#!/usr/bin/env python """ (C) 2015,2017,2018,2019 Jack Lloyd Botan is released under the Simplified BSD License (see license.txt) """ import unittest import binascii import botan2 def hex_encode(buf): return binascii.hexlify(buf).decode('ascii') def hex_decode(buf): return binascii.unhexlify(buf.encode('ascii')) class BotanPythonTests(unittest.TestCase): # pylint: disable=too-many-public-methods,too-many-locals def test_version(self): version_str = botan2.version_string() self.assertTrue(version_str.startswith('Botan ')) self.assertEqual(botan2.version_major(), 3) self.assertGreaterEqual(botan2.version_minor(), 0) self.assertGreaterEqual(botan2.ffi_api_version(), 20180713) def test_compare(self): x = "1234" y = "1234" z = "1233" self.assertTrue(botan2.const_time_compare(x, y)) self.assertFalse(botan2.const_time_compare(x, z)) self.assertFalse(botan2.const_time_compare(x, x + z)) def test_block_cipher(self): aes = botan2.BlockCipher("AES-128") self.assertEqual(aes.algo_name(), "AES-128") self.assertEqual(aes.block_size(), 16) self.assertEqual(aes.minimum_keylength(), 16) self.assertEqual(aes.maximum_keylength(), 16) aes.set_key(hex_decode("000102030405060708090a0b0c0d0e0f")) ct = aes.encrypt(hex_decode("00112233445566778899aabbccddeeff")) self.assertEqual(hex_encode(ct), "69c4e0d86a7b0430d8cdb78070b4c55a") pt = aes.decrypt(ct) self.assertEqual(hex_encode(pt), "00112233445566778899aabbccddeeff") def test_kdf(self): secret = hex_decode('6FD4C3C0F38E5C7A6F83E99CD9BD') salt = hex_decode('DBB986') label = hex_decode('') expected = hex_decode('02AEB40A3D4B66FBA540F9D4B20006F2046E0F3A029DEAB201FC692B79EB27CEF7E16069046A') produced = botan2.kdf('KDF2(SHA-1)', secret, 38, salt, label) self.assertEqual(hex_encode(produced), hex_encode(expected)) def test_pbkdf(self): (salt, iterations, pbkdf) = botan2.pbkdf('PBKDF2(SHA-1)', '', 32, 10000, hex_decode('0001020304050607')) self.assertEqual(iterations, 10000) self.assertEqual(hex_encode(pbkdf), '59b2b1143b4cb1059ec58d9722fb1c72471e0d85c6f7543ba5228526375b0127') (salt, iterations, pbkdf) = botan2.pbkdf_timed('PBKDF2(SHA-256)', 'xyz', 32, 200) cmp_pbkdf = botan2.pbkdf('PBKDF2(SHA-256)', 'xyz', 32, iterations, salt)[2] self.assertEqual(pbkdf, cmp_pbkdf) def test_scrypt(self): scrypt = botan2.scrypt(10, '', '', 16, 1, 1) self.assertEqual(hex_encode(scrypt), "77d6576238657b203b19") scrypt = botan2.scrypt(32, 'password', 'NaCl', 1024, 8, 16) self.assertEqual(hex_encode(scrypt), "fdbabe1c9d3472007856e7190d01e9fe7c6ad7cbc8237830e77376634b373162") def test_bcrypt(self): r = botan2.RandomNumberGenerator() phash = botan2.bcrypt('testing', r) self.assertTrue(isinstance(phash, str)) self.assertTrue(phash.startswith("$2a$")) self.assertTrue(botan2.check_bcrypt('testing', phash)) self.assertFalse(botan2.check_bcrypt('live fire', phash)) self.assertTrue(botan2.check_bcrypt('test', '$2a$04$wjen1fAA.UW6UxthpKK.huyOoxvCR7ATRCVC4CBIEGVDOCtr8Oj1C')) def test_mac(self): hmac = botan2.MsgAuthCode('HMAC(SHA-256)') self.assertEqual(hmac.algo_name(), 'HMAC(SHA-256)') self.assertEqual(hmac.minimum_keylength(), 0) self.assertEqual(hmac.maximum_keylength(), 4096) hmac.set_key(hex_decode('0102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F20')) hmac.update(hex_decode('616263')) expected = hex_decode('A21B1F5D4CF4F73A4DD939750F7A066A7F98CC131CB16A6692759021CFAB8181') produced = hmac.final() self.assertEqual(hex_encode(expected), hex_encode(produced)) def test_rng(self): user_rng = botan2.RandomNumberGenerator("user") output1 = user_rng.get(32) output2 = user_rng.get(32) self.assertEqual(len(output1), 32) self.assertEqual(len(output2), 32) self.assertNotEqual(output1, output2) output3 = user_rng.get(1021) self.assertEqual(len(output3), 1021) system_rng = botan2.RandomNumberGenerator('system') user_rng.reseed_from_rng(system_rng, 256) user_rng.add_entropy('seed material...') def test_hash(self): try: _h = botan2.HashFunction('NoSuchHash') except botan2.BotanException as e: self.assertEqual(str(e), "botan_hash_init failed: -40 (Not implemented)") sha256 = botan2.HashFunction('SHA-256') self.assertEqual(sha256.algo_name(), 'SHA-256') self.assertEqual(sha256.output_length(), 32) self.assertEqual(sha256.block_size(), 64) sha256.update('ignore this please') sha256.clear() sha256.update('a') hash1 = sha256.final() self.assertEqual(hex_encode(hash1), "ca978112ca1bbdcafac231b39a23dc4da786eff8147c4e72b9807785afee48bb") sha256.update(hex_decode('61')) sha256_2 = sha256.copy_state() sha256.update(hex_decode('6263')) h2 = sha256.final() self.assertEqual(hex_encode(h2), "ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad") self.assertEqual(hex_encode(sha256_2.final()), hex_encode(hash1)) def test_cipher(self): for mode in ['AES-128/CTR-BE', 'Serpent/GCM', 'ChaCha20Poly1305', 'AES-128/CBC/PKCS7']: enc = botan2.SymmetricCipher(mode, encrypt=True) if mode == 'AES-128/CTR-BE': self.assertEqual(enc.algo_name(), 'CTR-BE(AES-128)') elif mode == 'Serpent/GCM': self.assertEqual(enc.algo_name(), 'Serpent/GCM(16)') else: self.assertEqual(enc.algo_name(), mode) (kmin, kmax) = enc.key_length() self.assertLessEqual(kmin, kmax) rng = botan2.RandomNumberGenerator() iv = rng.get(enc.default_nonce_length()) key = rng.get(kmax) pt = rng.get(21) enc.set_key(key) enc.start(iv) update_result = enc.update('') assert not update_result ct = enc.finish(pt) dec = botan2.SymmetricCipher(mode, encrypt=False) dec.set_key(key) dec.start(iv) decrypted = dec.finish(ct) self.assertEqual(decrypted, pt) def test_mceliece(self): rng = botan2.RandomNumberGenerator() mce_priv = botan2.PrivateKey.create('McEliece', '2960,57', rng) mce_pub = mce_priv.get_public_key() self.assertEqual(mce_pub.estimated_strength(), 128) def test_rsa_load_store(self): rsa_priv_pem = """-----BEGIN PRIVATE KEY----- MIICeAIBADANBgkqhkiG9w0BAQEFAASCAmIwggJeAgEAAoGBALWtiBjcofJW/4+r CIjQZn2V3yCYsNIBpMdVkNPr36FZ3ZHGSv2ggmCe+IWy0fTcBVyP+fo3HC8zmOC2 EsYDFRExyB2zIsjRXlPrVrTfcyXwUEaInLJQId5CguFrmyj1y7K43ezg+OTop39n TyaukrciCSCh++Q/UQOanHnR8ctrAgMBAAECgYBPfKySgBmk31ZyA7k4rsFgye01 JEkcoNZ41iGG7ujJffl4maLew9a3MmZ2jI3azVbVMDMFPA5rQm5tRowBMYEJ5oBc LP4AP41Lujfa+vua6l3t94bAV+CufZiY0297FcPbGqNu+xSQ2Bol2uHh9mrcgQUs fevA50KOLR9hv4zH6QJBAPCOKiExONtVhJn8qVPCBlJ8Vjjnt9Uno5EzMBAKMbZi OySkGwo9/9LUWO03r7tjrGSy5jJk+iOrcLeDl6zETfkCQQDBV6PpD/3ccQ1IfWcw jG8yik0bIuXgrD0uW4g8Cvj+05wrv7RYPHuFtj3Rtb94YjtgYn7QvjH7y88XmTC4 2k2DAkEA4E9Ae7kBUoz42/odDswyxwHICMIRyoJu5Ht9yscmufH5Ql6AFFnhzf9S eMjfZfY4j6G+Q6mjElXQAl+DtIdMSQJBAJzdMkuBggI8Zv6NYA9voThsJSsDIWcr 12epM9sjO+nkXizQmM2OJNnThkyDHRna+Tm2MBXEemFEdn06+ODBnWkCQQChAbG4 255RiCuYdrfiTPF/WLtvRyGd1LRwHcYIW4mJFPzxYAMTwQKbppLAnxw73vyef/zC 2BgXEW02tjRBtgZ+ -----END PRIVATE KEY----- """ rsa_pub_pem = """-----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC1rYgY3KHyVv+PqwiI0GZ9ld8g mLDSAaTHVZDT69+hWd2Rxkr9oIJgnviFstH03AVcj/n6NxwvM5jgthLGAxURMcgd syLI0V5T61a033Ml8FBGiJyyUCHeQoLha5so9cuyuN3s4Pjk6Kd/Z08mrpK3Igkg ofvkP1EDmpx50fHLawIDAQAB -----END PUBLIC KEY----- """ rsapriv = botan2.PrivateKey.load(rsa_priv_pem) self.assertEqual(rsapriv.to_pem(), rsa_priv_pem) rsapub = rsapriv.get_public_key() self.assertEqual(rsapub.to_pem(), rsa_pub_pem) rsapub = botan2.PublicKey.load(rsa_pub_pem) self.assertEqual(rsapub.to_pem(), rsa_pub_pem) n = 0xB5AD8818DCA1F256FF8FAB0888D0667D95DF2098B0D201A4C75590D3EBDFA159DD91C64AFDA082609EF885B2D1F4DC055C8FF9FA371C2F3398E0B612C603151131C81DB322C8D15E53EB56B4DF7325F05046889CB25021DE4282E16B9B28F5CBB2B8DDECE0F8E4E8A77F674F26AE92B7220920A1FBE43F51039A9C79D1F1CB6B # pylint: disable=line-too-long e = 0x10001 rsapub2 = botan2.PublicKey.load_rsa(n, e) self.assertEqual(rsapub2.to_pem(), rsa_pub_pem) self.assertEqual(rsapub2.get_field("n"), n) self.assertEqual(rsapub2.get_field("e"), e) def test_key_crypto(self): rng = botan2.RandomNumberGenerator() priv = botan2.PrivateKey.create('RSA', '1024', rng) passphrase = "super secret tell noone" for is_pem in [True, False]: ref_val = priv.export(is_pem) enc1 = priv.export_encrypted(passphrase, rng, True, msec=10) dec1 = botan2.PrivateKey.load(enc1, passphrase) self.assertEqual(dec1.export(is_pem), ref_val) pem2 = priv.export_encrypted(passphrase, rng, True, msec=10, cipher="AES-128/SIV") dec2 = botan2.PrivateKey.load(pem2, passphrase) self.assertEqual(dec2.export(is_pem), ref_val) pem3 = priv.export_encrypted(passphrase, rng, True, msec=10, cipher="AES-128/GCM", pbkdf="Scrypt") dec3 = botan2.PrivateKey.load(pem3, passphrase) self.assertEqual(dec3.export(is_pem), ref_val) def test_check_key(self): # valid (if rather small) RSA key n = 273279220906618527352827457840955116141 e = 0x10001 rng = botan2.RandomNumberGenerator() rsapub = botan2.PublicKey.load_rsa(n, e) self.assertTrue(rsapub.check_key(rng)) # invalid try: rsapub = botan2.PublicKey.load_rsa(n - 1, e) except botan2.BotanException as e: self.assertEqual(str(e), "botan_pubkey_load_rsa failed: -1 (Invalid input): Invalid RSA public key parameters") def test_rsa(self): # pylint: disable=too-many-locals rng = botan2.RandomNumberGenerator() rsapriv = botan2.PrivateKey.create('RSA', '1024', rng) self.assertEqual(rsapriv.algo_name(), 'RSA') priv_pem = rsapriv.to_pem() priv_der = rsapriv.to_der() self.assertEqual(priv_pem[0:28], "-----BEGIN PRIVATE KEY-----\n") self.assertGreater(len(priv_pem), len(priv_der)) rsapub = rsapriv.get_public_key() self.assertEqual(rsapub.algo_name(), 'RSA') self.assertEqual(rsapub.estimated_strength(), 80) pub_pem = rsapub.to_pem() pub_der = rsapub.to_der() self.assertEqual(pub_pem[0:27], "-----BEGIN PUBLIC KEY-----\n") self.assertGreater(len(pub_pem), len(pub_der)) enc = botan2.PKEncrypt(rsapub, "OAEP(SHA-256)") dec = botan2.PKDecrypt(rsapriv, "OAEP(SHA-256)") symkey = rng.get(32) ctext = enc.encrypt(symkey, rng) ptext = dec.decrypt(ctext) self.assertEqual(ptext, symkey) signer = botan2.PKSign(rsapriv, 'EMSA4(SHA-384)') signer.update('messa') signer.update('ge') sig = signer.finish(botan2.RandomNumberGenerator()) verify = botan2.PKVerify(rsapub, 'EMSA4(SHA-384)') verify.update('mess') verify.update('age') self.assertTrue(verify.check_signature(sig)) verify.update('mess of things') verify.update('age') self.assertFalse(verify.check_signature(sig)) verify.update('message') self.assertTrue(verify.check_signature(sig)) def test_ecdsa(self): rng = botan2.RandomNumberGenerator() hash_fn = 'EMSA1(SHA-256)' group = 'secp256r1' msg = 'test message' priv = botan2.PrivateKey.create('ECDSA', group, rng) pub = priv.get_public_key() self.assertEqual(pub.get_field('public_x'), priv.get_field('public_x')) self.assertEqual(pub.get_field('public_y'), priv.get_field('public_y')) signer = botan2.PKSign(priv, hash_fn, True) signer.update(msg) signature = signer.finish(rng) verifier = botan2.PKVerify(pub, hash_fn) verifier.update(msg) #fails because DER/not-DER mismatch self.assertFalse(verifier.check_signature(signature)) verifier = botan2.PKVerify(pub, hash_fn, True) verifier.update(msg) self.assertTrue(verifier.check_signature(signature)) pub_x = pub.get_field('public_x') pub_y = priv.get_field('public_y') pub2 = botan2.PublicKey.load_ecdsa(group, pub_x, pub_y) verifier = botan2.PKVerify(pub2, hash_fn, True) verifier.update(msg) self.assertTrue(verifier.check_signature(signature)) priv2 = botan2.PrivateKey.load_ecdsa(group, priv.get_field('x')) signer = botan2.PKSign(priv2, hash_fn, True) # sign empty message signature = signer.finish(rng) # verify empty message self.assertTrue(verifier.check_signature(signature)) def test_sm2(self): rng = botan2.RandomNumberGenerator() hash_fn = 'EMSA1(SM3)' group = 'sm2p256v1' msg = 'test message' priv = botan2.PrivateKey.create('SM2', group, rng) pub = priv.get_public_key() self.assertEqual(pub.get_field('public_x'), priv.get_field('public_x')) self.assertEqual(pub.get_field('public_y'), priv.get_field('public_y')) signer = botan2.PKSign(priv, hash_fn) signer.update(msg) signature = signer.finish(rng) verifier = botan2.PKVerify(pub, hash_fn) verifier.update(msg) self.assertTrue(verifier.check_signature(signature)) pub_x = pub.get_field('public_x') pub_y = priv.get_field('public_y') pub2 = botan2.PublicKey.load_sm2(group, pub_x, pub_y) verifier = botan2.PKVerify(pub2, hash_fn) verifier.update(msg) self.assertTrue(verifier.check_signature(signature)) priv2 = botan2.PrivateKey.load_sm2(group, priv.get_field('x')) signer = botan2.PKSign(priv2, hash_fn) # sign empty message signature = signer.finish(rng) # verify empty message self.assertTrue(verifier.check_signature(signature)) def test_ecdh(self): # pylint: disable=too-many-locals a_rng = botan2.RandomNumberGenerator('user') b_rng = botan2.RandomNumberGenerator('user') kdf = 'KDF2(SHA-384)' for grp in ['secp256r1', 'secp384r1', 'brainpool256r1']: a_priv = botan2.PrivateKey.create('ECDH', grp, a_rng) b_priv = botan2.PrivateKey.create('ECDH', grp, b_rng) a_op = botan2.PKKeyAgreement(a_priv, kdf) b_op = botan2.PKKeyAgreement(b_priv, kdf) a_pub = a_op.public_value() b_pub = b_op.public_value() salt = a_rng.get(8) + b_rng.get(8) a_key = a_op.agree(b_pub, 32, salt) b_key = b_op.agree(a_pub, 32, salt) self.assertEqual(a_key, b_key) a_pem = a_priv.to_pem() a_priv_x = a_priv.get_field('x') new_a = botan2.PrivateKey.load_ecdh(grp, a_priv_x) self.assertEqual(a_pem, new_a.to_pem()) def test_certs(self): # pylint: disable=too-many-statements cert = botan2.X509Cert(filename="src/tests/data/x509/ecc/CSCA.CSCA.csca-germany.1.crt") pubkey = cert.subject_public_key() self.assertEqual(pubkey.algo_name(), 'ECDSA') self.assertEqual(pubkey.estimated_strength(), 112) self.assertEqual(cert.fingerprint("SHA-1"), "32:42:1C:C3:EC:54:D7:E9:43:EC:51:F0:19:23:BD:85:1D:F2:1B:B9") self.assertEqual(hex_encode(cert.serial_number()), "01") self.assertEqual(hex_encode(cert.authority_key_id()), "0096452de588f966c4ccdf161dd1f3f5341b71e7") self.assertEqual(cert.subject_dn('Name', 0), 'csca-germany') self.assertEqual(cert.subject_dn('Email', 0), 'csca-germany@bsi.bund.de') self.assertEqual(cert.subject_dn('Organization', 0), 'bund') self.assertEqual(cert.subject_dn('Organizational Unit', 0), 'bsi') self.assertEqual(cert.subject_dn('Country', 0), 'DE') self.assertTrue(cert.to_string().startswith("Version: 3")) self.assertEqual(cert.issuer_dn('Name', 0), 'csca-germany') self.assertEqual(cert.issuer_dn('Organization', 0), 'bund') self.assertEqual(cert.issuer_dn('Organizational Unit', 0), 'bsi') self.assertEqual(cert.issuer_dn('Country', 0), 'DE') self.assertTrue(cert.hostname_match('csca-germany')) self.assertFalse(cert.hostname_match('csca-slovakia')) self.assertEqual(cert.not_before(), 1184858838) self.assertEqual(cert.not_after(), 1831907880) self.assertTrue(cert.allowed_usage(["CRL_SIGN", "KEY_CERT_SIGN"])) self.assertTrue(cert.allowed_usage(["KEY_CERT_SIGN"])) self.assertFalse(cert.allowed_usage(["DIGITAL_SIGNATURE"])) self.assertFalse(cert.allowed_usage(["DIGITAL_SIGNATURE", "CRL_SIGN"])) root = botan2.X509Cert("src/tests/data/x509/nist/root.crt") int09 = botan2.X509Cert("src/tests/data/x509/nist/test09/int.crt") end09 = botan2.X509Cert("src/tests/data/x509/nist/test09/end.crt") self.assertEqual(end09.verify([int09], [root]), 2001) end04 = botan2.X509Cert("src/tests/data/x509/nist/test04/end.crt") int04_1 = botan2.X509Cert("src/tests/data/x509/nist/test04/int1.crt") int04_2 = botan2.X509Cert("src/tests/data/x509/nist/test04/int2.crt") self.assertEqual(end04.verify([int04_1, int04_2], [], "src/tests/data/x509/nist/", required_strength=80), 0) self.assertEqual(end04.verify([int04_1, int04_2], [], required_strength=80), 3000) self.assertEqual(end04.verify([int04_1, int04_2], [root], required_strength=80, hostname="User1-CP.02.01"), 0) self.assertEqual(end04.verify([int04_1, int04_2], [root], required_strength=80, hostname="invalid"), 4008) self.assertEqual(end04.verify([int04_1, int04_2], [root], required_strength=80, reference_time=1), 2000) self.assertEqual(botan2.X509Cert.validation_status(0), 'Verified') self.assertEqual(botan2.X509Cert.validation_status(3000), 'Certificate issuer not found') self.assertEqual(botan2.X509Cert.validation_status(4008), 'Certificate does not match provided name') rootcrl = botan2.X509CRL("src/tests/data/x509/nist/root.crl") end01 = botan2.X509Cert("src/tests/data/x509/nist/test01/end.crt") self.assertEqual(end01.verify([], [root], required_strength=80, crls=[rootcrl]), 0) int20 = botan2.X509Cert("src/tests/data/x509/nist/test20/int.crt") end20 = botan2.X509Cert("src/tests/data/x509/nist/test20/end.crt") int20crl = botan2.X509CRL("src/tests/data/x509/nist/test20/int.crl") self.assertEqual(end20.verify([int20], [root], required_strength=80, crls=[int20crl, rootcrl]), 5000) self.assertEqual(botan2.X509Cert.validation_status(5000), 'Certificate is revoked') int21 = botan2.X509Cert("src/tests/data/x509/nist/test21/int.crt") end21 = botan2.X509Cert("src/tests/data/x509/nist/test21/end.crt") int21crl = botan2.X509CRL("src/tests/data/x509/nist/test21/int.crl") self.assertEqual(end21.verify([int21], [root], required_strength=80, crls=[int21crl, rootcrl]), 5000) self.assertTrue(int20.is_revoked(rootcrl)) self.assertFalse(int04_1.is_revoked(rootcrl)) self.assertTrue(end21.is_revoked(int21crl)) def test_mpi(self): # pylint: disable=too-many-statements,too-many-locals z = botan2.MPI() self.assertEqual(z.bit_count(), 0) five = botan2.MPI('5') self.assertEqual(five.bit_count(), 3) big = botan2.MPI('0x85839682368923476892367235') self.assertEqual(big.bit_count(), 104) small = botan2.MPI(0xDEADBEEF) radix = botan2.MPI("DEADBEEF", 16) self.assertEqual(hex_encode(small.to_bytes()), "deadbeef") self.assertEqual(hex_encode(big.to_bytes()), "85839682368923476892367235") self.assertEqual(int(small), 0xDEADBEEF) self.assertEqual(int(radix), int(small)) self.assertEqual(int(small >> 16), 0xDEAD) small >>= 15 self.assertEqual(int(small), 0x1BD5B) small <<= 15 self.assertEqual(int(small), 0xDEAD8000) ten = botan2.MPI(10) self.assertEqual(ten, five + five) self.assertNotEqual(ten, five) self.assertLess(five, ten) self.assertLessEqual(five, ten) x = botan2.MPI(five) self.assertEqual(x, five) x += botan2.MPI(1) self.assertNotEqual(x, five) self.assertEqual(int(x * five), 30) x *= five x *= five self.assertEqual(int(x), 150) self.assertTrue(not x.is_negative()) x.flip_sign() self.assertTrue(x.is_negative()) self.assertEqual(int(x), -150) x.flip_sign() x.set_bit(0) self.assertTrue(int(x), 151) self.assertTrue(x.get_bit(0)) self.assertTrue(x.get_bit(4)) self.assertFalse(x.get_bit(6)) x.clear_bit(4) self.assertEqual(int(x), 135) rng = botan2.RandomNumberGenerator() self.assertFalse(x.is_prime(rng)) two = botan2.MPI(2) x += two self.assertTrue(x.is_prime(rng)) mod = x + two inv = x.inverse_mod(mod) self.assertEqual(int(inv), 69) self.assertEqual(int((inv * x) % mod), 1) p = inv.pow_mod(botan2.MPI(46), mod) self.assertEqual(int(p), 42) one = botan2.MPI(1) twelve = botan2.MPI("C", 16) eight = botan2.MPI(8) mul = twelve.mod_mul(eight, inv) self.assertEqual(int(mul), 27) gcd = one.gcd(one) self.assertEqual(one, gcd) gcd = one.gcd(twelve) self.assertEqual(one, gcd) gcd = twelve.gcd(eight) self.assertEqual(4, int(gcd)) def test_mpi_random(self): rng = botan2.RandomNumberGenerator() u = botan2.MPI.random(rng, 512) self.assertEqual(u.bit_count(), 512) l = u >> 32 self.assertEqual(l.bit_count(), 512-32) for _i in range(10): x = botan2.MPI.random_range(rng, l, u) self.assertLess(x, u) self.assertGreater(x, l) def test_fpe(self): modulus = botan2.MPI('1000000000') key = b'001122334455' fpe = botan2.FormatPreservingEncryptionFE1(modulus, key) value = botan2.MPI('392910392') tweak = 'tweak value' ctext = fpe.encrypt(value, tweak) ptext = fpe.decrypt(ctext, tweak) self.assertEqual(value, ptext) def test_keywrap(self): key = hex_decode('00112233445566778899aabbccddeeff') kek = hex_decode('000102030405060708090a0b0c0d0e0f') wrapped = botan2.nist_key_wrap(kek, key) self.assertEqual(hex_encode(wrapped), '1fa68b0a8112b447aef34bd8fb5a7b829d3e862371d2cfe5') self.assertEqual(len(wrapped), 16+8) unwrapped = botan2.nist_key_unwrap(kek, wrapped) self.assertEqual(hex_encode(unwrapped), '00112233445566778899aabbccddeeff') def test_hotp(self): hotp = botan2.HOTP(b'12345678901234567890') self.assertEqual(hotp.generate(0), 755224) self.assertEqual(hotp.generate(1), 287082) self.assertEqual(hotp.generate(9), 520489) self.assertEqual(hotp.check(520489, 8), (False, 8)) self.assertEqual(hotp.check(520489, 8, 1), (True, 10)) self.assertEqual(hotp.check(520489, 7, 2), (True, 10)) self.assertEqual(hotp.check(520489, 0, 9), (True, 10)) def test_totp(self): totp = botan2.TOTP(b'12345678901234567890', digest="SHA-1", digits=8) self.assertEqual(totp.generate(59), 94287082) self.assertEqual(totp.generate(1111111109), 7081804) self.assertEqual(totp.generate(1111111111), 14050471) self.assertEqual(totp.generate(1234567890), 89005924) self.assertEqual(totp.generate(1234567890), 89005924) self.assertEqual(totp.generate(2000000000), 69279037) self.assertTrue(totp.check(7081804, 1111111109)) self.assertTrue(totp.check(7081804, 1111111109 - 29)) self.assertFalse(totp.check(7081804, 1111111109 + 1)) self.assertTrue(totp.check(7081804, 1111111109 + 30, 1)) def test_srp6(self): identity = 'alice' password = 'password123' rng = botan2.RandomNumberGenerator() # Test successful authentication server = botan2.Srp6ServerSession() salt = rng.get(24) verifier = botan2.generate_srp6_verifier(identity, password, salt, 'modp/srp/1024', 'SHA-512') B = server.step1(verifier, 'modp/srp/1024', 'SHA-512', rng) (A, key_c) = botan2.srp6_client_agree(identity, password, 'modp/srp/1024', 'SHA-512', salt, B, rng) key_s = server.step2(A) self.assertEqual(key_c, key_s) # Test wrong server ephemeral try: salt = rng.get(24) B = b'BD0C6151 2C692C0C B6D041FA 01BB152D 4916A1E7 7AF46AE1 05393011 \ BAF38964 DC46A067 0DD125B9 5A981652 236F99D9 B681CBF8 7837EC99 \ 6C6DA044 53728610 D0C6DDB5 8B318885 D7D82C7F 8DEB75CE 7BD4FBAA \ 37089E6F 9C6059F3 88838E7A 00030B33 1EB76840 910440B1 B27AAEAE \ EB4012B7 D7665238 A8E3FB00 4B117B58' botan2.srp6_client_agree(identity, password, 'modp/srp/1024', 'SHA-512', salt, B, rng) except botan2.BotanException as e: self.assertEqual(str(e), "botan_srp6_client_agree failed: -1 (Invalid input): Invalid SRP parameter from server") # Test wrong client ephemeral try: salt = rng.get(24) verifier = botan2.generate_srp6_verifier(identity, password, salt, 'modp/srp/1024', 'SHA-512') server.step1(verifier, 'modp/srp/1024', 'SHA-512', rng) A = b'61D5E490 F6F1B795 47B0704C 436F523D D0E560F0 C64115BB 72557EC4 \ 4352E890 3211C046 92272D8B 2D1A5358 A2CF1B6E 0BFCF99F 921530EC \ 8E393561 79EAE45E 42BA92AE ACED8251 71E1E8B9 AF6D9C03 E1327F44 \ BE087EF0 6530E69F 66615261 EEF54073 CA11CF58 58F0EDFD FE15EFEA \ B349EF5D 76988A36 72FAC47B 0769447B' server.step2(A) except botan2.BotanException as e: self.assertEqual(str(e), "botan_srp6_server_session_step2 failed: -32 (Bad parameter)") if __name__ == '__main__': unittest.main()