test_crypto_engine.py 3.2 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798
  1. import unittest
  2. import pwman.util.config as config
  3. from pwman.util.callback import Callback
  4. import os
  5. from pwman.util.crypto_engine import (CryptoEngine, CryptoException)
  6. import time
  7. # set cls_timout to negative number (e.g. -1) to disable
  8. default_config = {'Global': {'umask': '0100', 'colors': 'yes',
  9. 'cls_timeout': '5'
  10. },
  11. 'Database': {'type': 'SQLite',
  12. 'filename': os.path.join("tests", "pwman.db")},
  13. 'Encryption': {'algorithm': 'AES'},
  14. 'Readline': {'history': os.path.join("tests",
  15. "history")}
  16. }
  17. config.set_defaults(default_config)
  18. give_key = lambda msg: "verysecretkey"
  19. give_wrong_key = lambda msg: "verywrongtkey"
  20. salt = b"jwGGiQsG/JIzxWL31/QptaI61lphARqOJbQ2UqwmukE="
  21. digest = b"3185bbf9ff483b2ddbd21bfeba6d5f54e62f45711e341c85c5b935ee26143650"
  22. class DummyCallback(Callback):
  23. def getinput(self, question):
  24. return u'verysecretkey'
  25. def getsecret(self, question):
  26. return u'verysecretkey'
  27. def getnewsecret(self, question):
  28. return u'verysecretkey'
  29. class CryptoEngineTest(unittest.TestCase):
  30. def test4_d_get_crypto(self):
  31. ce = CryptoEngine.get()
  32. ce.callback = DummyCallback()
  33. secret2 = ce.changepassword(reader=give_key)
  34. secret1 = ce.changepassword(reader=give_key)
  35. # althouth the same secret key is used,
  36. # the secret hash is not the same, because a
  37. # different random seed is used when calling
  38. # CryptoEngine._get_digest
  39. self.assertNotEqual(secret1, secret2)
  40. def test5_e_authenticate(self):
  41. ce = CryptoEngine.get()
  42. ce._reader = give_key
  43. if not ce._salt:
  44. ce._salt = salt
  45. if not ce._digest:
  46. ce._digest = digest
  47. ce.authenticate('verywrong')
  48. self.assertFalse(ce.authenticate('verywrong'))
  49. self.assertTrue(ce.authenticate('verysecretkey'))
  50. ce._timeout = -1
  51. self.assertTrue(ce._is_authenticated())
  52. def test6_is_timedout(self):
  53. ce = CryptoEngine.get()
  54. ce._timeout = 1
  55. time.sleep(1.1)
  56. self.assertTrue(ce._is_timedout())
  57. self.assertIsNone(ce._cipher)
  58. self.assertFalse(ce._is_authenticated())
  59. def test_f_encrypt_decrypt(self):
  60. ce = CryptoEngine.get()
  61. ce._reader = give_key
  62. if not ce._salt:
  63. ce._salt = salt
  64. secret = ce.encrypt("topsecret")
  65. decrypt = ce.decrypt(secret)
  66. self.assertEqual(decrypt.decode(), "topsecret")
  67. ce._cipher = None
  68. secret = ce.encrypt("topsecret")
  69. decrypt = ce.decrypt(secret)
  70. self.assertEqual(decrypt.decode(), "topsecret")
  71. def test_g_encrypt_decrypt_wrong_pass(self):
  72. ce = CryptoEngine.get()
  73. ce._cipher = None
  74. ce._getsecret = give_wrong_key
  75. self.assertRaises(CryptoException, ce.encrypt, "secret")
  76. ce._getsecret = lambda x: u'verysecretkey'
  77. secret = ce.encrypt(u"topsecret")
  78. decrypt = ce.decrypt(secret)
  79. self.assertEqual(decrypt.decode(), "topsecret")
  80. if __name__ == '__main__':
  81. unittest.main()