1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75
|
#!/usr/bin/env python
"""Unit tests for M2Crypto.EC, ECDSA part.
Copyright (c) 2000 Ng Pheng Siong. All rights reserved.
Portions copyright (c) 2005-2006 Vrije Universiteit Amsterdam. All rights reserved.
"""
import unittest
import sha
from M2Crypto import EC, BIO, Rand, m2
class ECDSATestCase(unittest.TestCase):
errkey = 'tests/rsa.priv.pem'
privkey = 'tests/ec.priv.pem'
pubkey = 'tests/ec.pub.pem'
data = sha.sha('Can you spell subliminal channel?').digest()
def callback(self, *args):
pass
def callback2(self):
pass
def test_loadkey_junk(self):
self.assertRaises(ValueError, EC.load_key, self.errkey)
def test_loadkey(self):
ec = EC.load_key(self.privkey)
assert len(ec) == 233
def test_loadpubkey(self):
# XXX more work needed
ec = EC.load_pub_key(self.pubkey)
assert len(ec) == 233
self.assertRaises(EC.ECError, EC.load_pub_key, self.errkey)
def _test_sign_dsa(self):
ec = EC.gen_params(EC.NID_sect233k1)
# ec.gen_key()
self.assertRaises(EC.ECError, ec.sign_dsa, self.data)
ec = EC.load_key(self.privkey)
r, s = ec.sign_dsa(self.data)
assert ec.verify_dsa(self.data, r, s)
assert not ec.verify_dsa(self.data, s, r)
def test_sign_dsa_asn1(self):
ec = EC.load_key(self.privkey)
blob = ec.sign_dsa_asn1(self.data)
assert ec.verify_dsa_asn1(self.data, blob)
self.assertRaises(EC.ECError, ec.verify_dsa_asn1, blob, self.data)
def test_verify_dsa(self):
ec = EC.load_key(self.privkey)
r, s = ec.sign_dsa(self.data)
ec2 = EC.load_pub_key(self.pubkey)
assert ec2.verify_dsa(self.data, r, s)
assert not ec2.verify_dsa(self.data, s, r)
def test_genparam(self):
ec = EC.gen_params(EC.NID_sect233k1)
assert len(ec) == 233
def suite():
return unittest.makeSuite(ECDSATestCase)
if __name__ == '__main__':
Rand.load_file('randpool.dat', -1)
unittest.TextTestRunner().run(suite())
Rand.save_file('randpool.dat')
|