1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88
|
#!/usr/bin/python2.4
#
# Copyright 2008 Google Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"""
Testcases to test behavior of Keyczar Crypters.
@author: arkajit.dey@gmail.com (Arkajit Dey)
"""
import os
import unittest
from keyczar import errors
from keyczar import keyczar
from keyczar import readers
from keyczar import util
TEST_DATA = os.path.realpath(os.path.join(os.getcwd(), "..", "..", "testdata"))
class CrypterTest(unittest.TestCase):
def setUp(self):
self.input = "This is some test data"
def __testDecrypt(self, subdir, reader=None):
path = os.path.join(TEST_DATA, subdir)
if reader:
crypter = keyczar.Crypter(reader)
else:
crypter = keyczar.Crypter.Read(path)
active_ciphertext = util.ReadFile(os.path.join(path, "1.out"))
primary_ciphertext = util.ReadFile(os.path.join(path, "2.out"))
active_decrypted = crypter.Decrypt(active_ciphertext)
self.assertEquals(self.input, active_decrypted)
primary_decrypted = crypter.Decrypt(primary_ciphertext)
self.assertEquals(self.input, primary_decrypted)
def __testEncryptAndDecrypt(self, subdir):
crypter = keyczar.Crypter.Read(os.path.join(TEST_DATA, subdir))
ciphertext = crypter.Encrypt(self.input)
plaintext = crypter.Decrypt(ciphertext)
self.assertEquals(self.input, plaintext)
def testAesDecrypt(self):
self.__testDecrypt("aes")
def testAesEncryptedKeyDecrypt(self):
file_reader = readers.FileReader(os.path.join(TEST_DATA, "aes-crypted"))
key_decrypter = keyczar.Crypter.Read(os.path.join(TEST_DATA, "aes"))
reader = readers.EncryptedReader(file_reader, key_decrypter)
self.__testDecrypt("aes-crypted", reader)
def testRsaDecrypt(self):
self.__testDecrypt("rsa")
def testAesEncryptAndDecrypt(self):
self.__testEncryptAndDecrypt("aes")
def testRsaEncryptAndDecrypt(self):
self.__testEncryptAndDecrypt("rsa")
def testBadAesCiphertexts(self):
crypter = keyczar.Crypter.Read(os.path.join(TEST_DATA, "aes"))
ciphertext = util.Decode(crypter.Encrypt(self.input)) # in bytes
bad = util.Encode(chr(0))
char = chr(ord(ciphertext[2]) ^ 44) # Munge key hash info in ciphertext
ciphertext = util.Encode(ciphertext[:2]+char+ciphertext[3:])
self.assertRaises(errors.ShortCiphertextError, crypter.Decrypt, bad)
self.assertRaises(errors.KeyNotFoundError, crypter.Decrypt, ciphertext)
def tearDown(self):
self.input = None
def suite():
return unittest.makeSuite(CrypterTest, 'test')
|