key.py 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119
  1. import os
  2. import re
  3. import shutil
  4. import tempfile
  5. from binascii import hexlify
  6. from attic.crypto import bytes_to_long
  7. from attic.testsuite import AtticTestCase
  8. from attic.key import PlaintextKey, PassphraseKey, KeyfileKey, COMPR_DEFAULT, increment_iv
  9. from attic.helpers import Location, unhexlify
  10. class KeyTestCase(AtticTestCase):
  11. class MockArgs:
  12. repository = Location(tempfile.mkstemp()[1])
  13. compression = COMPR_DEFAULT
  14. mac = None
  15. cipher = None
  16. keyfile2_key_file = """
  17. ATTIC KEY 0000000000000000000000000000000000000000000000000000000000000000
  18. hqRzYWx02gAgA1l4jfyv22y6U/mxxDT8HodSWAcX0g3nOESrQcNnBsundmVyc2lvbgGqaX
  19. RlcmF0aW9uc84AAYagqWFsZ29yaXRobaRnbWFjpGhhc2iw7eaB54JssAOnM1S4S9CeTaRk
  20. YXRh2gDQzmuyg3iYjMeTLObY+ybI+QfngB+5mmHeEAfBa42fuEZgqM3rYyMj2XfgvamF+O
  21. 0asvhEyy9om190FaOxQ4RiiTMNqSP0FKLmd1i5ZyDMfRyp7JbscRFs9Ryk28yXWkv0MgQy
  22. EAYlaycY+6lWdRSgEPxidyPl9t9dr2AI/UuiQytwqmcmXgWD6Px6wgpOS/4AcRmEvDqIIl
  23. Rc2xsu+RevGAxk5rnrIIRPr7WB5R2cinzEn9ylDgBDt9LZbq706ELgtwVTnjWB8FBTPwVI
  24. vLTTXQ==
  25. """.strip()
  26. keyfile2_cdata = unhexlify(re.sub('\W', '', """
  27. 0393c4102e5ce8f5e9477c9e4ce2de453121aa139600001402c41000000000000000000000000000000000
  28. c2c407b0147a64a379d1
  29. """))
  30. keyfile2_id = unhexlify('dd9451069663931c8abd85452d016733')
  31. def setUp(self):
  32. self.tmppath = tempfile.mkdtemp()
  33. os.environ['ATTIC_KEYS_DIR'] = self.tmppath
  34. def tearDown(self):
  35. shutil.rmtree(self.tmppath)
  36. class MockRepository:
  37. class _Location:
  38. orig = '/some/place'
  39. _location = _Location()
  40. id = bytes(32)
  41. def _test_make_testdata(self):
  42. # modify tearDown to not kill the key file first, before using this
  43. os.environ['ATTIC_PASSPHRASE'] = 'passphrase'
  44. key = KeyfileKey.create(self.MockRepository(), self.MockArgs())
  45. print("keyfile2_key_file: find the it in the filesystem, see location in test log output")
  46. print("keyfile2_cdata:", hexlify(key.encrypt(b'payload')))
  47. print("keyfile2_id:", hexlify(key.id_hash(b'payload')))
  48. assert False
  49. def test_plaintext(self):
  50. key = PlaintextKey.create(None, self.MockArgs())
  51. data = b'foo'
  52. self.assert_equal(hexlify(key.id_hash(data)), b'4c9137bc0dd3ddb31de4e138a49d7eb3')
  53. self.assert_equal(data, key.decrypt(key.id_hash(data), key.encrypt(data)))
  54. def test_keyfile(self):
  55. os.environ['ATTIC_PASSPHRASE'] = 'test'
  56. key = KeyfileKey.create(self.MockRepository(), self.MockArgs())
  57. self.assert_equal(key.enc_iv, b'\0'*16)
  58. manifest = key.encrypt(b'XXX')
  59. self.assert_equal(key.extract_iv(manifest), b'\0'*16)
  60. manifest2 = key.encrypt(b'XXX')
  61. self.assert_not_equal(manifest, manifest2)
  62. self.assert_equal(key.decrypt(None, manifest), key.decrypt(None, manifest2))
  63. self.assert_equal(key.extract_iv(manifest2), b'\0'*15+b'\x01')
  64. iv = key.extract_iv(manifest)
  65. key2 = KeyfileKey.detect(self.MockRepository(), manifest)
  66. # we assume that the payload fits into one 16B AES block (which is given for b'XXX').
  67. iv_plus_1 = increment_iv(iv, 16)
  68. self.assert_equal(key2.enc_iv, iv_plus_1)
  69. # Key data sanity check
  70. self.assert_equal(len(set([key2.id_key, key2.enc_key, key2.enc_hmac_key])), 3)
  71. self.assert_equal(key2.chunk_seed == 0, False)
  72. data = b'foo'
  73. self.assert_equal(data, key2.decrypt(key.id_hash(data), key.encrypt(data)))
  74. def test_keyfile2(self):
  75. with open(os.path.join(os.environ['ATTIC_KEYS_DIR'], 'keyfile'), 'w') as fd:
  76. fd.write(self.keyfile2_key_file)
  77. os.environ['ATTIC_PASSPHRASE'] = 'passphrase'
  78. key = KeyfileKey.detect(self.MockRepository(), self.keyfile2_cdata)
  79. self.assert_equal(key.decrypt(self.keyfile2_id, self.keyfile2_cdata), b'payload')
  80. def test_passphrase(self):
  81. os.environ['ATTIC_PASSPHRASE'] = 'test'
  82. key = PassphraseKey.create(self.MockRepository(), self.MockArgs())
  83. self.assert_equal(key.enc_iv, b'\0'*16)
  84. self.assert_equal(hexlify(key.id_key), b'793b0717f9d8fb01c751a487e9b827897ceea62409870600013fbc6b4d8d7ca6')
  85. self.assert_equal(hexlify(key.enc_hmac_key), b'b885a05d329a086627412a6142aaeb9f6c54ab7950f996dd65587251f6bc0901')
  86. self.assert_equal(hexlify(key.enc_key), b'2ff3654c6daf7381dbbe718d2b20b4f1ea1e34caa6cc65f6bb3ac376b93fed2a')
  87. self.assert_equal(key.chunk_seed, -775740477)
  88. manifest = key.encrypt(b'XXX')
  89. self.assert_equal(key.extract_iv(manifest), b'\0'*16)
  90. manifest2 = key.encrypt(b'XXX')
  91. self.assert_not_equal(manifest, manifest2)
  92. self.assert_equal(key.decrypt(None, manifest), key.decrypt(None, manifest2))
  93. self.assert_equal(key.extract_iv(manifest2), b'\0'*15+b'\x01')
  94. iv = key.extract_iv(manifest)
  95. key2 = PassphraseKey.detect(self.MockRepository(), manifest)
  96. # we assume that the payload fits into one 16B AES block (which is given for b'XXX').
  97. iv_plus_1 = increment_iv(iv, 16)
  98. self.assert_equal(key2.enc_iv, iv_plus_1)
  99. self.assert_equal(key.id_key, key2.id_key)
  100. self.assert_equal(key.enc_hmac_key, key2.enc_hmac_key)
  101. self.assert_equal(key.enc_key, key2.enc_key)
  102. self.assert_equal(key.chunk_seed, key2.chunk_seed)
  103. data = b'foo'
  104. self.assert_equal(hexlify(key.id_hash(data)), b'a409d69859b8a07625f066e42cde0501')
  105. self.assert_equal(data, key2.decrypt(key2.id_hash(data), key.encrypt(data)))