test_crypto_engine.py 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293
  1. import unittest
  2. import pwman.util.config as config
  3. from pwman.util.callback import Callback
  4. import os
  5. from pwman.util.crypto_engine import (CryptoEngine, CryptoException)
  6. import time
  7. # set cls_timout to negative number (e.g. -1) to disable
  8. default_config = {'Global': {'umask': '0100', 'colors': 'yes',
  9. 'cls_timeout': '5'
  10. },
  11. 'Database': {'type': 'SQLite',
  12. 'filename': os.path.join("tests", "pwman.db")},
  13. 'Encryption': {'algorithm': 'AES'},
  14. 'Readline': {'history': os.path.join("tests",
  15. "history")}
  16. }
  17. #config.set_defaults(default_config)
  18. give_key = lambda msg: "12345"
  19. give_wrong_key = lambda msg: "verywrongtkey"
  20. salt = b'cUDHNMJdTRxiIDPXuT163UMvi4fd2pXz/bRg2Zm8ajE='
  21. digest = b'9eaec7dc1ee647338406739c54dbf9c4881c74702008eb978622811cfc46a07f'
  22. class DummyCallback(Callback):
  23. def getinput(self, question):
  24. return u'12345'
  25. def getsecret(self, question):
  26. return u'12345'
  27. def getnewsecret(self, question):
  28. return u'12345'
  29. class CryptoEngineTest(unittest.TestCase):
  30. def test4_d_get_crypto(self):
  31. ce = CryptoEngine.get()
  32. ce.callback = DummyCallback()
  33. secret2 = ce.changepassword(reader=give_key)
  34. secret1 = ce.changepassword(reader=give_key)
  35. # althouth the same secret key is used,
  36. # the secret hash is not the same, because a
  37. # different random seed is used when calling
  38. # CryptoEngine._get_digest
  39. self.assertNotEqual(secret1, secret2)
  40. def test5_e_authenticate(self):
  41. ce = CryptoEngine.get()
  42. ce._reader = give_key
  43. self.assertFalse(ce.authenticate('verywrong'))
  44. self.assertTrue(ce.authenticate('12345'))
  45. ce._timeout = -1
  46. self.assertTrue(ce._is_authenticated())
  47. def test6_is_timedout(self):
  48. ce = CryptoEngine.get()
  49. ce._timeout = 1
  50. time.sleep(1.1)
  51. self.assertTrue(ce._is_timedout())
  52. self.assertIsNone(ce._cipher)
  53. self.assertFalse(ce._is_authenticated())
  54. def test_f_encrypt_decrypt(self):
  55. ce = CryptoEngine.get()
  56. ce._reader = give_key
  57. if not ce._salt:
  58. ce._salt = salt
  59. secret = ce.encrypt("topsecret")
  60. decrypt = ce.decrypt(secret)
  61. self.assertEqual(decrypt.decode(), "topsecret")
  62. ce._cipher = None
  63. secret = ce.encrypt("topsecret")
  64. decrypt = ce.decrypt(secret)
  65. self.assertEqual(decrypt.decode(), "topsecret")
  66. def test_g_encrypt_decrypt_wrong_pass(self):
  67. ce = CryptoEngine.get()
  68. ce._cipher = None
  69. ce._getsecret = give_wrong_key
  70. self.assertRaises(CryptoException, ce.encrypt, "secret")
  71. ce._getsecret = lambda x: u'12345'
  72. secret = ce.encrypt(u"topsecret")
  73. decrypt = ce.decrypt(secret)
  74. self.assertEqual(decrypt.decode(), "topsecret")
  75. if __name__ == '__main__':
  76. unittest.main(verbosity=1, failfast=True)