
|
||||
tvs = (
|
||||
("3d262fddf9ec8e88495266fea19a34d28882acef045104d0d1aae121700a779c984c24f8cdd78fbff44943eba368f54b29259a4f1c600ad3",
|
||||
"06fce640fa3487bfda5f6cf2d5263f8aad88334cbd07437f020f08f9814dc031ddbdc38c19c6da2583fa5429db94ada18aa7a7fb4ef8a086",
|
||||
"ce3e4ff95a60dc6697da1db1d85e6afbdf79b50a2412d7546d5f239fe14fbaadeb445fc66a01b0779d98223961111e21766282f73dd96b6f"),
|
||||
("203d494428b8399352665ddca42f9de8fef600908e0d461cb021f8c538345dd77c3e4806e25f46d3315c44e0a5b4371282dd2c8d5be3095f",
|
||||
"0fbcc2f993cd56d3305b0b7d9e55d4c1a8fb5dbb52f8e9a1e9b6201b165d015894e56c4d3570bee52fe205e28a78b91cdfbde71ce8d157db",
|
||||
"884a02576239ff7a2f2f63b2db6a9ff37047ac13568e1e30fe63c4a7ad1b3ee3a5700df34321d62077e63633c575c1c954514e99da7c179d"),
|
||||
)
|
||||
|
||||
for tv1, tv2, tv3 in tvs:
|
||||
priv_key = DH.import_x448_private_key(unhexlify(tv1))
|
||||
pub_key = DH.import_x448_public_key(unhexlify(tv2))
|
||||
result = key_agreement(static_pub=pub_key,
|
||||
static_priv=priv_key,
|
||||
kdf=lambda x: x)
|
||||
self.assertEqual(result, unhexlify(tv3))
|
||||
|
||||
def test_rfc7748_2(self):
|
||||
k = unhexlify("0500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000")
|
||||
|
||||
priv_key = DH.import_x448_private_key(k)
|
||||
pub_key = DH.import_x448_public_key(k)
|
||||
result = key_agreement(static_pub=pub_key,
|
||||
static_priv=priv_key,
|
||||
kdf=lambda x: x)
|
||||
self.assertEqual(
|
||||
result,
|
||||
unhexlify("3f482c8a9f19b01e6c46ee9711d9dc14fd4bf67af30765c2ae2b846a4d23a8cd0db897086239492caf350b51f833868b9bc2b3bca9cf4113")
|
||||
)
|
||||
|
||||
for _ in range(999):
|
||||
priv_key = DH.import_x448_private_key(result)
|
||||
pub_key = DH.import_x448_public_key(k)
|
||||
k = result
|
||||
result = key_agreement(static_pub=pub_key,
|
||||
static_priv=priv_key,
|
||||
kdf=lambda x: x)
|
||||
|
||||
self.assertEqual(
|
||||
result,
|
||||
unhexlify("aa3b4749d55b9daf1e5b00288826c467274ce3ebbdd5c17b975e09d4af6c67cf10d087202db88286e2b79fceea3ec353ef54faa26e219f38")
|
||||
)
|
||||
|
||||
def test_rfc7748_3(self):
|
||||
tv1 = "9a8f4925d1519f5775cf46b04b5800d4ee9ee8bae8bc5565d498c28dd9c9baf574a9419744897391006382a6f127ab1d9ac2d8c0a598726b"
|
||||
tv2 = "9b08f7cc31b7e3e67d22d5aea121074a273bd2b83de09c63faa73d2c22c5d9bbc836647241d953d40c5b12da88120d53177f80e532c41fa0"
|
||||
tv3 = "1c306a7ac2a0e2e0990b294470cba339e6453772b075811d8fad0d1d6927c120bb5ee8972b0d3e21374c9c921b09d1b0366f10b65173992d"
|
||||
tv4 = "3eb7a829b0cd20f5bcfc0b599b6feccf6da4627107bdb0d4f345b43027d8b972fc3e34fb4232a13ca706dcb57aec3dae07bdc1c67bf33609"
|
||||
tv5 = "07fff4181ac6cc95ec1c16a94a0f74d12da232ce40a77552281d282bb60c0b56fd2464c335543936521c24403085d59a449a5037514a879d"
|
||||
|
||||
alice_priv_key = DH.import_x448_private_key(unhexlify(tv1))
|
||||
alice_pub_key = DH.import_x448_public_key(unhexlify(tv2))
|
||||
bob_priv_key = DH.import_x448_private_key(unhexlify(tv3))
|
||||
bob_pub_key = DH.import_x448_public_key(unhexlify(tv4))
|
||||
secret = unhexlify(tv5)
|
||||
|
||||
result1 = key_agreement(static_pub=alice_pub_key,
|
||||
static_priv=bob_priv_key,
|
||||
kdf=lambda x: x)
|
||||
result2 = key_agreement(static_pub=bob_pub_key,
|
||||
static_priv=alice_priv_key,
|
||||
kdf=lambda x: x)
|
||||
self.assertEqual(result1, secret)
|
||||
self.assertEqual(result2, secret)
|
||||
|
||||
def test_weak(self):
|
||||
|
||||
weak_keys = (
|
||||
"0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000",
|
||||
"0100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000",
|
||||
"fefffffffffffffffffffffffffffffffffffffffffffffffffffffffeffffffffffffffffffffffffffffffffffffffffffffffffffffff",
|
||||
"fffffffffffffffffffffffffffffffffffffffffffffffffffffffffeffffffffffffffffffffffffffffffffffffffffffffffffffffff",
|
||||
"00000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
|
||||
)
|
||||
|
||||
for x in weak_keys:
|
||||
self.assertRaises(ValueError,
|
||||
DH.import_x448_public_key,
|
||||
unhexlify(x))
|
||||
|
||||
|
||||
class TestVectorsXECDHWycheproof(unittest.TestCase):
|
||||
|
||||
desc = "Wycheproof XECDH tests"
|
||||
|
||||
def add_tests_hex(self, filename):
|
||||
|
||||
def encoding(g):
|
||||
return g['type']
|
||||
|
||||
def private(u):
|
||||
return unhexlify(u['private'])
|
||||
|
||||
result = load_test_vectors_wycheproof(("Protocol", "wycheproof"),
|
||||
filename,
|
||||
"Wycheproof ECDH (%s)"
|
||||
% filename,
|
||||
group_tag={'encoding': encoding},
|
||||
unit_tag={'private': private}
|
||||
)
|
||||
self.tv += result
|
||||
|
||||
def add_tests_ascii(self, filename):
|
||||
|
||||
def encoding(g):
|
||||
return g['type']
|
||||
|
||||
def public(u):
|
||||
return u['public']
|
||||
|
||||
def private(u):
|
||||
return u['private']
|
||||
|
||||
result = load_test_vectors_wycheproof(("Protocol", "wycheproof"),
|
||||
filename,
|
||||
"Wycheproof ECDH (%s)"
|
||||
% filename,
|
||||
group_tag={'encoding': encoding},
|
||||
unit_tag={'public': public,
|
||||
'private': private}
|
||||
)
|
||||
self.tv += result
|
||||
|
||||
def setUp(self):
|
||||
self.tv = []
|
||||
self.desc = None
|
||||
|
||||
self.add_tests_hex("x25519_test.json")
|
||||
self.add_tests_hex("x25519_asn_test.json")
|
||||
self.add_tests_ascii("x25519_pem_test.json")
|
||||
self.add_tests_ascii("x25519_jwk_test.json")
|
||||
|
||||
def shortDescription(self):
|
||||
return self.desc
|
||||
|
||||
def test_verify(self, tv):
|
||||
|
||||
if tv.encoding == "XdhComp":
|
||||
try:
|
||||
public_key = import_x25519_public_key(tv.public)
|
||||
except ValueError as e:
|
||||
assert tv.valid
|
||||
assert tv.warning
|
||||
assert "LowOrderPublic" in tv.flags
|
||||
assert "Invalid Curve25519" in str(e)
|
||||
return
|
||||
private_key = import_x25519_private_key(tv.private)
|
||||
elif tv.encoding in ("XdhAsnComp", "XdhPemComp"):
|
||||
try:
|
||||
public_key = ECC.import_key(tv.public)
|
||||
private_key = ECC.import_key(tv.private)
|
||||
except ECC.UnsupportedEccFeature as e:
|
||||
assert not tv.valid
|
||||
assert "Unsupported ECC" in str(e)
|
||||
return
|
||||
except ValueError:
|
||||
assert tv.valid
|
||||
assert tv.warning
|
||||
assert "LowOrderPublic" in tv.flags
|
||||
return
|
||||
elif tv.encoding == "XdhJwkComp":
|
||||
|
||||
if 'y' in tv.public:
|
||||
return
|
||||
if 'x' not in tv.public:
|
||||
return
|
||||
if 'x' not in tv.private:
|
||||
return
|
||||
if tv.public.get('kty') != 'OKP':
|
||||
return
|
||||
if tv.public.get('crv') != 'X25519':
|
||||
return
|
||||
if tv.private.get('crv') != 'X25519':
|
||||
return
|
||||
|
||||
def base64url_decode(input_str):
|
||||
input_str = input_str.replace('-', '+').replace('_', '/')
|
||||
padding = 4 - (len(input_str) % 4)
|
||||
if padding != 4:
|
||||
input_str += '=' * padding
|
||||
decoded_bytes = base64.b64decode(input_str)
|
||||
return decoded_bytes
|
||||
|
||||
jwk_public = base64url_decode(tv.public['x'])
|
||||
jwk_private = base64url_decode(tv.private['d'])
|
||||
|
||||
try:
|
||||
public_key = import_x25519_public_key(jwk_public)
|
||||
private_key = import_x25519_private_key(jwk_private)
|
||||
except ValueError as e:
|
||||
if tv.valid:
|
||||
assert tv.warning
|
||||
assert "LowOrderPublic" in tv.flags
|
||||
assert "Invalid Curve25519" in str(e)
|
||||
return
|
||||
else:
|
||||
assert "Incorrect length" in str(e)
|
||||
return
|
||||
except ValueError:
|
||||
assert tv.valid
|
||||
else:
|
||||
raise ValueError("Unknown encoding", tv.encoding)
|
||||
|
||||
try:
|
||||
z = key_agreement(static_pub=public_key,
|
||||
static_priv=private_key,
|
||||
kdf=lambda x: x)
|
||||
except ValueError:
|
||||
assert not tv.valid
|
||||
except TypeError as e:
|
||||
assert not tv.valid
|
||||
assert "incompatible curve" in str(e)
|
||||
else:
|
||||
self.assertEqual(z, tv.shared)
|
||||
assert tv.valid
|
||||
|
||||
def runTest(self):
|
||||
for tv in self.tv:
|
||||
self.desc = "Wycheproof XECDH Verify Test #%d (%s, %s)" % (tv.id, tv.comment, tv.filename)
|
||||
self.test_verify(tv)
|
||||
|
||||
|
||||
def get_tests(config={}):
|
||||
|
||||
tests = []
|
||||
tests += list_test_cases(FIPS_ECDH_Tests_KAT)
|
||||
tests += [TestVectorsECDHWycheproof()]
|
||||
tests += list_test_cases(ECDH_Tests)
|
||||
tests += list_test_cases(X25519_Tests)
|
||||
tests += list_test_cases(X448_Tests)
|
||||
tests += [TestVectorsXECDHWycheproof()]
|
||||
|
||||
slow_tests = config.get('slow_tests')
|
||||
if slow_tests:
|
||||
pass
|
||||
|
||||
return tests
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
def suite():
|
||||
return unittest.TestSuite(get_tests())
|
||||
unittest.main(defaultTest='suite')
|
62
env/lib/python3.12/site-packages/Crypto/SelfTest/Protocol/test_rfc1751.py
vendored
Normal file
62
env/lib/python3.12/site-packages/Crypto/SelfTest/Protocol/test_rfc1751.py
vendored
Normal file
@ -0,0 +1,62 @@
|
||||
#
|
||||
# Test script for Crypto.Util.RFC1751.
|
||||
#
|
||||
# Part of the Python Cryptography Toolkit
|
||||
#
|
||||
# Written by Andrew Kuchling and others
|
||||
#
|
||||
# ===================================================================
|
||||
# The contents of this file are dedicated to the public domain. To
|
||||
# the extent that dedication to the public domain is not available,
|
||||
# everyone is granted a worldwide, perpetual, royalty-free,
|
||||
# non-exclusive license to exercise all rights associated with the
|
||||
# contents of this file for any purpose whatsoever.
|
||||
# No rights are reserved.
|
||||
#
|
||||
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||||
# EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||||
# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
||||
# NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
|
||||
# BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
|
||||
# ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
||||
# CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||
# SOFTWARE.
|
||||
# ===================================================================
|
||||
|
||||
__revision__ = "$Id$"
|
||||
|
||||
import binascii
|
||||
import unittest
|
||||
from Crypto.Util import RFC1751
|
||||
from Crypto.Util.py3compat import *
|
||||
|
||||
test_data = [('EB33F77EE73D4053', 'TIDE ITCH SLOW REIN RULE MOT'),
|
||||
('CCAC2AED591056BE4F90FD441C534766',
|
||||
'RASH BUSH MILK LOOK BAD BRIM AVID GAFF BAIT ROT POD LOVE'),
|
||||
('EFF81F9BFBC65350920CDD7416DE8009',
|
||||
'TROD MUTE TAIL WARM CHAR KONG HAAG CITY BORE O TEAL AWL')
|
||||
]
|
||||
|
||||
class RFC1751Test_k2e (unittest.TestCase):
|
||||
|
||||
def runTest (self):
|
||||
"Check converting keys to English"
|
||||
for key, words in test_data:
|
||||
key=binascii.a2b_hex(b(key))
|
||||
self.assertEqual(RFC1751.key_to_english(key), words)
|
||||
|
||||
class RFC1751Test_e2k (unittest.TestCase):
|
||||
|
||||
def runTest (self):
|
||||
"Check converting English strings to keys"
|
||||
for key, words in test_data:
|
||||
key=binascii.a2b_hex(b(key))
|
||||
self.assertEqual(RFC1751.english_to_key(words), key)
|
||||
|
||||
# class RFC1751Test
|
||||
|
||||
def get_tests(config={}):
|
||||
return [RFC1751Test_k2e(), RFC1751Test_e2k()]
|
||||
|
||||
if __name__ == "__main__":
|
||||
unittest.main()
|
Reference in New Issue
Block a user