Alex Gaynor | 5951f46 | 2014-11-16 09:08:42 -0800 | [diff] [blame] | 1 | # This file is dual licensed under the terms of the Apache License, Version |
| 2 | # 2.0, and the BSD License. See the LICENSE file in the root of this repository |
| 3 | # for complete details. |
Alex Gaynor | 8912d3a | 2013-11-02 14:04:19 -0700 | [diff] [blame] | 4 | |
Alex Gaynor | c37feed | 2014-03-08 08:32:56 -0800 | [diff] [blame] | 5 | from __future__ import absolute_import, division, print_function |
| 6 | |
Alex Gaynor | 2b21b12 | 2013-10-31 09:39:25 -0700 | [diff] [blame] | 7 | import base64 |
Alex Gaynor | fb8adfc | 2013-10-31 14:16:24 -0700 | [diff] [blame] | 8 | import calendar |
Chris Wolfe | af6f990 | 2017-10-18 14:23:53 -0500 | [diff] [blame] | 9 | import datetime |
Alex Gaynor | fb8adfc | 2013-10-31 14:16:24 -0700 | [diff] [blame] | 10 | import json |
Paul Kehrer | fdae070 | 2014-11-27 07:50:46 -1000 | [diff] [blame] | 11 | import os |
Alex Gaynor | 1d2901c | 2013-11-22 10:12:05 -0800 | [diff] [blame] | 12 | import time |
Alex Gaynor | fb8adfc | 2013-10-31 14:16:24 -0700 | [diff] [blame] | 13 | |
| 14 | import iso8601 |
| 15 | |
| 16 | import pytest |
Alex Gaynor | 2b21b12 | 2013-10-31 09:39:25 -0700 | [diff] [blame] | 17 | |
Alex Gaynor | de36e90 | 2013-10-31 10:10:44 -0700 | [diff] [blame] | 18 | import six |
| 19 | |
Alex Gaynor | 7b593e1 | 2014-10-19 19:09:44 -0700 | [diff] [blame] | 20 | from cryptography.fernet import Fernet, InvalidToken, MultiFernet |
Alex Gaynor | fae2071 | 2013-12-16 15:29:30 -0800 | [diff] [blame] | 21 | from cryptography.hazmat.backends import default_backend |
Alex Gaynor | e6ac602 | 2014-10-24 07:50:30 -0700 | [diff] [blame] | 22 | from cryptography.hazmat.backends.interfaces import CipherBackend, HMACBackend |
Paul Kehrer | 0abdf87 | 2014-01-09 22:21:14 -0600 | [diff] [blame] | 23 | from cryptography.hazmat.primitives.ciphers import algorithms, modes |
Alex Gaynor | 2b21b12 | 2013-10-31 09:39:25 -0700 | [diff] [blame] | 24 | |
Alex Stapleton | a39a319 | 2014-03-14 20:03:12 +0000 | [diff] [blame] | 25 | import cryptography_vectors |
| 26 | |
Alex Gaynor | 2b21b12 | 2013-10-31 09:39:25 -0700 | [diff] [blame] | 27 | |
Matthew Iversen | 68e77c7 | 2014-03-13 08:54:43 +1100 | [diff] [blame] | 28 | def json_parametrize(keys, filename): |
Paul Kehrer | fdae070 | 2014-11-27 07:50:46 -1000 | [diff] [blame] | 29 | vector_file = cryptography_vectors.open_vector_file( |
| 30 | os.path.join('fernet', filename), "r" |
| 31 | ) |
Alex Stapleton | a39a319 | 2014-03-14 20:03:12 +0000 | [diff] [blame] | 32 | with vector_file: |
| 33 | data = json.load(vector_file) |
| 34 | return pytest.mark.parametrize(keys, [ |
| 35 | tuple([entry[k] for k in keys]) |
| 36 | for entry in data |
| 37 | ]) |
Alex Gaynor | 2b21b12 | 2013-10-31 09:39:25 -0700 | [diff] [blame] | 38 | |
Alex Gaynor | fb8adfc | 2013-10-31 14:16:24 -0700 | [diff] [blame] | 39 | |
Alex Gaynor | 732fbec | 2014-10-19 18:46:55 -0700 | [diff] [blame] | 40 | def test_default_backend(): |
| 41 | f = Fernet(Fernet.generate_key()) |
| 42 | assert f._backend is default_backend() |
| 43 | |
| 44 | |
Alex Gaynor | 7aab8b4 | 2014-10-23 11:01:25 -0700 | [diff] [blame] | 45 | @pytest.mark.requires_backend_interface(interface=CipherBackend) |
Alex Gaynor | e6ac602 | 2014-10-24 07:50:30 -0700 | [diff] [blame] | 46 | @pytest.mark.requires_backend_interface(interface=HMACBackend) |
Alex Gaynor | 732fbec | 2014-10-19 18:46:55 -0700 | [diff] [blame] | 47 | @pytest.mark.supported( |
| 48 | only_if=lambda backend: backend.cipher_supported( |
Paul Kehrer | 4fc597d | 2016-03-07 08:41:51 -0430 | [diff] [blame] | 49 | algorithms.AES(b"\x00" * 32), modes.CBC(b"\x00" * 16) |
Alex Gaynor | 732fbec | 2014-10-19 18:46:55 -0700 | [diff] [blame] | 50 | ), |
| 51 | skip_message="Does not support AES CBC", |
| 52 | ) |
Alex Gaynor | fb8adfc | 2013-10-31 14:16:24 -0700 | [diff] [blame] | 53 | class TestFernet(object): |
| 54 | @json_parametrize( |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 55 | ("secret", "now", "iv", "src", "token"), "generate.json", |
Alex Gaynor | fb8adfc | 2013-10-31 14:16:24 -0700 | [diff] [blame] | 56 | ) |
Alex Gaynor | fae2071 | 2013-12-16 15:29:30 -0800 | [diff] [blame] | 57 | def test_generate(self, secret, now, iv, src, token, backend): |
| 58 | f = Fernet(secret.encode("ascii"), backend=backend) |
Alex Gaynor | fb8adfc | 2013-10-31 14:16:24 -0700 | [diff] [blame] | 59 | actual_token = f._encrypt_from_parts( |
| 60 | src.encode("ascii"), |
| 61 | calendar.timegm(iso8601.parse_date(now).utctimetuple()), |
| 62 | b"".join(map(six.int2byte, iv)) |
Alex Gaynor | 5e87dfd | 2013-10-31 09:46:03 -0700 | [diff] [blame] | 63 | ) |
Alex Gaynor | 7ecd314 | 2013-10-31 16:29:18 -0700 | [diff] [blame] | 64 | assert actual_token == token.encode("ascii") |
Alex Gaynor | fb8adfc | 2013-10-31 14:16:24 -0700 | [diff] [blame] | 65 | |
| 66 | @json_parametrize( |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 67 | ("secret", "now", "src", "ttl_sec", "token"), "verify.json", |
Alex Gaynor | fb8adfc | 2013-10-31 14:16:24 -0700 | [diff] [blame] | 68 | ) |
Alex Gaynor | fae2071 | 2013-12-16 15:29:30 -0800 | [diff] [blame] | 69 | def test_verify(self, secret, now, src, ttl_sec, token, backend, |
| 70 | monkeypatch): |
| 71 | f = Fernet(secret.encode("ascii"), backend=backend) |
Alex Gaynor | c1ea0a0 | 2013-10-31 15:03:53 -0700 | [diff] [blame] | 72 | current_time = calendar.timegm(iso8601.parse_date(now).utctimetuple()) |
Alex Gaynor | 1d2901c | 2013-11-22 10:12:05 -0800 | [diff] [blame] | 73 | monkeypatch.setattr(time, "time", lambda: current_time) |
| 74 | payload = f.decrypt(token.encode("ascii"), ttl=ttl_sec) |
Alex Gaynor | 7ecd314 | 2013-10-31 16:29:18 -0700 | [diff] [blame] | 75 | assert payload == src.encode("ascii") |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 76 | |
| 77 | @json_parametrize(("secret", "token", "now", "ttl_sec"), "invalid.json") |
Alex Gaynor | fae2071 | 2013-12-16 15:29:30 -0800 | [diff] [blame] | 78 | def test_invalid(self, secret, token, now, ttl_sec, backend, monkeypatch): |
| 79 | f = Fernet(secret.encode("ascii"), backend=backend) |
Alex Gaynor | c1ea0a0 | 2013-10-31 15:03:53 -0700 | [diff] [blame] | 80 | current_time = calendar.timegm(iso8601.parse_date(now).utctimetuple()) |
Alex Gaynor | 1d2901c | 2013-11-22 10:12:05 -0800 | [diff] [blame] | 81 | monkeypatch.setattr(time, "time", lambda: current_time) |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 82 | with pytest.raises(InvalidToken): |
Alex Gaynor | 1d2901c | 2013-11-22 10:12:05 -0800 | [diff] [blame] | 83 | f.decrypt(token.encode("ascii"), ttl=ttl_sec) |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 84 | |
Alex Gaynor | a8f0b63 | 2013-12-16 15:44:06 -0800 | [diff] [blame] | 85 | def test_invalid_start_byte(self, backend): |
Alex Gaynor | a1a21f4 | 2014-10-19 19:11:30 -0700 | [diff] [blame] | 86 | f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
Alex Gaynor | a8f0b63 | 2013-12-16 15:44:06 -0800 | [diff] [blame] | 87 | with pytest.raises(InvalidToken): |
| 88 | f.decrypt(base64.urlsafe_b64encode(b"\x81")) |
| 89 | |
Alex Gaynor | e78960f | 2013-12-20 11:02:33 -0800 | [diff] [blame] | 90 | def test_timestamp_too_short(self, backend): |
Alex Gaynor | a1a21f4 | 2014-10-19 19:11:30 -0700 | [diff] [blame] | 91 | f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
Alex Gaynor | e78960f | 2013-12-20 11:02:33 -0800 | [diff] [blame] | 92 | with pytest.raises(InvalidToken): |
| 93 | f.decrypt(base64.urlsafe_b64encode(b"\x80abc")) |
| 94 | |
Alex Gaynor | a1a21f4 | 2014-10-19 19:11:30 -0700 | [diff] [blame] | 95 | def test_non_base64_token(self, backend): |
| 96 | f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
| 97 | with pytest.raises(InvalidToken): |
| 98 | f.decrypt(b"\x00") |
| 99 | |
Alex Gaynor | fae2071 | 2013-12-16 15:29:30 -0800 | [diff] [blame] | 100 | def test_unicode(self, backend): |
| 101 | f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 102 | with pytest.raises(TypeError): |
Eeshan Garg | f123415 | 2015-04-29 18:41:00 +0530 | [diff] [blame] | 103 | f.encrypt(u"") |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 104 | with pytest.raises(TypeError): |
Eeshan Garg | f123415 | 2015-04-29 18:41:00 +0530 | [diff] [blame] | 105 | f.decrypt(u"") |
Alex Gaynor | ce8f9a4 | 2013-10-31 15:23:15 -0700 | [diff] [blame] | 106 | |
Paul Kehrer | a418e96 | 2016-01-21 08:54:59 -0600 | [diff] [blame] | 107 | def test_timestamp_ignored_no_ttl(self, monkeypatch, backend): |
| 108 | f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
| 109 | pt = b"encrypt me" |
| 110 | token = f.encrypt(pt) |
| 111 | ts = "1985-10-26T01:20:01-07:00" |
| 112 | current_time = calendar.timegm(iso8601.parse_date(ts).utctimetuple()) |
| 113 | monkeypatch.setattr(time, "time", lambda: current_time) |
| 114 | assert f.decrypt(token, ttl=None) == pt |
| 115 | |
Alex Gaynor | ce8f9a4 | 2013-10-31 15:23:15 -0700 | [diff] [blame] | 116 | @pytest.mark.parametrize("message", [b"", b"Abc!", b"\x00\xFF\x00\x80"]) |
Alex Gaynor | fae2071 | 2013-12-16 15:29:30 -0800 | [diff] [blame] | 117 | def test_roundtrips(self, message, backend): |
| 118 | f = Fernet(Fernet.generate_key(), backend=backend) |
Alex Gaynor | 6b9770b | 2013-10-31 16:07:35 -0700 | [diff] [blame] | 119 | assert f.decrypt(f.encrypt(message)) == message |
Alex Gaynor | fae2071 | 2013-12-16 15:29:30 -0800 | [diff] [blame] | 120 | |
Alex Gaynor | a8f0b63 | 2013-12-16 15:44:06 -0800 | [diff] [blame] | 121 | def test_bad_key(self, backend): |
| 122 | with pytest.raises(ValueError): |
| 123 | Fernet(base64.urlsafe_b64encode(b"abc"), backend=backend) |
Alex Gaynor | 7b593e1 | 2014-10-19 19:09:44 -0700 | [diff] [blame] | 124 | |
| 125 | |
Alex Gaynor | e6ac602 | 2014-10-24 07:50:30 -0700 | [diff] [blame] | 126 | @pytest.mark.requires_backend_interface(interface=CipherBackend) |
| 127 | @pytest.mark.requires_backend_interface(interface=HMACBackend) |
Alex Gaynor | 7b593e1 | 2014-10-19 19:09:44 -0700 | [diff] [blame] | 128 | @pytest.mark.supported( |
| 129 | only_if=lambda backend: backend.cipher_supported( |
Paul Kehrer | 4fc597d | 2016-03-07 08:41:51 -0430 | [diff] [blame] | 130 | algorithms.AES(b"\x00" * 32), modes.CBC(b"\x00" * 16) |
Alex Gaynor | 7b593e1 | 2014-10-19 19:09:44 -0700 | [diff] [blame] | 131 | ), |
| 132 | skip_message="Does not support AES CBC", |
| 133 | ) |
| 134 | class TestMultiFernet(object): |
| 135 | def test_encrypt(self, backend): |
Alex Gaynor | 41b33b7 | 2014-10-20 14:34:35 -0700 | [diff] [blame] | 136 | f1 = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
| 137 | f2 = Fernet(base64.urlsafe_b64encode(b"\x01" * 32), backend=backend) |
| 138 | f = MultiFernet([f1, f2]) |
| 139 | |
| 140 | assert f1.decrypt(f.encrypt(b"abc")) == b"abc" |
Alex Gaynor | 7b593e1 | 2014-10-19 19:09:44 -0700 | [diff] [blame] | 141 | |
| 142 | def test_decrypt(self, backend): |
| 143 | f1 = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
Alex Gaynor | 41b33b7 | 2014-10-20 14:34:35 -0700 | [diff] [blame] | 144 | f2 = Fernet(base64.urlsafe_b64encode(b"\x01" * 32), backend=backend) |
Alex Gaynor | 7b593e1 | 2014-10-19 19:09:44 -0700 | [diff] [blame] | 145 | f = MultiFernet([f1, f2]) |
| 146 | |
| 147 | assert f.decrypt(f1.encrypt(b"abc")) == b"abc" |
| 148 | assert f.decrypt(f2.encrypt(b"abc")) == b"abc" |
| 149 | |
| 150 | with pytest.raises(InvalidToken): |
| 151 | f.decrypt(b"\x00" * 16) |
| 152 | |
| 153 | def test_no_fernets(self, backend): |
| 154 | with pytest.raises(ValueError): |
| 155 | MultiFernet([]) |
Alex Gaynor | 4f286ce | 2014-10-20 11:30:57 -0700 | [diff] [blame] | 156 | |
| 157 | def test_non_iterable_argument(self, backend): |
| 158 | with pytest.raises(TypeError): |
| 159 | MultiFernet(None) |
Chris Wolfe | af6f990 | 2017-10-18 14:23:53 -0500 | [diff] [blame] | 160 | |
| 161 | def test_rotate(self, backend): |
| 162 | f1 = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
| 163 | f2 = Fernet(base64.urlsafe_b64encode(b"\x01" * 32), backend=backend) |
| 164 | |
| 165 | mf1 = MultiFernet([f1]) |
| 166 | mf2 = MultiFernet([f2, f1]) |
| 167 | |
| 168 | plaintext = b"abc" |
| 169 | mf1_ciphertext = mf1.encrypt(plaintext) |
| 170 | |
| 171 | assert mf2.decrypt(mf1_ciphertext) == plaintext |
| 172 | |
| 173 | rotated = mf2.rotate(mf1_ciphertext) |
| 174 | |
| 175 | assert rotated != mf1_ciphertext |
| 176 | assert mf2.decrypt(rotated) == plaintext |
| 177 | |
| 178 | with pytest.raises(InvalidToken): |
| 179 | mf1.decrypt(rotated) |
| 180 | |
| 181 | def test_rotate_preserves_timestamp(self, backend, monkeypatch): |
| 182 | f1 = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
| 183 | f2 = Fernet(base64.urlsafe_b64encode(b"\x01" * 32), backend=backend) |
| 184 | |
| 185 | mf1 = MultiFernet([f1]) |
| 186 | mf2 = MultiFernet([f2, f1]) |
| 187 | |
| 188 | plaintext = b"abc" |
| 189 | mf1_ciphertext = mf1.encrypt(plaintext) |
| 190 | |
| 191 | later = datetime.datetime.now() + datetime.timedelta(minutes=5) |
| 192 | later_time = time.mktime(later.timetuple()) |
| 193 | monkeypatch.setattr(time, "time", lambda: later_time) |
| 194 | |
| 195 | original_time, _ = Fernet._get_unverified_token_data(mf1_ciphertext) |
| 196 | rotated_time, _ = Fernet._get_unverified_token_data( |
| 197 | mf2.rotate(mf1_ciphertext) |
| 198 | ) |
| 199 | |
| 200 | assert later_time != rotated_time |
| 201 | assert original_time == rotated_time |
| 202 | |
| 203 | def test_rotate_decrypt_no_shared_keys(self, backend): |
| 204 | f1 = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
| 205 | f2 = Fernet(base64.urlsafe_b64encode(b"\x01" * 32), backend=backend) |
| 206 | |
| 207 | mf1 = MultiFernet([f1]) |
| 208 | mf2 = MultiFernet([f2]) |
| 209 | |
| 210 | with pytest.raises(InvalidToken): |
| 211 | mf2.rotate(mf1.encrypt(b"abc")) |