Alex Gaynor | 5951f46 | 2014-11-16 09:08:42 -0800 | [diff] [blame] | 1 | # This file is dual licensed under the terms of the Apache License, Version |
| 2 | # 2.0, and the BSD License. See the LICENSE file in the root of this repository |
| 3 | # for complete details. |
Alex Gaynor | 8912d3a | 2013-11-02 14:04:19 -0700 | [diff] [blame] | 4 | |
Alex Gaynor | c37feed | 2014-03-08 08:32:56 -0800 | [diff] [blame] | 5 | from __future__ import absolute_import, division, print_function |
| 6 | |
Alex Gaynor | 2b21b12 | 2013-10-31 09:39:25 -0700 | [diff] [blame] | 7 | import base64 |
Alex Gaynor | fb8adfc | 2013-10-31 14:16:24 -0700 | [diff] [blame] | 8 | import calendar |
| 9 | import json |
Paul Kehrer | fdae070 | 2014-11-27 07:50:46 -1000 | [diff] [blame] | 10 | import os |
Alex Gaynor | 1d2901c | 2013-11-22 10:12:05 -0800 | [diff] [blame] | 11 | import time |
Alex Gaynor | fb8adfc | 2013-10-31 14:16:24 -0700 | [diff] [blame] | 12 | |
| 13 | import iso8601 |
| 14 | |
| 15 | import pytest |
Alex Gaynor | 2b21b12 | 2013-10-31 09:39:25 -0700 | [diff] [blame] | 16 | |
Alex Gaynor | de36e90 | 2013-10-31 10:10:44 -0700 | [diff] [blame] | 17 | import six |
| 18 | |
Alex Gaynor | 7b593e1 | 2014-10-19 19:09:44 -0700 | [diff] [blame] | 19 | from cryptography.fernet import Fernet, InvalidToken, MultiFernet |
Alex Gaynor | fae2071 | 2013-12-16 15:29:30 -0800 | [diff] [blame] | 20 | from cryptography.hazmat.backends import default_backend |
Alex Gaynor | e6ac602 | 2014-10-24 07:50:30 -0700 | [diff] [blame] | 21 | from cryptography.hazmat.backends.interfaces import CipherBackend, HMACBackend |
Paul Kehrer | 0abdf87 | 2014-01-09 22:21:14 -0600 | [diff] [blame] | 22 | from cryptography.hazmat.primitives.ciphers import algorithms, modes |
Alex Gaynor | 2b21b12 | 2013-10-31 09:39:25 -0700 | [diff] [blame] | 23 | |
Alex Stapleton | a39a319 | 2014-03-14 20:03:12 +0000 | [diff] [blame] | 24 | import cryptography_vectors |
| 25 | |
Alex Gaynor | 2b21b12 | 2013-10-31 09:39:25 -0700 | [diff] [blame] | 26 | |
Matthew Iversen | 68e77c7 | 2014-03-13 08:54:43 +1100 | [diff] [blame] | 27 | def json_parametrize(keys, filename): |
Paul Kehrer | fdae070 | 2014-11-27 07:50:46 -1000 | [diff] [blame] | 28 | vector_file = cryptography_vectors.open_vector_file( |
Lucia Li | c6ba99d | 2021-11-08 22:06:11 +0800 | [diff] [blame^] | 29 | os.path.join("fernet", filename), "r" |
Paul Kehrer | fdae070 | 2014-11-27 07:50:46 -1000 | [diff] [blame] | 30 | ) |
Alex Stapleton | a39a319 | 2014-03-14 20:03:12 +0000 | [diff] [blame] | 31 | with vector_file: |
| 32 | data = json.load(vector_file) |
Lucia Li | c6ba99d | 2021-11-08 22:06:11 +0800 | [diff] [blame^] | 33 | return pytest.mark.parametrize( |
| 34 | keys, [tuple([entry[k] for k in keys]) for entry in data] |
| 35 | ) |
Alex Gaynor | 2b21b12 | 2013-10-31 09:39:25 -0700 | [diff] [blame] | 36 | |
Alex Gaynor | fb8adfc | 2013-10-31 14:16:24 -0700 | [diff] [blame] | 37 | |
Alex Gaynor | 732fbec | 2014-10-19 18:46:55 -0700 | [diff] [blame] | 38 | def test_default_backend(): |
| 39 | f = Fernet(Fernet.generate_key()) |
| 40 | assert f._backend is default_backend() |
| 41 | |
| 42 | |
Alex Gaynor | 7aab8b4 | 2014-10-23 11:01:25 -0700 | [diff] [blame] | 43 | @pytest.mark.requires_backend_interface(interface=CipherBackend) |
Alex Gaynor | e6ac602 | 2014-10-24 07:50:30 -0700 | [diff] [blame] | 44 | @pytest.mark.requires_backend_interface(interface=HMACBackend) |
Alex Gaynor | 732fbec | 2014-10-19 18:46:55 -0700 | [diff] [blame] | 45 | @pytest.mark.supported( |
| 46 | only_if=lambda backend: backend.cipher_supported( |
Paul Kehrer | 4fc597d | 2016-03-07 08:41:51 -0430 | [diff] [blame] | 47 | algorithms.AES(b"\x00" * 32), modes.CBC(b"\x00" * 16) |
Alex Gaynor | 732fbec | 2014-10-19 18:46:55 -0700 | [diff] [blame] | 48 | ), |
| 49 | skip_message="Does not support AES CBC", |
| 50 | ) |
Alex Gaynor | fb8adfc | 2013-10-31 14:16:24 -0700 | [diff] [blame] | 51 | class TestFernet(object): |
| 52 | @json_parametrize( |
Lucia Li | c6ba99d | 2021-11-08 22:06:11 +0800 | [diff] [blame^] | 53 | ("secret", "now", "iv", "src", "token"), |
| 54 | "generate.json", |
Alex Gaynor | fb8adfc | 2013-10-31 14:16:24 -0700 | [diff] [blame] | 55 | ) |
Alex Gaynor | fae2071 | 2013-12-16 15:29:30 -0800 | [diff] [blame] | 56 | def test_generate(self, secret, now, iv, src, token, backend): |
| 57 | f = Fernet(secret.encode("ascii"), backend=backend) |
Alex Gaynor | fb8adfc | 2013-10-31 14:16:24 -0700 | [diff] [blame] | 58 | actual_token = f._encrypt_from_parts( |
| 59 | src.encode("ascii"), |
| 60 | calendar.timegm(iso8601.parse_date(now).utctimetuple()), |
Lucia Li | c6ba99d | 2021-11-08 22:06:11 +0800 | [diff] [blame^] | 61 | b"".join(map(six.int2byte, iv)), |
Alex Gaynor | 5e87dfd | 2013-10-31 09:46:03 -0700 | [diff] [blame] | 62 | ) |
Alex Gaynor | 7ecd314 | 2013-10-31 16:29:18 -0700 | [diff] [blame] | 63 | assert actual_token == token.encode("ascii") |
Alex Gaynor | fb8adfc | 2013-10-31 14:16:24 -0700 | [diff] [blame] | 64 | |
| 65 | @json_parametrize( |
Lucia Li | c6ba99d | 2021-11-08 22:06:11 +0800 | [diff] [blame^] | 66 | ("secret", "now", "src", "ttl_sec", "token"), |
| 67 | "verify.json", |
Alex Gaynor | fb8adfc | 2013-10-31 14:16:24 -0700 | [diff] [blame] | 68 | ) |
Lucia Li | c6ba99d | 2021-11-08 22:06:11 +0800 | [diff] [blame^] | 69 | def test_verify( |
| 70 | self, secret, now, src, ttl_sec, token, backend, monkeypatch |
| 71 | ): |
Alex Gaynor | fae2071 | 2013-12-16 15:29:30 -0800 | [diff] [blame] | 72 | f = Fernet(secret.encode("ascii"), backend=backend) |
Alex Gaynor | c1ea0a0 | 2013-10-31 15:03:53 -0700 | [diff] [blame] | 73 | current_time = calendar.timegm(iso8601.parse_date(now).utctimetuple()) |
Lucia Li | c6ba99d | 2021-11-08 22:06:11 +0800 | [diff] [blame^] | 74 | payload = f.decrypt_at_time( |
| 75 | token.encode("ascii"), |
| 76 | ttl=ttl_sec, |
| 77 | current_time=current_time, |
| 78 | ) |
| 79 | assert payload == src.encode("ascii") |
Alex Gaynor | 1d2901c | 2013-11-22 10:12:05 -0800 | [diff] [blame] | 80 | monkeypatch.setattr(time, "time", lambda: current_time) |
| 81 | payload = f.decrypt(token.encode("ascii"), ttl=ttl_sec) |
Alex Gaynor | 7ecd314 | 2013-10-31 16:29:18 -0700 | [diff] [blame] | 82 | assert payload == src.encode("ascii") |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 83 | |
| 84 | @json_parametrize(("secret", "token", "now", "ttl_sec"), "invalid.json") |
Alex Gaynor | fae2071 | 2013-12-16 15:29:30 -0800 | [diff] [blame] | 85 | def test_invalid(self, secret, token, now, ttl_sec, backend, monkeypatch): |
| 86 | f = Fernet(secret.encode("ascii"), backend=backend) |
Alex Gaynor | c1ea0a0 | 2013-10-31 15:03:53 -0700 | [diff] [blame] | 87 | current_time = calendar.timegm(iso8601.parse_date(now).utctimetuple()) |
Lucia Li | c6ba99d | 2021-11-08 22:06:11 +0800 | [diff] [blame^] | 88 | with pytest.raises(InvalidToken): |
| 89 | f.decrypt_at_time( |
| 90 | token.encode("ascii"), |
| 91 | ttl=ttl_sec, |
| 92 | current_time=current_time, |
| 93 | ) |
Alex Gaynor | 1d2901c | 2013-11-22 10:12:05 -0800 | [diff] [blame] | 94 | monkeypatch.setattr(time, "time", lambda: current_time) |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 95 | with pytest.raises(InvalidToken): |
Alex Gaynor | 1d2901c | 2013-11-22 10:12:05 -0800 | [diff] [blame] | 96 | f.decrypt(token.encode("ascii"), ttl=ttl_sec) |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 97 | |
Alex Gaynor | a8f0b63 | 2013-12-16 15:44:06 -0800 | [diff] [blame] | 98 | def test_invalid_start_byte(self, backend): |
Alex Gaynor | a1a21f4 | 2014-10-19 19:11:30 -0700 | [diff] [blame] | 99 | f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
Alex Gaynor | a8f0b63 | 2013-12-16 15:44:06 -0800 | [diff] [blame] | 100 | with pytest.raises(InvalidToken): |
| 101 | f.decrypt(base64.urlsafe_b64encode(b"\x81")) |
| 102 | |
Alex Gaynor | e78960f | 2013-12-20 11:02:33 -0800 | [diff] [blame] | 103 | def test_timestamp_too_short(self, backend): |
Alex Gaynor | a1a21f4 | 2014-10-19 19:11:30 -0700 | [diff] [blame] | 104 | f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
Alex Gaynor | e78960f | 2013-12-20 11:02:33 -0800 | [diff] [blame] | 105 | with pytest.raises(InvalidToken): |
| 106 | f.decrypt(base64.urlsafe_b64encode(b"\x80abc")) |
| 107 | |
Alex Gaynor | a1a21f4 | 2014-10-19 19:11:30 -0700 | [diff] [blame] | 108 | def test_non_base64_token(self, backend): |
| 109 | f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
| 110 | with pytest.raises(InvalidToken): |
| 111 | f.decrypt(b"\x00") |
| 112 | |
Alex Gaynor | fae2071 | 2013-12-16 15:29:30 -0800 | [diff] [blame] | 113 | def test_unicode(self, backend): |
| 114 | f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 115 | with pytest.raises(TypeError): |
Eeshan Garg | f123415 | 2015-04-29 18:41:00 +0530 | [diff] [blame] | 116 | f.encrypt(u"") |
Alex Gaynor | 38f3455 | 2013-10-31 14:50:00 -0700 | [diff] [blame] | 117 | with pytest.raises(TypeError): |
Eeshan Garg | f123415 | 2015-04-29 18:41:00 +0530 | [diff] [blame] | 118 | f.decrypt(u"") |
Alex Gaynor | ce8f9a4 | 2013-10-31 15:23:15 -0700 | [diff] [blame] | 119 | |
Paul Kehrer | a418e96 | 2016-01-21 08:54:59 -0600 | [diff] [blame] | 120 | def test_timestamp_ignored_no_ttl(self, monkeypatch, backend): |
| 121 | f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
| 122 | pt = b"encrypt me" |
| 123 | token = f.encrypt(pt) |
| 124 | ts = "1985-10-26T01:20:01-07:00" |
| 125 | current_time = calendar.timegm(iso8601.parse_date(ts).utctimetuple()) |
| 126 | monkeypatch.setattr(time, "time", lambda: current_time) |
| 127 | assert f.decrypt(token, ttl=None) == pt |
| 128 | |
Lucia Li | c6ba99d | 2021-11-08 22:06:11 +0800 | [diff] [blame^] | 129 | def test_ttl_required_in_decrypt_at_time(self, monkeypatch, backend): |
| 130 | f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
| 131 | pt = b"encrypt me" |
| 132 | token = f.encrypt(pt) |
| 133 | with pytest.raises(ValueError): |
| 134 | f.decrypt_at_time(token, ttl=None, current_time=int(time.time())) |
| 135 | |
Alex Gaynor | ce8f9a4 | 2013-10-31 15:23:15 -0700 | [diff] [blame] | 136 | @pytest.mark.parametrize("message", [b"", b"Abc!", b"\x00\xFF\x00\x80"]) |
Alex Gaynor | fae2071 | 2013-12-16 15:29:30 -0800 | [diff] [blame] | 137 | def test_roundtrips(self, message, backend): |
| 138 | f = Fernet(Fernet.generate_key(), backend=backend) |
Alex Gaynor | 6b9770b | 2013-10-31 16:07:35 -0700 | [diff] [blame] | 139 | assert f.decrypt(f.encrypt(message)) == message |
Alex Gaynor | fae2071 | 2013-12-16 15:29:30 -0800 | [diff] [blame] | 140 | |
Alex Gaynor | a8f0b63 | 2013-12-16 15:44:06 -0800 | [diff] [blame] | 141 | def test_bad_key(self, backend): |
| 142 | with pytest.raises(ValueError): |
| 143 | Fernet(base64.urlsafe_b64encode(b"abc"), backend=backend) |
Alex Gaynor | 7b593e1 | 2014-10-19 19:09:44 -0700 | [diff] [blame] | 144 | |
Paul Kehrer | 36ad98f | 2018-05-12 11:57:32 -0400 | [diff] [blame] | 145 | def test_extract_timestamp(self, monkeypatch, backend): |
| 146 | f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
| 147 | current_time = 1526138327 |
Lucia Li | c6ba99d | 2021-11-08 22:06:11 +0800 | [diff] [blame^] | 148 | token = f.encrypt_at_time(b"encrypt me", current_time) |
Paul Kehrer | 36ad98f | 2018-05-12 11:57:32 -0400 | [diff] [blame] | 149 | assert f.extract_timestamp(token) == current_time |
| 150 | with pytest.raises(InvalidToken): |
| 151 | f.extract_timestamp(b"nonsensetoken") |
| 152 | |
Alex Gaynor | 7b593e1 | 2014-10-19 19:09:44 -0700 | [diff] [blame] | 153 | |
Alex Gaynor | e6ac602 | 2014-10-24 07:50:30 -0700 | [diff] [blame] | 154 | @pytest.mark.requires_backend_interface(interface=CipherBackend) |
| 155 | @pytest.mark.requires_backend_interface(interface=HMACBackend) |
Alex Gaynor | 7b593e1 | 2014-10-19 19:09:44 -0700 | [diff] [blame] | 156 | @pytest.mark.supported( |
| 157 | only_if=lambda backend: backend.cipher_supported( |
Paul Kehrer | 4fc597d | 2016-03-07 08:41:51 -0430 | [diff] [blame] | 158 | algorithms.AES(b"\x00" * 32), modes.CBC(b"\x00" * 16) |
Alex Gaynor | 7b593e1 | 2014-10-19 19:09:44 -0700 | [diff] [blame] | 159 | ), |
| 160 | skip_message="Does not support AES CBC", |
| 161 | ) |
| 162 | class TestMultiFernet(object): |
| 163 | def test_encrypt(self, backend): |
Alex Gaynor | 41b33b7 | 2014-10-20 14:34:35 -0700 | [diff] [blame] | 164 | f1 = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
| 165 | f2 = Fernet(base64.urlsafe_b64encode(b"\x01" * 32), backend=backend) |
| 166 | f = MultiFernet([f1, f2]) |
| 167 | |
| 168 | assert f1.decrypt(f.encrypt(b"abc")) == b"abc" |
Alex Gaynor | 7b593e1 | 2014-10-19 19:09:44 -0700 | [diff] [blame] | 169 | |
| 170 | def test_decrypt(self, backend): |
| 171 | f1 = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
Alex Gaynor | 41b33b7 | 2014-10-20 14:34:35 -0700 | [diff] [blame] | 172 | f2 = Fernet(base64.urlsafe_b64encode(b"\x01" * 32), backend=backend) |
Alex Gaynor | 7b593e1 | 2014-10-19 19:09:44 -0700 | [diff] [blame] | 173 | f = MultiFernet([f1, f2]) |
| 174 | |
| 175 | assert f.decrypt(f1.encrypt(b"abc")) == b"abc" |
| 176 | assert f.decrypt(f2.encrypt(b"abc")) == b"abc" |
| 177 | |
| 178 | with pytest.raises(InvalidToken): |
| 179 | f.decrypt(b"\x00" * 16) |
| 180 | |
Lucia Li | c6ba99d | 2021-11-08 22:06:11 +0800 | [diff] [blame^] | 181 | def test_decrypt_at_time(self, backend): |
| 182 | f1 = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
| 183 | f = MultiFernet([f1]) |
| 184 | pt = b"encrypt me" |
| 185 | token = f.encrypt_at_time(pt, current_time=100) |
| 186 | assert f.decrypt_at_time(token, ttl=1, current_time=100) == pt |
| 187 | with pytest.raises(InvalidToken): |
| 188 | f.decrypt_at_time(token, ttl=1, current_time=102) |
| 189 | with pytest.raises(ValueError): |
| 190 | f.decrypt_at_time(token, ttl=None, current_time=100) |
| 191 | |
Alex Gaynor | 7b593e1 | 2014-10-19 19:09:44 -0700 | [diff] [blame] | 192 | def test_no_fernets(self, backend): |
| 193 | with pytest.raises(ValueError): |
| 194 | MultiFernet([]) |
Alex Gaynor | 4f286ce | 2014-10-20 11:30:57 -0700 | [diff] [blame] | 195 | |
| 196 | def test_non_iterable_argument(self, backend): |
| 197 | with pytest.raises(TypeError): |
| 198 | MultiFernet(None) |
Chris Wolfe | af6f990 | 2017-10-18 14:23:53 -0500 | [diff] [blame] | 199 | |
| 200 | def test_rotate(self, backend): |
| 201 | f1 = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
| 202 | f2 = Fernet(base64.urlsafe_b64encode(b"\x01" * 32), backend=backend) |
| 203 | |
| 204 | mf1 = MultiFernet([f1]) |
| 205 | mf2 = MultiFernet([f2, f1]) |
| 206 | |
| 207 | plaintext = b"abc" |
| 208 | mf1_ciphertext = mf1.encrypt(plaintext) |
| 209 | |
| 210 | assert mf2.decrypt(mf1_ciphertext) == plaintext |
| 211 | |
| 212 | rotated = mf2.rotate(mf1_ciphertext) |
| 213 | |
| 214 | assert rotated != mf1_ciphertext |
| 215 | assert mf2.decrypt(rotated) == plaintext |
| 216 | |
| 217 | with pytest.raises(InvalidToken): |
| 218 | mf1.decrypt(rotated) |
| 219 | |
| 220 | def test_rotate_preserves_timestamp(self, backend, monkeypatch): |
| 221 | f1 = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
| 222 | f2 = Fernet(base64.urlsafe_b64encode(b"\x01" * 32), backend=backend) |
| 223 | |
| 224 | mf1 = MultiFernet([f1]) |
| 225 | mf2 = MultiFernet([f2, f1]) |
| 226 | |
| 227 | plaintext = b"abc" |
Lucia Li | c6ba99d | 2021-11-08 22:06:11 +0800 | [diff] [blame^] | 228 | original_time = int(time.time()) - 5 * 60 |
| 229 | mf1_ciphertext = mf1.encrypt_at_time(plaintext, original_time) |
Chris Wolfe | af6f990 | 2017-10-18 14:23:53 -0500 | [diff] [blame] | 230 | |
Chris Wolfe | af6f990 | 2017-10-18 14:23:53 -0500 | [diff] [blame] | 231 | rotated_time, _ = Fernet._get_unverified_token_data( |
| 232 | mf2.rotate(mf1_ciphertext) |
| 233 | ) |
| 234 | |
Lucia Li | c6ba99d | 2021-11-08 22:06:11 +0800 | [diff] [blame^] | 235 | assert int(time.time()) != rotated_time |
Chris Wolfe | af6f990 | 2017-10-18 14:23:53 -0500 | [diff] [blame] | 236 | assert original_time == rotated_time |
| 237 | |
| 238 | def test_rotate_decrypt_no_shared_keys(self, backend): |
| 239 | f1 = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend) |
| 240 | f2 = Fernet(base64.urlsafe_b64encode(b"\x01" * 32), backend=backend) |
| 241 | |
| 242 | mf1 = MultiFernet([f1]) |
| 243 | mf2 = MultiFernet([f2]) |
| 244 | |
| 245 | with pytest.raises(InvalidToken): |
| 246 | mf2.rotate(mf1.encrypt(b"abc")) |