key.py 5.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111
  1. import os
  2. import re
  3. import shutil
  4. import tempfile
  5. from binascii import hexlify
  6. from attic.crypto import bytes_to_long, num_aes_blocks
  7. from attic.testsuite import AtticTestCase
  8. from attic.key import PlaintextKey, PassphraseKey, KeyfileKey
  9. from attic.helpers import Location, unhexlify
  10. class KeyTestCase(AtticTestCase):
  11. class MockArgs(object):
  12. repository = Location(tempfile.mkstemp()[1])
  13. keyfile2_key_file = """
  14. ATTIC KEY 0000000000000000000000000000000000000000000000000000000000000000
  15. hqppdGVyYXRpb25zzgABhqCkc2FsdNoAICiRWfijWqIuvr+70VzOsUS4Y6NM45FWm6LgCu
  16. 2GyalGqWFsZ29yaXRobaRnbWFjpGhhc2jaACDgCK7u30Pi+Du1qHRyWBupAAAAAAAAAAAA
  17. AAAAAAAAAKd2ZXJzaW9uAaRkYXRh2gDQrlCtq2mzdmkuhwIoko5+amxYqnlfNHHZxRFiX9
  18. F8AliP7H6S0j9uHyrBKRDWtj7VGYWVW8COy/FncLRgRhspB59rH3y/GS6pfeEw7RWUPd32
  19. eOcB6v8q+IHUvGttyFRcN6PxSFHBhOKN0jqStP0UqXLv+d9rGWi6X/HNZGu9WPkqs/g0G9
  20. xnf48i9pOy19aQo3HV//ubf+VYWmc1J8zjCS2Og0JkMtxbqM6j4mShPjkURZZBXSJGtORV
  21. 5IzNAzixJWmr8LR12TmFGVb0U9P79A==""".strip()
  22. keyfile2_cdata = unhexlify(re.sub('\W', '', """
  23. 004078370be366ac3ad9d147992be8ebee000000000000000000000000000000000000000000000000
  24. b94bfb5d0a63b0c47cf74e2d0585aa
  25. """))
  26. keyfile2_id = unhexlify('45f309b4ef353c467d16a19039b87e5400000000000000000000000000000000')
  27. def setUp(self):
  28. self.tmppath = tempfile.mkdtemp()
  29. os.environ['ATTIC_KEYS_DIR'] = self.tmppath
  30. def tearDown(self):
  31. shutil.rmtree(self.tmppath)
  32. class MockRepository(object):
  33. class _Location(object):
  34. orig = '/some/place'
  35. _location = _Location()
  36. id = bytes(32)
  37. def _test_make_testdata(self):
  38. # modify tearDown to not kill the key file first, before using this
  39. os.environ['ATTIC_PASSPHRASE'] = 'passphrase'
  40. key = KeyfileKey.create(self.MockRepository(), self.MockArgs())
  41. print("keyfile2_key_file: find the it in the filesystem, see location in test log output")
  42. print("keyfile2_cdata:", hexlify(key.encrypt(b'payload')))
  43. print("keyfile2_id:", hexlify(key.id_hash(b'payload')))
  44. assert False
  45. def test_plaintext(self):
  46. key = PlaintextKey.create(None, None)
  47. data = b'foo'
  48. self.assert_equal(hexlify(key.id_hash(data)), b'2c26b46b68ffc68ff99b453c1d30413413422d706483bfa0f98a5e886266e7ae')
  49. self.assert_equal(data, key.decrypt(key.id_hash(data), key.encrypt(data)))
  50. def test_keyfile(self):
  51. os.environ['ATTIC_PASSPHRASE'] = 'test'
  52. key = KeyfileKey.create(self.MockRepository(), self.MockArgs())
  53. self.assert_equal(bytes_to_long(key.enc_iv, 8), 0)
  54. manifest = key.encrypt(b'XXX')
  55. self.assert_equal(key.extract_nonce(manifest), 0)
  56. manifest2 = key.encrypt(b'XXX')
  57. self.assert_not_equal(manifest, manifest2)
  58. self.assert_equal(key.decrypt(None, manifest), key.decrypt(None, manifest2))
  59. self.assert_equal(key.extract_nonce(manifest2), 1)
  60. iv = key.extract_nonce(manifest)
  61. key2 = KeyfileKey.detect(self.MockRepository(), manifest)
  62. self.assert_equal(bytes_to_long(key2.enc_iv, 8), iv + num_aes_blocks(len(manifest) - KeyfileKey.PAYLOAD_OVERHEAD))
  63. # Key data sanity check
  64. self.assert_equal(len(set([key2.id_key, key2.enc_key, key2.enc_hmac_key])), 3)
  65. self.assert_equal(key2.chunk_seed == 0, False)
  66. data = b'foo'
  67. self.assert_equal(data, key2.decrypt(key.id_hash(data), key.encrypt(data)))
  68. def test_keyfile2(self):
  69. with open(os.path.join(os.environ['ATTIC_KEYS_DIR'], 'keyfile'), 'w') as fd:
  70. fd.write(self.keyfile2_key_file)
  71. os.environ['ATTIC_PASSPHRASE'] = 'passphrase'
  72. key = KeyfileKey.detect(self.MockRepository(), self.keyfile2_cdata)
  73. self.assert_equal(key.decrypt(self.keyfile2_id, self.keyfile2_cdata), b'payload')
  74. def test_passphrase(self):
  75. os.environ['ATTIC_PASSPHRASE'] = 'test'
  76. key = PassphraseKey.create(self.MockRepository(), None)
  77. self.assert_equal(bytes_to_long(key.enc_iv, 8), 0)
  78. self.assert_equal(hexlify(key.id_key), b'793b0717f9d8fb01c751a487e9b827897ceea62409870600013fbc6b4d8d7ca6')
  79. self.assert_equal(hexlify(key.enc_hmac_key), b'b885a05d329a086627412a6142aaeb9f6c54ab7950f996dd65587251f6bc0901')
  80. self.assert_equal(hexlify(key.enc_key), b'2ff3654c6daf7381dbbe718d2b20b4f1ea1e34caa6cc65f6bb3ac376b93fed2a')
  81. self.assert_equal(key.chunk_seed, -775740477)
  82. manifest = key.encrypt(b'XXX')
  83. self.assert_equal(key.extract_nonce(manifest), 0)
  84. manifest2 = key.encrypt(b'XXX')
  85. self.assert_not_equal(manifest, manifest2)
  86. self.assert_equal(key.decrypt(None, manifest), key.decrypt(None, manifest2))
  87. self.assert_equal(key.extract_nonce(manifest2), 1)
  88. iv = key.extract_nonce(manifest)
  89. key2 = PassphraseKey.detect(self.MockRepository(), manifest)
  90. self.assert_equal(bytes_to_long(key2.enc_iv, 8), iv + num_aes_blocks(len(manifest) - PassphraseKey.PAYLOAD_OVERHEAD))
  91. self.assert_equal(key.id_key, key2.id_key)
  92. self.assert_equal(key.enc_hmac_key, key2.enc_hmac_key)
  93. self.assert_equal(key.enc_key, key2.enc_key)
  94. self.assert_equal(key.chunk_seed, key2.chunk_seed)
  95. data = b'foo'
  96. self.assert_equal(hexlify(key.id_hash(data)), b'a409d69859b8a07625f066e42cde050100000000000000000000000000000000')
  97. self.assert_equal(data, key2.decrypt(key2.id_hash(data), key.encrypt(data)))