123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115 |
- import os
- import re
- import shutil
- import tempfile
- from binascii import hexlify
- from attic.crypto import bytes_to_long, num_aes_blocks
- from attic.testsuite import AtticTestCase
- from attic.key import PlaintextKey, PassphraseKey, KeyfileKey, COMPR_DEFAULT
- from attic.helpers import Location, unhexlify
- class KeyTestCase(AtticTestCase):
- class MockArgs(object):
- repository = Location(tempfile.mkstemp()[1])
- compression = COMPR_DEFAULT
- mac = None
- keyfile2_key_file = """
- ATTIC KEY 0000000000000000000000000000000000000000000000000000000000000000
- hqlhbGdvcml0aG2kZ21hY6d2ZXJzaW9uAaRkYXRh2gDQByfRqTSTSlAic/cXPGs0IsqVb+
- Zi/U16d6T+dUBtRHFjaFCJqtY+CPWiv2BD35cZop4TImLdGYcGvOAVOzdGKL7n8dTVnI0G
- jnapbvt8NBYRhXV9G3hFMTLjncJoHLQwHSXkVoG/UjBWHf9pcyhfSdWAyePkWrfk0K+O97
- /MGvYdUDeMju89c7SZKOD4PVZ+gG9ILpmI0SvCciptAX2ZrNqeJ3AkqoVzThT7VsNwbpHF
- j7MgZ5hWAqLA+PkEZ39jnchWWm2dxJMkjUmeAGjoiappdGVyYXRpb25zzgABhqCkc2FsdN
- oAIHxtfNeGPOnhza/lXT492RZEVFmm2hewR0MwDhI6DQAopGhhc2jaACAtXRPR5mDd71wp
- xNWoIlr9AAAAAAAAAAAAAAAAAAAAAA==""".strip()
- keyfile2_cdata = unhexlify(re.sub('\W', '', """
- 039295060014da0020c772252fb7a88e06be0e1e371168fb5b00000000000000000000000000000000
- a80000000000000000af86399e604aa35fed0fae7bc02b39ae
- """))
- keyfile2_id = unhexlify('b1927b00c683abe7b40ec4cc3d8c8f2f00000000000000000000000000000000')
- def setUp(self):
- self.tmppath = tempfile.mkdtemp()
- os.environ['ATTIC_KEYS_DIR'] = self.tmppath
- def tearDown(self):
- shutil.rmtree(self.tmppath)
- class MockRepository(object):
- class _Location(object):
- orig = '/some/place'
- _location = _Location()
- id = bytes(32)
- def _test_make_testdata(self):
- # modify tearDown to not kill the key file first, before using this
- os.environ['ATTIC_PASSPHRASE'] = 'passphrase'
- key = KeyfileKey.create(self.MockRepository(), self.MockArgs())
- print("keyfile2_key_file: find the it in the filesystem, see location in test log output")
- print("keyfile2_cdata:", hexlify(key.encrypt(b'payload')))
- print("keyfile2_id:", hexlify(key.id_hash(b'payload')))
- assert False
- def test_plaintext(self):
- key = PlaintextKey.create(None, self.MockArgs())
- data = b'foo'
- self.assert_equal(hexlify(key.id_hash(data)), b'2c26b46b68ffc68ff99b453c1d30413413422d706483bfa0f98a5e886266e7ae')
- self.assert_equal(data, key.decrypt(key.id_hash(data), key.encrypt(data)))
- def test_keyfile(self):
- os.environ['ATTIC_PASSPHRASE'] = 'test'
- key = KeyfileKey.create(self.MockRepository(), self.MockArgs())
- self.assert_equal(bytes_to_long(key.enc_iv, 8), 0)
- manifest = key.encrypt(b'XXX')
- self.assert_equal(key.extract_nonce(manifest), 0)
- manifest2 = key.encrypt(b'XXX')
- self.assert_not_equal(manifest, manifest2)
- self.assert_equal(key.decrypt(None, manifest), key.decrypt(None, manifest2))
- self.assert_equal(key.extract_nonce(manifest2), 1)
- iv = key.extract_nonce(manifest)
- key2 = KeyfileKey.detect(self.MockRepository(), manifest)
- # we just assume that the payload fits into 1 AES block (which is given for b'XXX').
- self.assert_equal(bytes_to_long(key2.enc_iv, 8), iv + 1)
- # Key data sanity check
- self.assert_equal(len(set([key2.id_key, key2.enc_key, key2.enc_hmac_key])), 3)
- self.assert_equal(key2.chunk_seed == 0, False)
- data = b'foo'
- self.assert_equal(data, key2.decrypt(key.id_hash(data), key.encrypt(data)))
- def test_keyfile2(self):
- with open(os.path.join(os.environ['ATTIC_KEYS_DIR'], 'keyfile'), 'w') as fd:
- fd.write(self.keyfile2_key_file)
- os.environ['ATTIC_PASSPHRASE'] = 'passphrase'
- key = KeyfileKey.detect(self.MockRepository(), self.keyfile2_cdata)
- self.assert_equal(key.decrypt(self.keyfile2_id, self.keyfile2_cdata), b'payload')
- def test_passphrase(self):
- os.environ['ATTIC_PASSPHRASE'] = 'test'
- key = PassphraseKey.create(self.MockRepository(), self.MockArgs())
- self.assert_equal(bytes_to_long(key.enc_iv, 8), 0)
- self.assert_equal(hexlify(key.id_key), b'793b0717f9d8fb01c751a487e9b827897ceea62409870600013fbc6b4d8d7ca6')
- self.assert_equal(hexlify(key.enc_hmac_key), b'b885a05d329a086627412a6142aaeb9f6c54ab7950f996dd65587251f6bc0901')
- self.assert_equal(hexlify(key.enc_key), b'2ff3654c6daf7381dbbe718d2b20b4f1ea1e34caa6cc65f6bb3ac376b93fed2a')
- self.assert_equal(key.chunk_seed, -775740477)
- manifest = key.encrypt(b'XXX')
- self.assert_equal(key.extract_nonce(manifest), 0)
- manifest2 = key.encrypt(b'XXX')
- self.assert_not_equal(manifest, manifest2)
- self.assert_equal(key.decrypt(None, manifest), key.decrypt(None, manifest2))
- self.assert_equal(key.extract_nonce(manifest2), 1)
- iv = key.extract_nonce(manifest)
- key2 = PassphraseKey.detect(self.MockRepository(), manifest)
- # we just assume that the payload fits into 1 AES block (which is given for b'XXX').
- self.assert_equal(bytes_to_long(key2.enc_iv, 8), iv + 1)
- self.assert_equal(key.id_key, key2.id_key)
- self.assert_equal(key.enc_hmac_key, key2.enc_hmac_key)
- self.assert_equal(key.enc_key, key2.enc_key)
- self.assert_equal(key.chunk_seed, key2.chunk_seed)
- data = b'foo'
- self.assert_equal(hexlify(key.id_hash(data)), b'a409d69859b8a07625f066e42cde050100000000000000000000000000000000')
- self.assert_equal(data, key2.decrypt(key2.id_hash(data), key.encrypt(data)))
|