test_crypto_engine.py 3.1 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697
  1. import unittest
  2. import pwman.util.config as config
  3. from pwman.util.callback import Callback
  4. import os
  5. from pwman.util.crypto_engine import (CryptoEngine, CryptoException)
  6. import time
  7. # set cls_timout to negative number (e.g. -1) to disable
  8. default_config = {'Global': {'umask': '0100', 'colors': 'yes',
  9. 'cls_timeout': '5'
  10. },
  11. 'Database': {'type': 'SQLite',
  12. 'filename': os.path.join("tests", "pwman.db")},
  13. 'Encryption': {'algorithm': 'AES'},
  14. 'Readline': {'history': os.path.join("tests",
  15. "history")}
  16. }
  17. config.set_defaults(default_config)
  18. give_key = lambda msg: "verysecretkey"
  19. give_wrong_key = lambda msg: "verywrongtkey"
  20. salt = b'cUDHNMJdTRxiIDPXuT163UMvi4fd2pXz/bRg2Zm8ajE='
  21. digest = b'9eaec7dc1ee647338406739c54dbf9c4881c74702008eb978622811cfc46a07f'
  22. class DummyCallback(Callback):
  23. def getinput(self, question):
  24. return u'12345'
  25. def getsecret(self, question):
  26. return u'12345'
  27. def getnewsecret(self, question):
  28. return u'12345'
  29. class CryptoEngineTest(unittest.TestCase):
  30. def test4_d_get_crypto(self):
  31. ce = CryptoEngine.get()
  32. ce.callback = DummyCallback()
  33. secret2 = ce.changepassword(reader=give_key)
  34. secret1 = ce.changepassword(reader=give_key)
  35. # althouth the same secret key is used,
  36. # the secret hash is not the same, because a
  37. # different random seed is used when calling
  38. # CryptoEngine._get_digest
  39. self.assertNotEqual(secret1, secret2)
  40. def test5_e_authenticate(self):
  41. ce = CryptoEngine.get()
  42. ce._reader = give_key
  43. if not ce._salt:
  44. ce._salt = salt
  45. if not ce._digest:
  46. ce._digest = digest
  47. self.assertFalse(ce.authenticate('verywrong'))
  48. self.assertTrue(ce.authenticate('12345'))
  49. ce._timeout = -1
  50. self.assertTrue(ce._is_authenticated())
  51. def test6_is_timedout(self):
  52. ce = CryptoEngine.get()
  53. ce._timeout = 1
  54. time.sleep(1.1)
  55. self.assertTrue(ce._is_timedout())
  56. self.assertIsNone(ce._cipher)
  57. self.assertFalse(ce._is_authenticated())
  58. def test_f_encrypt_decrypt(self):
  59. ce = CryptoEngine.get()
  60. ce._reader = give_key
  61. if not ce._salt:
  62. ce._salt = salt
  63. secret = ce.encrypt("topsecret")
  64. decrypt = ce.decrypt(secret)
  65. self.assertEqual(decrypt.decode(), "topsecret")
  66. ce._cipher = None
  67. secret = ce.encrypt("topsecret")
  68. decrypt = ce.decrypt(secret)
  69. self.assertEqual(decrypt.decode(), "topsecret")
  70. def test_g_encrypt_decrypt_wrong_pass(self):
  71. ce = CryptoEngine.get()
  72. ce._cipher = None
  73. ce._getsecret = give_wrong_key
  74. self.assertRaises(CryptoException, ce.encrypt, "secret")
  75. ce._getsecret = lambda x: u'12345'
  76. secret = ce.encrypt(u"topsecret")
  77. decrypt = ce.decrypt(secret)
  78. self.assertEqual(decrypt.decode(), "topsecret")
  79. if __name__ == '__main__':
  80. unittest.main()