blob: 38409b03e888cd79fc4d83e0221e4f45d0d18b97 [file] [log] [blame]
Alex Gaynor5951f462014-11-16 09:08:42 -08001# This file is dual licensed under the terms of the Apache License, Version
2# 2.0, and the BSD License. See the LICENSE file in the root of this repository
3# for complete details.
Alex Gaynor8912d3a2013-11-02 14:04:19 -07004
Alex Gaynorc37feed2014-03-08 08:32:56 -08005from __future__ import absolute_import, division, print_function
6
Alex Gaynor2b21b122013-10-31 09:39:25 -07007import base64
Alex Gaynorfb8adfc2013-10-31 14:16:24 -07008import calendar
9import json
Paul Kehrerfdae0702014-11-27 07:50:46 -100010import os
Alex Gaynor1d2901c2013-11-22 10:12:05 -080011import time
Alex Gaynorfb8adfc2013-10-31 14:16:24 -070012
13import iso8601
14
15import pytest
Alex Gaynor2b21b122013-10-31 09:39:25 -070016
Alex Gaynorde36e902013-10-31 10:10:44 -070017import six
18
Alex Gaynor7b593e12014-10-19 19:09:44 -070019from cryptography.fernet import Fernet, InvalidToken, MultiFernet
Alex Gaynorfae20712013-12-16 15:29:30 -080020from cryptography.hazmat.backends import default_backend
Alex Gaynore6ac6022014-10-24 07:50:30 -070021from cryptography.hazmat.backends.interfaces import CipherBackend, HMACBackend
Paul Kehrer0abdf872014-01-09 22:21:14 -060022from cryptography.hazmat.primitives.ciphers import algorithms, modes
Alex Gaynor2b21b122013-10-31 09:39:25 -070023
Alex Stapletona39a3192014-03-14 20:03:12 +000024import cryptography_vectors
25
Alex Gaynor2b21b122013-10-31 09:39:25 -070026
Matthew Iversen68e77c72014-03-13 08:54:43 +110027def json_parametrize(keys, filename):
Paul Kehrerfdae0702014-11-27 07:50:46 -100028 vector_file = cryptography_vectors.open_vector_file(
Lucia Lic6ba99d2021-11-08 22:06:11 +080029 os.path.join("fernet", filename), "r"
Paul Kehrerfdae0702014-11-27 07:50:46 -100030 )
Alex Stapletona39a3192014-03-14 20:03:12 +000031 with vector_file:
32 data = json.load(vector_file)
Lucia Lic6ba99d2021-11-08 22:06:11 +080033 return pytest.mark.parametrize(
34 keys, [tuple([entry[k] for k in keys]) for entry in data]
35 )
Alex Gaynor2b21b122013-10-31 09:39:25 -070036
Alex Gaynorfb8adfc2013-10-31 14:16:24 -070037
Alex Gaynor732fbec2014-10-19 18:46:55 -070038def test_default_backend():
39 f = Fernet(Fernet.generate_key())
40 assert f._backend is default_backend()
41
42
Alex Gaynor7aab8b42014-10-23 11:01:25 -070043@pytest.mark.requires_backend_interface(interface=CipherBackend)
Alex Gaynore6ac6022014-10-24 07:50:30 -070044@pytest.mark.requires_backend_interface(interface=HMACBackend)
Alex Gaynor732fbec2014-10-19 18:46:55 -070045@pytest.mark.supported(
46 only_if=lambda backend: backend.cipher_supported(
Paul Kehrer4fc597d2016-03-07 08:41:51 -043047 algorithms.AES(b"\x00" * 32), modes.CBC(b"\x00" * 16)
Alex Gaynor732fbec2014-10-19 18:46:55 -070048 ),
49 skip_message="Does not support AES CBC",
50)
Alex Gaynorfb8adfc2013-10-31 14:16:24 -070051class TestFernet(object):
52 @json_parametrize(
Lucia Lic6ba99d2021-11-08 22:06:11 +080053 ("secret", "now", "iv", "src", "token"),
54 "generate.json",
Alex Gaynorfb8adfc2013-10-31 14:16:24 -070055 )
Alex Gaynorfae20712013-12-16 15:29:30 -080056 def test_generate(self, secret, now, iv, src, token, backend):
57 f = Fernet(secret.encode("ascii"), backend=backend)
Alex Gaynorfb8adfc2013-10-31 14:16:24 -070058 actual_token = f._encrypt_from_parts(
59 src.encode("ascii"),
60 calendar.timegm(iso8601.parse_date(now).utctimetuple()),
Lucia Lic6ba99d2021-11-08 22:06:11 +080061 b"".join(map(six.int2byte, iv)),
Alex Gaynor5e87dfd2013-10-31 09:46:03 -070062 )
Alex Gaynor7ecd3142013-10-31 16:29:18 -070063 assert actual_token == token.encode("ascii")
Alex Gaynorfb8adfc2013-10-31 14:16:24 -070064
65 @json_parametrize(
Lucia Lic6ba99d2021-11-08 22:06:11 +080066 ("secret", "now", "src", "ttl_sec", "token"),
67 "verify.json",
Alex Gaynorfb8adfc2013-10-31 14:16:24 -070068 )
Lucia Lic6ba99d2021-11-08 22:06:11 +080069 def test_verify(
70 self, secret, now, src, ttl_sec, token, backend, monkeypatch
71 ):
Alex Gaynorfae20712013-12-16 15:29:30 -080072 f = Fernet(secret.encode("ascii"), backend=backend)
Alex Gaynorc1ea0a02013-10-31 15:03:53 -070073 current_time = calendar.timegm(iso8601.parse_date(now).utctimetuple())
Lucia Lic6ba99d2021-11-08 22:06:11 +080074 payload = f.decrypt_at_time(
75 token.encode("ascii"),
76 ttl=ttl_sec,
77 current_time=current_time,
78 )
79 assert payload == src.encode("ascii")
Alex Gaynor1d2901c2013-11-22 10:12:05 -080080 monkeypatch.setattr(time, "time", lambda: current_time)
81 payload = f.decrypt(token.encode("ascii"), ttl=ttl_sec)
Alex Gaynor7ecd3142013-10-31 16:29:18 -070082 assert payload == src.encode("ascii")
Alex Gaynor38f34552013-10-31 14:50:00 -070083
84 @json_parametrize(("secret", "token", "now", "ttl_sec"), "invalid.json")
Alex Gaynorfae20712013-12-16 15:29:30 -080085 def test_invalid(self, secret, token, now, ttl_sec, backend, monkeypatch):
86 f = Fernet(secret.encode("ascii"), backend=backend)
Alex Gaynorc1ea0a02013-10-31 15:03:53 -070087 current_time = calendar.timegm(iso8601.parse_date(now).utctimetuple())
Lucia Lic6ba99d2021-11-08 22:06:11 +080088 with pytest.raises(InvalidToken):
89 f.decrypt_at_time(
90 token.encode("ascii"),
91 ttl=ttl_sec,
92 current_time=current_time,
93 )
Alex Gaynor1d2901c2013-11-22 10:12:05 -080094 monkeypatch.setattr(time, "time", lambda: current_time)
Alex Gaynor38f34552013-10-31 14:50:00 -070095 with pytest.raises(InvalidToken):
Alex Gaynor1d2901c2013-11-22 10:12:05 -080096 f.decrypt(token.encode("ascii"), ttl=ttl_sec)
Alex Gaynor38f34552013-10-31 14:50:00 -070097
Alex Gaynora8f0b632013-12-16 15:44:06 -080098 def test_invalid_start_byte(self, backend):
Alex Gaynora1a21f42014-10-19 19:11:30 -070099 f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend)
Alex Gaynora8f0b632013-12-16 15:44:06 -0800100 with pytest.raises(InvalidToken):
101 f.decrypt(base64.urlsafe_b64encode(b"\x81"))
102
Alex Gaynore78960f2013-12-20 11:02:33 -0800103 def test_timestamp_too_short(self, backend):
Alex Gaynora1a21f42014-10-19 19:11:30 -0700104 f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend)
Alex Gaynore78960f2013-12-20 11:02:33 -0800105 with pytest.raises(InvalidToken):
106 f.decrypt(base64.urlsafe_b64encode(b"\x80abc"))
107
Alex Gaynora1a21f42014-10-19 19:11:30 -0700108 def test_non_base64_token(self, backend):
109 f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend)
110 with pytest.raises(InvalidToken):
111 f.decrypt(b"\x00")
112
Alex Gaynorfae20712013-12-16 15:29:30 -0800113 def test_unicode(self, backend):
114 f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend)
Alex Gaynor38f34552013-10-31 14:50:00 -0700115 with pytest.raises(TypeError):
Eeshan Gargf1234152015-04-29 18:41:00 +0530116 f.encrypt(u"")
Alex Gaynor38f34552013-10-31 14:50:00 -0700117 with pytest.raises(TypeError):
Eeshan Gargf1234152015-04-29 18:41:00 +0530118 f.decrypt(u"")
Alex Gaynorce8f9a42013-10-31 15:23:15 -0700119
Paul Kehrera418e962016-01-21 08:54:59 -0600120 def test_timestamp_ignored_no_ttl(self, monkeypatch, backend):
121 f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend)
122 pt = b"encrypt me"
123 token = f.encrypt(pt)
124 ts = "1985-10-26T01:20:01-07:00"
125 current_time = calendar.timegm(iso8601.parse_date(ts).utctimetuple())
126 monkeypatch.setattr(time, "time", lambda: current_time)
127 assert f.decrypt(token, ttl=None) == pt
128
Lucia Lic6ba99d2021-11-08 22:06:11 +0800129 def test_ttl_required_in_decrypt_at_time(self, monkeypatch, backend):
130 f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend)
131 pt = b"encrypt me"
132 token = f.encrypt(pt)
133 with pytest.raises(ValueError):
134 f.decrypt_at_time(token, ttl=None, current_time=int(time.time()))
135
Alex Gaynorce8f9a42013-10-31 15:23:15 -0700136 @pytest.mark.parametrize("message", [b"", b"Abc!", b"\x00\xFF\x00\x80"])
Alex Gaynorfae20712013-12-16 15:29:30 -0800137 def test_roundtrips(self, message, backend):
138 f = Fernet(Fernet.generate_key(), backend=backend)
Alex Gaynor6b9770b2013-10-31 16:07:35 -0700139 assert f.decrypt(f.encrypt(message)) == message
Alex Gaynorfae20712013-12-16 15:29:30 -0800140
Alex Gaynora8f0b632013-12-16 15:44:06 -0800141 def test_bad_key(self, backend):
142 with pytest.raises(ValueError):
143 Fernet(base64.urlsafe_b64encode(b"abc"), backend=backend)
Alex Gaynor7b593e12014-10-19 19:09:44 -0700144
Paul Kehrer36ad98f2018-05-12 11:57:32 -0400145 def test_extract_timestamp(self, monkeypatch, backend):
146 f = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend)
147 current_time = 1526138327
Lucia Lic6ba99d2021-11-08 22:06:11 +0800148 token = f.encrypt_at_time(b"encrypt me", current_time)
Paul Kehrer36ad98f2018-05-12 11:57:32 -0400149 assert f.extract_timestamp(token) == current_time
150 with pytest.raises(InvalidToken):
151 f.extract_timestamp(b"nonsensetoken")
152
Alex Gaynor7b593e12014-10-19 19:09:44 -0700153
Alex Gaynore6ac6022014-10-24 07:50:30 -0700154@pytest.mark.requires_backend_interface(interface=CipherBackend)
155@pytest.mark.requires_backend_interface(interface=HMACBackend)
Alex Gaynor7b593e12014-10-19 19:09:44 -0700156@pytest.mark.supported(
157 only_if=lambda backend: backend.cipher_supported(
Paul Kehrer4fc597d2016-03-07 08:41:51 -0430158 algorithms.AES(b"\x00" * 32), modes.CBC(b"\x00" * 16)
Alex Gaynor7b593e12014-10-19 19:09:44 -0700159 ),
160 skip_message="Does not support AES CBC",
161)
162class TestMultiFernet(object):
163 def test_encrypt(self, backend):
Alex Gaynor41b33b72014-10-20 14:34:35 -0700164 f1 = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend)
165 f2 = Fernet(base64.urlsafe_b64encode(b"\x01" * 32), backend=backend)
166 f = MultiFernet([f1, f2])
167
168 assert f1.decrypt(f.encrypt(b"abc")) == b"abc"
Alex Gaynor7b593e12014-10-19 19:09:44 -0700169
170 def test_decrypt(self, backend):
171 f1 = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend)
Alex Gaynor41b33b72014-10-20 14:34:35 -0700172 f2 = Fernet(base64.urlsafe_b64encode(b"\x01" * 32), backend=backend)
Alex Gaynor7b593e12014-10-19 19:09:44 -0700173 f = MultiFernet([f1, f2])
174
175 assert f.decrypt(f1.encrypt(b"abc")) == b"abc"
176 assert f.decrypt(f2.encrypt(b"abc")) == b"abc"
177
178 with pytest.raises(InvalidToken):
179 f.decrypt(b"\x00" * 16)
180
Lucia Lic6ba99d2021-11-08 22:06:11 +0800181 def test_decrypt_at_time(self, backend):
182 f1 = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend)
183 f = MultiFernet([f1])
184 pt = b"encrypt me"
185 token = f.encrypt_at_time(pt, current_time=100)
186 assert f.decrypt_at_time(token, ttl=1, current_time=100) == pt
187 with pytest.raises(InvalidToken):
188 f.decrypt_at_time(token, ttl=1, current_time=102)
189 with pytest.raises(ValueError):
190 f.decrypt_at_time(token, ttl=None, current_time=100)
191
Alex Gaynor7b593e12014-10-19 19:09:44 -0700192 def test_no_fernets(self, backend):
193 with pytest.raises(ValueError):
194 MultiFernet([])
Alex Gaynor4f286ce2014-10-20 11:30:57 -0700195
196 def test_non_iterable_argument(self, backend):
197 with pytest.raises(TypeError):
198 MultiFernet(None)
Chris Wolfeaf6f9902017-10-18 14:23:53 -0500199
200 def test_rotate(self, backend):
201 f1 = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend)
202 f2 = Fernet(base64.urlsafe_b64encode(b"\x01" * 32), backend=backend)
203
204 mf1 = MultiFernet([f1])
205 mf2 = MultiFernet([f2, f1])
206
207 plaintext = b"abc"
208 mf1_ciphertext = mf1.encrypt(plaintext)
209
210 assert mf2.decrypt(mf1_ciphertext) == plaintext
211
212 rotated = mf2.rotate(mf1_ciphertext)
213
214 assert rotated != mf1_ciphertext
215 assert mf2.decrypt(rotated) == plaintext
216
217 with pytest.raises(InvalidToken):
218 mf1.decrypt(rotated)
219
220 def test_rotate_preserves_timestamp(self, backend, monkeypatch):
221 f1 = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend)
222 f2 = Fernet(base64.urlsafe_b64encode(b"\x01" * 32), backend=backend)
223
224 mf1 = MultiFernet([f1])
225 mf2 = MultiFernet([f2, f1])
226
227 plaintext = b"abc"
Lucia Lic6ba99d2021-11-08 22:06:11 +0800228 original_time = int(time.time()) - 5 * 60
229 mf1_ciphertext = mf1.encrypt_at_time(plaintext, original_time)
Chris Wolfeaf6f9902017-10-18 14:23:53 -0500230
Chris Wolfeaf6f9902017-10-18 14:23:53 -0500231 rotated_time, _ = Fernet._get_unverified_token_data(
232 mf2.rotate(mf1_ciphertext)
233 )
234
Lucia Lic6ba99d2021-11-08 22:06:11 +0800235 assert int(time.time()) != rotated_time
Chris Wolfeaf6f9902017-10-18 14:23:53 -0500236 assert original_time == rotated_time
237
238 def test_rotate_decrypt_no_shared_keys(self, backend):
239 f1 = Fernet(base64.urlsafe_b64encode(b"\x00" * 32), backend=backend)
240 f2 = Fernet(base64.urlsafe_b64encode(b"\x01" * 32), backend=backend)
241
242 mf1 = MultiFernet([f1])
243 mf2 = MultiFernet([f2])
244
245 with pytest.raises(InvalidToken):
246 mf2.rotate(mf1.encrypt(b"abc"))