test_crypto_engine.py 3.0 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192
  1. import unittest
  2. from pwman.util.callback import Callback
  3. import os
  4. from pwman.util.crypto_engine import (CryptoEngine, CryptoException)
  5. import time
  6. # set cls_timout to negative number (e.g. -1) to disable
  7. default_config = {'Global': {'umask': '0100', 'colors': 'yes',
  8. 'cls_timeout': '5'
  9. },
  10. 'Database': {'type': 'SQLite',
  11. 'filename': os.path.join("tests", "pwman.db")},
  12. 'Encryption': {'algorithm': 'AES'},
  13. 'Readline': {'history': os.path.join("tests",
  14. "history")}
  15. }
  16. #config.set_defaults(default_config)
  17. give_key = lambda msg: "12345"
  18. give_wrong_key = lambda msg: "verywrongtkey"
  19. salt = b'cUDHNMJdTRxiIDPXuT163UMvi4fd2pXz/bRg2Zm8ajE='
  20. digest = b'9eaec7dc1ee647338406739c54dbf9c4881c74702008eb978622811cfc46a07f'
  21. class DummyCallback(Callback):
  22. def getinput(self, question):
  23. return u'12345'
  24. def getsecret(self, question):
  25. return u'12345'
  26. def getnewsecret(self, question):
  27. return u'12345'
  28. class CryptoEngineTest(unittest.TestCase):
  29. def test4_d_get_crypto(self):
  30. ce = CryptoEngine.get()
  31. ce.callback = DummyCallback()
  32. secret2 = ce.changepassword(reader=give_key)
  33. secret1 = ce.changepassword(reader=give_key)
  34. # althouth the same secret key is used,
  35. # the secret hash is not the same, because a
  36. # different random seed is used when calling
  37. # CryptoEngine._get_digest
  38. self.assertNotEqual(secret1, secret2)
  39. def test5_e_authenticate(self):
  40. ce = CryptoEngine.get()
  41. ce._reader = give_key
  42. self.assertFalse(ce.authenticate('verywrong'))
  43. self.assertTrue(ce.authenticate('12345'))
  44. ce._timeout = -1
  45. self.assertTrue(ce._is_authenticated())
  46. def test6_is_timedout(self):
  47. ce = CryptoEngine.get()
  48. ce._timeout = 1
  49. time.sleep(1.1)
  50. self.assertTrue(ce._is_timedout())
  51. self.assertIsNone(ce._cipher)
  52. self.assertFalse(ce._is_authenticated())
  53. def test_f_encrypt_decrypt(self):
  54. ce = CryptoEngine.get()
  55. ce._reader = give_key
  56. if not ce._salt:
  57. ce._salt = salt
  58. secret = ce.encrypt("topsecret")
  59. decrypt = ce.decrypt(secret)
  60. self.assertEqual(decrypt.decode(), "topsecret")
  61. ce._cipher = None
  62. secret = ce.encrypt("topsecret")
  63. decrypt = ce.decrypt(secret)
  64. self.assertEqual(decrypt.decode(), "topsecret")
  65. def test_g_encrypt_decrypt_wrong_pass(self):
  66. ce = CryptoEngine.get()
  67. ce._cipher = None
  68. ce._getsecret = give_wrong_key
  69. self.assertRaises(CryptoException, ce.encrypt, "secret")
  70. ce._getsecret = lambda x: u'12345'
  71. secret = ce.encrypt(u"topsecret")
  72. decrypt = ce.decrypt(secret)
  73. self.assertEqual(decrypt.decode(), "topsecret")
  74. if __name__ == '__main__':
  75. unittest.main(verbosity=1, failfast=True)