| # This file is dual licensed under the terms of the Apache License, Version | 
 | # 2.0, and the BSD License. See the LICENSE file in the root of this repository | 
 | # for complete details. | 
 |  | 
 | from __future__ import absolute_import, division, print_function | 
 |  | 
 | import base64 | 
 | import calendar | 
 | import json | 
 | import os | 
 | import time | 
 |  | 
 | import iso8601 | 
 |  | 
 | import pytest | 
 |  | 
 | import six | 
 |  | 
 | from cryptography.fernet import Fernet, InvalidToken, MultiFernet | 
 | from cryptography.hazmat.backends import default_backend | 
 | from cryptography.hazmat.backends.interfaces import CipherBackend, HMACBackend | 
 | from cryptography.hazmat.primitives.ciphers import algorithms, modes | 
 |  | 
 | import cryptography_vectors | 
 |  | 
 |  | 
 | def json_parametrize(keys, filename): | 
 |     vector_file = cryptography_vectors.open_vector_file( | 
 |         os.path.join('fernet', filename), "r" | 
 |     ) | 
 |     with vector_file: | 
 |         data = json.load(vector_file) | 
 |         return pytest.mark.parametrize(keys, [ | 
 |             tuple([entry[k] for k in keys]) | 
 |             for entry in data | 
 |         ]) | 
 |  | 
 |  | 
 | def test_default_backend(): | 
 |     f = Fernet(Fernet.generate_key()) | 
 |     assert f._backend is default_backend() | 
 |  | 
 |  | 
 | @pytest.mark.requires_backend_interface(interface=CipherBackend) | 
 | @pytest.mark.requires_backend_interface(interface=HMACBackend) | 
 | @pytest.mark.supported( | 
 |     only_if=lambda backend: backend.cipher_supported( | 
 |         algorithms.AES("\x00" * 32), modes.CBC("\x00" * 16) | 
 |     ), | 
 |     skip_message="Does not support AES CBC", | 
 | ) | 
 | class TestFernet(object): | 
 |     @json_parametrize( | 
 |         ("secret", "now", "iv", "src", "token"), "generate.json", | 
 |     ) | 
 |     def test_generate(self, secret, now, iv, src, token, backend): | 
 |         f = Fernet(secret.encode("ascii"), backend=backend) | 
 |         actual_token = f._encrypt_from_parts( | 
 |             src.encode("ascii"), | 
 |             calendar.timegm(iso8601.parse_date(now).utctimetuple()), | 
 |             b"".join(map(six.int2byte, iv)) | 
 |         ) | 
 |         assert actual_token == token.encode("ascii") | 
 |  | 
 |     @json_parametrize( | 
 |         ("secret", "now", "src", "ttl_sec", "token"), "verify.json", | 
 |     ) | 
 |     def test_verify(self, secret, now, src, ttl_sec, token, backend, | 
 |                     monkeypatch): | 
 |         f = Fernet(secret.encode("ascii"), backend=backend) | 
 |         current_time = calendar.timegm(iso8601.parse_date(now).utctimetuple()) | 
 |         monkeypatch.setattr(time, "time", lambda: current_time) | 
 |         payload = f.decrypt(token.encode("ascii"), ttl=ttl_sec) | 
 |         assert payload == src.encode("ascii") | 
 |  | 
 |     @json_parametrize(("secret", "token", "now", "ttl_sec"), "invalid.json") | 
 |     def test_invalid(self, secret, token, now, ttl_sec, backend, monkeypatch): | 
 |         f = Fernet(secret.encode("ascii"), backend=backend) | 
 |         current_time = calendar.timegm(iso8601.parse_date(now).utctimetuple()) | 
 |         monkeypatch.setattr(time, "time", lambda: current_time) | 
 |         with pytest.raises(InvalidToken): | 
 |             f.decrypt(token.encode("ascii"), ttl=ttl_sec) | 
 |  | 
 |     def test_invalid_start_byte(self, backend): | 
 |         f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) | 
 |         with pytest.raises(InvalidToken): | 
 |             f.decrypt(base64.urlsafe_b64encode(b"\x81")) | 
 |  | 
 |     def test_timestamp_too_short(self, backend): | 
 |         f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) | 
 |         with pytest.raises(InvalidToken): | 
 |             f.decrypt(base64.urlsafe_b64encode(b"\x80abc")) | 
 |  | 
 |     def test_non_base64_token(self, backend): | 
 |         f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) | 
 |         with pytest.raises(InvalidToken): | 
 |             f.decrypt(b"\x00") | 
 |  | 
 |     def test_unicode(self, backend): | 
 |         f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) | 
 |         with pytest.raises(TypeError): | 
 |             f.encrypt(u"") | 
 |         with pytest.raises(TypeError): | 
 |             f.decrypt(u"") | 
 |  | 
 |     @pytest.mark.parametrize("message", [b"", b"Abc!", b"\x00\xFF\x00\x80"]) | 
 |     def test_roundtrips(self, message, backend): | 
 |         f = Fernet(Fernet.generate_key(), backend=backend) | 
 |         assert f.decrypt(f.encrypt(message)) == message | 
 |  | 
 |     def test_bad_key(self, backend): | 
 |         with pytest.raises(ValueError): | 
 |             Fernet(base64.urlsafe_b64encode(b"abc"), backend=backend) | 
 |  | 
 |  | 
 | @pytest.mark.requires_backend_interface(interface=CipherBackend) | 
 | @pytest.mark.requires_backend_interface(interface=HMACBackend) | 
 | @pytest.mark.supported( | 
 |     only_if=lambda backend: backend.cipher_supported( | 
 |         algorithms.AES("\x00" * 32), modes.CBC("\x00" * 16) | 
 |     ), | 
 |     skip_message="Does not support AES CBC", | 
 | ) | 
 | class TestMultiFernet(object): | 
 |     def test_encrypt(self, backend): | 
 |         f1 = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) | 
 |         f2 = Fernet(base64.urlsafe_b64encode(b"\x01" * 32), backend=backend) | 
 |         f = MultiFernet([f1, f2]) | 
 |  | 
 |         assert f1.decrypt(f.encrypt(b"abc")) == b"abc" | 
 |  | 
 |     def test_decrypt(self, backend): | 
 |         f1 = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) | 
 |         f2 = Fernet(base64.urlsafe_b64encode(b"\x01" * 32), backend=backend) | 
 |         f = MultiFernet([f1, f2]) | 
 |  | 
 |         assert f.decrypt(f1.encrypt(b"abc")) == b"abc" | 
 |         assert f.decrypt(f2.encrypt(b"abc")) == b"abc" | 
 |  | 
 |         with pytest.raises(InvalidToken): | 
 |             f.decrypt(b"\x00" * 16) | 
 |  | 
 |     def test_no_fernets(self, backend): | 
 |         with pytest.raises(ValueError): | 
 |             MultiFernet([]) | 
 |  | 
 |     def test_non_iterable_argument(self, backend): | 
 |         with pytest.raises(TypeError): | 
 |             MultiFernet(None) |