123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302 |
- # ===================================================================
- #
- # Copyright (c) 2015, Legrandin <helderijs@gmail.com>
- # All rights reserved.
- #
- # Redistribution and use in source and binary forms, with or without
- # modification, are permitted provided that the following conditions
- # are met:
- #
- # 1. Redistributions of source code must retain the above copyright
- # notice, this list of conditions and the following disclaimer.
- # 2. Redistributions in binary form must reproduce the above copyright
- # notice, this list of conditions and the following disclaimer in
- # the documentation and/or other materials provided with the
- # distribution.
- #
- # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- # "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- # LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
- # FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
- # COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
- # INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
- # BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
- # LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
- # CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
- # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
- # ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
- # POSSIBILITY OF SUCH DAMAGE.
- # ===================================================================
- import sys
- import unittest
- from binascii import unhexlify
- from tls.Crypto.SelfTest.st_common import list_test_cases
- from tls.Crypto.Util._file_system import pycryptodome_filename
- from tls.Crypto.Util.py3compat import bord, tostr
- from tls.Crypto.Util.number import bytes_to_long
- from tls.Crypto.Hash import SHAKE128
- from tls.Crypto.PublicKey import ECC
- def load_file(filename, mode="rb"):
- comps = [ "Crypto", "SelfTest", "PublicKey", "test_vectors", "ECC" ]
- with open(pycryptodome_filename(comps, filename), mode) as fd:
- return fd.read()
- def compact(lines):
- ext = b"".join(lines)
- return unhexlify(tostr(ext).replace(" ", "").replace(":", ""))
- def create_ref_keys_p256():
- key_len = 32
- key_lines = load_file("ecc_p256.txt").splitlines()
- private_key_d = bytes_to_long(compact(key_lines[2:5]))
- public_key_xy = compact(key_lines[6:11])
- assert bord(public_key_xy[0]) == 4 # Uncompressed
- public_key_x = bytes_to_long(public_key_xy[1:key_len+1])
- public_key_y = bytes_to_long(public_key_xy[key_len+1:])
- return (ECC.construct(curve="P-256", d=private_key_d),
- ECC.construct(curve="P-256", point_x=public_key_x, point_y=public_key_y))
- def create_ref_keys_p384():
- key_len = 48
- key_lines = load_file("ecc_p384.txt").splitlines()
- private_key_d = bytes_to_long(compact(key_lines[2:6]))
- public_key_xy = compact(key_lines[7:14])
- assert bord(public_key_xy[0]) == 4 # Uncompressed
- public_key_x = bytes_to_long(public_key_xy[1:key_len+1])
- public_key_y = bytes_to_long(public_key_xy[key_len+1:])
- return (ECC.construct(curve="P-384", d=private_key_d),
- ECC.construct(curve="P-384", point_x=public_key_x, point_y=public_key_y))
- def create_ref_keys_p521():
- key_len = 66
- key_lines = load_file("ecc_p521.txt").splitlines()
- private_key_d = bytes_to_long(compact(key_lines[2:7]))
- public_key_xy = compact(key_lines[8:17])
- assert bord(public_key_xy[0]) == 4 # Uncompressed
- public_key_x = bytes_to_long(public_key_xy[1:key_len+1])
- public_key_y = bytes_to_long(public_key_xy[key_len+1:])
- return (ECC.construct(curve="P-521", d=private_key_d),
- ECC.construct(curve="P-521", point_x=public_key_x, point_y=public_key_y))
- # Create reference key pair
- # ref_private, ref_public = create_ref_keys_p521()
- def get_fixed_prng():
- return SHAKE128.new().update(b"SEED").read
- class TestImport(unittest.TestCase):
- def test_empty(self):
- self.assertRaises(ValueError, ECC.import_key, b"")
- class TestImport_P256(unittest.TestCase):
- ref_private, ref_public = create_ref_keys_p256()
- def test_import_public_der(self):
- key_file = load_file("ecc_p256_public.der")
- key = ECC._import_subjectPublicKeyInfo(key_file)
- self.assertEqual(self.ref_public, key)
- key = ECC._import_der(key_file, None)
- self.assertEqual(self.ref_public, key)
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_public, key)
- def test_import_private_der(self):
- key_file = load_file("ecc_p256_private.der")
- key = ECC._import_private_der(key_file, None)
- self.assertEqual(self.ref_private, key)
- key = ECC._import_der(key_file, None)
- self.assertEqual(self.ref_private, key)
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_private, key)
- def test_import_private_pkcs8_clear(self):
- key_file = load_file("ecc_p256_private_p8_clear.der")
- key = ECC._import_der(key_file, None)
- self.assertEqual(self.ref_private, key)
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_private, key)
- def test_import_private_pkcs8_in_pem_clear(self):
- key_file = load_file("ecc_p256_private_p8_clear.pem")
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_private, key)
- def test_import_private_pkcs8_encrypted_1(self):
- key_file = load_file("ecc_p256_private_p8.der")
- key = ECC._import_der(key_file, "secret")
- self.assertEqual(self.ref_private, key)
- key = ECC.import_key(key_file, "secret")
- self.assertEqual(self.ref_private, key)
- def test_import_private_pkcs8_encrypted_2(self):
- key_file = load_file("ecc_p256_private_p8.pem")
- key = ECC.import_key(key_file, "secret")
- self.assertEqual(self.ref_private, key)
- def test_import_x509_der(self):
- key_file = load_file("ecc_p256_x509.der")
- key = ECC._import_der(key_file, None)
- self.assertEqual(self.ref_public, key)
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_public, key)
- def test_import_public_pem(self):
- key_file = load_file("ecc_p256_public.pem")
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_public, key)
- def test_import_private_pem(self):
- key_file = load_file("ecc_p256_private.pem")
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_private, key)
- def test_import_private_pem_with_ecparams(self):
- if sys.version_info[:2] == (2, 6):
- return
- key_file = load_file("ecc_p256_private_ecparams.pem")
- key = ECC.import_key(key_file)
- # We just check if the import succeeds
- def test_import_private_pem_encrypted(self):
- for algo in "des3", "aes128", "aes192", "aes256", "aes256_gcm":
- key_file = load_file("ecc_p256_private_enc_%s.pem" % algo)
- key = ECC.import_key(key_file, "secret")
- self.assertEqual(self.ref_private, key)
- key = ECC.import_key(tostr(key_file), b"secret")
- self.assertEqual(self.ref_private, key)
- def test_import_x509_pem(self):
- key_file = load_file("ecc_p256_x509.pem")
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_public, key)
- def test_import_openssh_public(self):
- key_file = load_file("ecc_p256_public_openssh.txt")
- key = ECC._import_openssh_public(key_file)
- self.assertEqual(self.ref_public, key)
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_public, key)
- def test_import_openssh_private_clear(self):
- key_file = load_file("ecc_p256_private_openssh.pem")
- key_file_old = load_file("ecc_p256_private_openssh_old.pem")
- key = ECC.import_key(key_file)
- key_old = ECC.import_key(key_file_old)
- self.assertEqual(key, key_old)
- def test_import_openssh_private_password(self):
- key_file = load_file("ecc_p256_private_openssh_pwd.pem")
- key_file_old = load_file("ecc_p256_private_openssh_pwd_old.pem")
- key = ECC.import_key(key_file, b"password")
- key_old = ECC.import_key(key_file_old)
- self.assertEqual(key, key_old)
- class TestImport_P384(unittest.TestCase):
- ref_private, ref_public = create_ref_keys_p384()
- def test_import_public_der(self):
- key_file = load_file("ecc_p384_public.der")
- key = ECC._import_subjectPublicKeyInfo(key_file)
- self.assertEqual(self.ref_public, key)
- key = ECC._import_der(key_file, None)
- self.assertEqual(self.ref_public, key)
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_public, key)
- def test_import_private_der(self):
- key_file = load_file("ecc_p384_private.der")
- key = ECC._import_private_der(key_file, None)
- self.assertEqual(self.ref_private, key)
- key = ECC._import_der(key_file, None)
- self.assertEqual(self.ref_private, key)
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_private, key)
- def test_import_private_pkcs8_clear(self):
- key_file = load_file("ecc_p384_private_p8_clear.der")
- key = ECC._import_der(key_file, None)
- self.assertEqual(self.ref_private, key)
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_private, key)
- def test_import_private_pkcs8_in_pem_clear(self):
- key_file = load_file("ecc_p384_private_p8_clear.pem")
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_private, key)
- def test_import_private_pkcs8_encrypted_1(self):
- key_file = load_file("ecc_p384_private_p8.der")
- key = ECC._import_der(key_file, "secret")
- self.assertEqual(self.ref_private, key)
- key = ECC.import_key(key_file, "secret")
- self.assertEqual(self.ref_private, key)
- def test_import_private_pkcs8_encrypted_2(self):
- key_file = load_file("ecc_p384_private_p8.pem")
- key = ECC.import_key(key_file, "secret")
- self.assertEqual(self.ref_private, key)
- def test_import_x509_der(self):
- key_file = load_file("ecc_p384_x509.der")
- key = ECC._import_der(key_file, None)
- self.assertEqual(self.ref_public, key)
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_public, key)
- def test_import_public_pem(self):
- key_file = load_file("ecc_p384_public.pem")
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_public, key)
- def test_import_private_pem(self):
- key_file = load_file("ecc_p384_private.pem")
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_private, key)
- def test_import_private_pem_encrypted(self):
- for algo in "des3", "aes128", "aes192", "aes256", "aes256_gcm":
- key_file = load_file("ecc_p384_private_enc_%s.pem" % algo)
- key = ECC.import_key(key_file, "secret")
- self.assertEqual(self.ref_private, key)
- key = ECC.import_key(tostr(key_file), b"secret")
- self.assertEqual(self.ref_private, key)
- def test_import_x509_pem(self):
- key_file = load_file("ecc_p384_x509.pem")
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_public, key)
- def test_import_openssh_public(self):
- key_file = load_file("ecc_p384_public_openssh.txt")
- key = ECC._import_openssh_public(key_file)
- self.assertEqual(self.ref_public, key)
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_public, key)
- def test_import_openssh_private_clear(self):
- key_file = load_file("ecc_p384_private_openssh.pem")
- key_file_old = load_file("ecc_p384_private_openssh_old.pem")
- key = ECC.import_key(key_file)
- key_old = ECC.import_key(key_file_old)
- self.assertEqual(key, key_old)
- def test_import_openssh_private_password(self):
- key_file = load_file("ecc_p384_private_openssh_pwd.pem")
- key_file_old = load_file("ecc_p384_private_openssh_pwd_old.pem")
- key = ECC.import_key(key_file, b"password")
- key_old = ECC.import_key(key_file_old)
- self.assertEqual(key, key_old)
- class TestImport_P521(unittest.TestCase):
- ref_private, ref_public = create_ref_keys_p521()
- def test_import_public_der(self):
- key_file = load_file("ecc_p521_public.der")
- key = ECC._import_subjectPublicKeyInfo(key_file)
- self.assertEqual(self.ref_public, key)
- key = ECC._import_der(key_file, None)
- self.assertEqual(self.ref_public, key)
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_public, key)
- def test_import_private_der(self):
- key_file = load_file("ecc_p521_private.der")
- key = ECC._import_private_der(key_file, None)
- self.assertEqual(self.ref_private, key)
- key = ECC._import_der(key_file, None)
- self.assertEqual(self.ref_private, key)
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_private, key)
- def test_import_private_pkcs8_clear(self):
- key_file = load_file("ecc_p521_private_p8_clear.der")
- key = ECC._import_der(key_file, None)
- self.assertEqual(self.ref_private, key)
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_private, key)
- def test_import_private_pkcs8_in_pem_clear(self):
- key_file = load_file("ecc_p521_private_p8_clear.pem")
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_private, key)
- def test_import_private_pkcs8_encrypted_1(self):
- key_file = load_file("ecc_p521_private_p8.der")
- key = ECC._import_der(key_file, "secret")
- self.assertEqual(self.ref_private, key)
- key = ECC.import_key(key_file, "secret")
- self.assertEqual(self.ref_private, key)
- def test_import_private_pkcs8_encrypted_2(self):
- key_file = load_file("ecc_p521_private_p8.pem")
- key = ECC.import_key(key_file, "secret")
- self.assertEqual(self.ref_private, key)
- def test_import_x509_der(self):
- key_file = load_file("ecc_p521_x509.der")
- key = ECC._import_der(key_file, None)
- self.assertEqual(self.ref_public, key)
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_public, key)
- def test_import_public_pem(self):
- key_file = load_file("ecc_p521_public.pem")
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_public, key)
- def test_import_private_pem(self):
- key_file = load_file("ecc_p521_private.pem")
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_private, key)
- def test_import_private_pem_encrypted(self):
- for algo in "des3", "aes128", "aes192", "aes256", "aes256_gcm":
- key_file = load_file("ecc_p521_private_enc_%s.pem" % algo)
- key = ECC.import_key(key_file, "secret")
- self.assertEqual(self.ref_private, key)
- key = ECC.import_key(tostr(key_file), b"secret")
- self.assertEqual(self.ref_private, key)
- def test_import_x509_pem(self):
- key_file = load_file("ecc_p521_x509.pem")
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_public, key)
- def test_import_openssh_public(self):
- key_file = load_file("ecc_p521_public_openssh.txt")
- key = ECC._import_openssh_public(key_file)
- self.assertEqual(self.ref_public, key)
- key = ECC.import_key(key_file)
- self.assertEqual(self.ref_public, key)
- def test_import_openssh_private_clear(self):
- key_file = load_file("ecc_p521_private_openssh.pem")
- key_file_old = load_file("ecc_p521_private_openssh_old.pem")
- key = ECC.import_key(key_file)
- key_old = ECC.import_key(key_file_old)
- self.assertEqual(key, key_old)
- def test_import_openssh_private_password(self):
- key_file = load_file("ecc_p521_private_openssh_pwd.pem")
- key_file_old = load_file("ecc_p521_private_openssh_pwd_old.pem")
- key = ECC.import_key(key_file, b"password")
- key_old = ECC.import_key(key_file_old)
- self.assertEqual(key, key_old)
- class TestExport_P256(unittest.TestCase):
- ref_private, ref_public = create_ref_keys_p256()
- def test_export_public_der_uncompressed(self):
- key_file = load_file("ecc_p256_public.der")
- encoded = self.ref_public._export_subjectPublicKeyInfo(False)
- self.assertEqual(key_file, encoded)
- encoded = self.ref_public.export_key(format="DER")
- self.assertEqual(key_file, encoded)
- encoded = self.ref_public.export_key(format="DER", compress=False)
- self.assertEqual(key_file, encoded)
- def test_export_public_der_compressed(self):
- key_file = load_file("ecc_p256_public.der")
- pub_key = ECC.import_key(key_file)
- key_file_compressed = pub_key.export_key(format="DER", compress=True)
- key_file_compressed_ref = load_file("ecc_p256_public_compressed.der")
- self.assertEqual(key_file_compressed, key_file_compressed_ref)
- def test_export_private_der(self):
- key_file = load_file("ecc_p256_private.der")
- encoded = self.ref_private._export_private_der()
- self.assertEqual(key_file, encoded)
- # ---
- encoded = self.ref_private.export_key(format="DER", use_pkcs8=False)
- self.assertEqual(key_file, encoded)
- def test_export_private_pkcs8_clear(self):
- key_file = load_file("ecc_p256_private_p8_clear.der")
- encoded = self.ref_private._export_pkcs8()
- self.assertEqual(key_file, encoded)
- # ---
- encoded = self.ref_private.export_key(format="DER")
- self.assertEqual(key_file, encoded)
- def test_export_private_pkcs8_encrypted(self):
- encoded = self.ref_private._export_pkcs8(passphrase="secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- # This should prove that the output is password-protected
- self.assertRaises(ValueError, ECC._import_pkcs8, encoded, None)
- decoded = ECC._import_pkcs8(encoded, "secret")
- self.assertEqual(self.ref_private, decoded)
- # ---
- encoded = self.ref_private.export_key(format="DER",
- passphrase="secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- decoded = ECC.import_key(encoded, "secret")
- self.assertEqual(self.ref_private, decoded)
- def test_export_public_pem_uncompressed(self):
- key_file = load_file("ecc_p256_public.pem", "rt").strip()
- encoded = self.ref_private._export_public_pem(False)
- self.assertEqual(key_file, encoded)
- # ---
- encoded = self.ref_public.export_key(format="PEM")
- self.assertEqual(key_file, encoded)
- encoded = self.ref_public.export_key(format="PEM", compress=False)
- self.assertEqual(key_file, encoded)
- def test_export_public_pem_compressed(self):
- key_file = load_file("ecc_p256_public.pem", "rt").strip()
- pub_key = ECC.import_key(key_file)
- key_file_compressed = pub_key.export_key(format="PEM", compress=True)
- key_file_compressed_ref = load_file("ecc_p256_public_compressed.pem", "rt").strip()
- self.assertEqual(key_file_compressed, key_file_compressed_ref)
- def test_export_private_pem_clear(self):
- key_file = load_file("ecc_p256_private.pem", "rt").strip()
- encoded = self.ref_private._export_private_pem(None)
- self.assertEqual(key_file, encoded)
- # ---
- encoded = self.ref_private.export_key(format="PEM", use_pkcs8=False)
- self.assertEqual(key_file, encoded)
- def test_export_private_pem_encrypted(self):
- encoded = self.ref_private._export_private_pem(passphrase=b"secret")
- # This should prove that the output is password-protected
- self.assertRaises(ValueError, ECC.import_key, encoded)
- assert "EC PRIVATE KEY" in encoded
- decoded = ECC.import_key(encoded, "secret")
- self.assertEqual(self.ref_private, decoded)
- # ---
- encoded = self.ref_private.export_key(format="PEM",
- passphrase="secret",
- use_pkcs8=False)
- decoded = ECC.import_key(encoded, "secret")
- self.assertEqual(self.ref_private, decoded)
- def test_export_private_pkcs8_and_pem_1(self):
- # PKCS8 inside PEM with both unencrypted
- key_file = load_file("ecc_p256_private_p8_clear.pem", "rt").strip()
- encoded = self.ref_private._export_private_clear_pkcs8_in_clear_pem()
- self.assertEqual(key_file, encoded)
- # ---
- encoded = self.ref_private.export_key(format="PEM")
- self.assertEqual(key_file, encoded)
- def test_export_private_pkcs8_and_pem_2(self):
- # PKCS8 inside PEM with PKCS8 encryption
- encoded = self.ref_private._export_private_encrypted_pkcs8_in_clear_pem("secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- # This should prove that the output is password-protected
- self.assertRaises(ValueError, ECC.import_key, encoded)
- assert "ENCRYPTED PRIVATE KEY" in encoded
- decoded = ECC.import_key(encoded, "secret")
- self.assertEqual(self.ref_private, decoded)
- # ---
- encoded = self.ref_private.export_key(format="PEM",
- passphrase="secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- decoded = ECC.import_key(encoded, "secret")
- self.assertEqual(self.ref_private, decoded)
- def test_export_openssh_uncompressed(self):
- key_file = load_file("ecc_p256_public_openssh.txt", "rt")
- encoded = self.ref_public._export_openssh(False)
- self.assertEquals(key_file, encoded)
- # ---
- encoded = self.ref_public.export_key(format="OpenSSH")
- self.assertEquals(key_file, encoded)
- encoded = self.ref_public.export_key(format="OpenSSH", compress=False)
- self.assertEquals(key_file, encoded)
- def test_export_openssh_compressed(self):
- key_file = load_file("ecc_p256_public_openssh.txt", "rt")
- pub_key = ECC.import_key(key_file)
- key_file_compressed = pub_key.export_key(format="OpenSSH", compress=True)
- assert len(key_file) > len(key_file_compressed)
- self.assertEquals(pub_key, ECC.import_key(key_file_compressed))
- def test_prng(self):
- # Test that password-protected containers use the provided PRNG
- encoded1 = self.ref_private.export_key(format="PEM",
- passphrase="secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC",
- randfunc=get_fixed_prng())
- encoded2 = self.ref_private.export_key(format="PEM",
- passphrase="secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC",
- randfunc=get_fixed_prng())
- self.assertEquals(encoded1, encoded2)
- # ---
- encoded1 = self.ref_private.export_key(format="PEM",
- use_pkcs8=False,
- passphrase="secret",
- randfunc=get_fixed_prng())
- encoded2 = self.ref_private.export_key(format="PEM",
- use_pkcs8=False,
- passphrase="secret",
- randfunc=get_fixed_prng())
- self.assertEquals(encoded1, encoded2)
- def test_byte_or_string_passphrase(self):
- encoded1 = self.ref_private.export_key(format="PEM",
- use_pkcs8=False,
- passphrase="secret",
- randfunc=get_fixed_prng())
- encoded2 = self.ref_private.export_key(format="PEM",
- use_pkcs8=False,
- passphrase=b"secret",
- randfunc=get_fixed_prng())
- self.assertEquals(encoded1, encoded2)
- def test_error_params1(self):
- # Unknown format
- self.assertRaises(ValueError, self.ref_private.export_key, format="XXX")
- # Missing 'protection' parameter when PKCS#8 is used
- self.ref_private.export_key(format="PEM", passphrase="secret",
- use_pkcs8=False)
- self.assertRaises(ValueError, self.ref_private.export_key, format="PEM",
- passphrase="secret")
- # DER format but no PKCS#8
- self.assertRaises(ValueError, self.ref_private.export_key, format="DER",
- passphrase="secret",
- use_pkcs8=False,
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- # Incorrect parameters for public keys
- self.assertRaises(ValueError, self.ref_public.export_key, format="DER",
- use_pkcs8=False)
- # Empty password
- self.assertRaises(ValueError, self.ref_private.export_key, format="PEM",
- passphrase="", use_pkcs8=False)
- self.assertRaises(ValueError, self.ref_private.export_key, format="PEM",
- passphrase="",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- # No private keys with OpenSSH
- self.assertRaises(ValueError, self.ref_private.export_key, format="OpenSSH",
- passphrase="secret")
- def test_unsupported_curve(self):
- # openssl ecparam -name secp224r1 -genkey -noout -out strange-curve.pem -conv_form uncompressed
- curve = """-----BEGIN EC PRIVATE KEY-----
- MGgCAQEEHEi7xTHW+5oT8wgpjoEKV7uwMuY8rt2YUZe4j1SgBwYFK4EEACGhPAM6
- AATJgfOG+Bnki8robpNM8MtArji43GU9up4B0x9sVhqB+fZP+hXgV9ITN7YX4E/k
- gVnJp9EBND/tHQ==
- -----END EC PRIVATE KEY-----"""
- from tls.Crypto.PublicKey.ECC import UnsupportedEccFeature
- try:
- ECC.import_key(curve)
- except UnsupportedEccFeature as uef:
- assert("1.3.132.0.33" in str(uef))
- else:
- assert(False)
- def test_compressed_curve(self):
- # Compressed P-256 curve (Y-point is even)
- pem1 = """-----BEGIN EC PRIVATE KEY-----
- MFcCAQEEIHTuc09jC51xXomV6MVCDN+DpAAvSmaJWZPTEHM6D5H1oAoGCCqGSM49
- AwEHoSQDIgACWFuGbHe8yJ43rir7PMTE9w8vHz0BSpXHq90Xi7/s+a0=
- -----END EC PRIVATE KEY-----"""
- # Compressed P-256 curve (Y-point is odd)
- pem2 = """-----BEGIN EC PRIVATE KEY-----
- MFcCAQEEIFggiPN9SQP+FAPTCPp08fRUz7rHp2qNBRcBJ1DXhb3ZoAoGCCqGSM49
- AwEHoSQDIgADLpph1trTIlVfa8NJvlMUPyWvL+wP+pW3BJITUL/wj9A=
- -----END EC PRIVATE KEY-----"""
- key1 = ECC.import_key(pem1)
- low16 = int(key1.pointQ.y % 65536)
- self.assertEqual(low16, 0xA6FC)
- key2 = ECC.import_key(pem2)
- low16 = int(key2.pointQ.y % 65536)
- self.assertEqual(low16, 0x6E57)
- class TestExport_P384(unittest.TestCase):
- ref_private, ref_public = create_ref_keys_p384()
- def test_export_public_der_uncompressed(self):
- key_file = load_file("ecc_p384_public.der")
- encoded = self.ref_public._export_subjectPublicKeyInfo(False)
- self.assertEqual(key_file, encoded)
- encoded = self.ref_public.export_key(format="DER")
- self.assertEqual(key_file, encoded)
- encoded = self.ref_public.export_key(format="DER", compress=False)
- self.assertEqual(key_file, encoded)
- def test_export_public_der_compressed(self):
- key_file = load_file("ecc_p384_public.der")
- pub_key = ECC.import_key(key_file)
- key_file_compressed = pub_key.export_key(format="DER", compress=True)
- key_file_compressed_ref = load_file("ecc_p384_public_compressed.der")
- self.assertEqual(key_file_compressed, key_file_compressed_ref)
- def test_export_private_der(self):
- key_file = load_file("ecc_p384_private.der")
- encoded = self.ref_private._export_private_der()
- self.assertEqual(key_file, encoded)
- # ---
- encoded = self.ref_private.export_key(format="DER", use_pkcs8=False)
- self.assertEqual(key_file, encoded)
- def test_export_private_pkcs8_clear(self):
- key_file = load_file("ecc_p384_private_p8_clear.der")
- encoded = self.ref_private._export_pkcs8()
- self.assertEqual(key_file, encoded)
- # ---
- encoded = self.ref_private.export_key(format="DER")
- self.assertEqual(key_file, encoded)
- def test_export_private_pkcs8_encrypted(self):
- encoded = self.ref_private._export_pkcs8(passphrase="secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- # This should prove that the output is password-protected
- self.assertRaises(ValueError, ECC._import_pkcs8, encoded, None)
- decoded = ECC._import_pkcs8(encoded, "secret")
- self.assertEqual(self.ref_private, decoded)
- # ---
- encoded = self.ref_private.export_key(format="DER",
- passphrase="secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- decoded = ECC.import_key(encoded, "secret")
- self.assertEqual(self.ref_private, decoded)
- def test_export_public_pem_uncompressed(self):
- key_file = load_file("ecc_p384_public.pem", "rt").strip()
- encoded = self.ref_private._export_public_pem(False)
- self.assertEqual(key_file, encoded)
- # ---
- encoded = self.ref_public.export_key(format="PEM")
- self.assertEqual(key_file, encoded)
- encoded = self.ref_public.export_key(format="PEM", compress=False)
- self.assertEqual(key_file, encoded)
- def test_export_public_pem_compressed(self):
- key_file = load_file("ecc_p384_public.pem", "rt").strip()
- pub_key = ECC.import_key(key_file)
- key_file_compressed = pub_key.export_key(format="PEM", compress=True)
- key_file_compressed_ref = load_file("ecc_p384_public_compressed.pem", "rt").strip()
- self.assertEqual(key_file_compressed, key_file_compressed_ref)
- def test_export_private_pem_clear(self):
- key_file = load_file("ecc_p384_private.pem", "rt").strip()
- encoded = self.ref_private._export_private_pem(None)
- self.assertEqual(key_file, encoded)
- # ---
- encoded = self.ref_private.export_key(format="PEM", use_pkcs8=False)
- self.assertEqual(key_file, encoded)
- def test_export_private_pem_encrypted(self):
- encoded = self.ref_private._export_private_pem(passphrase=b"secret")
- # This should prove that the output is password-protected
- self.assertRaises(ValueError, ECC.import_key, encoded)
- assert "EC PRIVATE KEY" in encoded
- decoded = ECC.import_key(encoded, "secret")
- self.assertEqual(self.ref_private, decoded)
- # ---
- encoded = self.ref_private.export_key(format="PEM",
- passphrase="secret",
- use_pkcs8=False)
- decoded = ECC.import_key(encoded, "secret")
- self.assertEqual(self.ref_private, decoded)
- def test_export_private_pkcs8_and_pem_1(self):
- # PKCS8 inside PEM with both unencrypted
- key_file = load_file("ecc_p384_private_p8_clear.pem", "rt").strip()
- encoded = self.ref_private._export_private_clear_pkcs8_in_clear_pem()
- self.assertEqual(key_file, encoded)
- # ---
- encoded = self.ref_private.export_key(format="PEM")
- self.assertEqual(key_file, encoded)
- def test_export_private_pkcs8_and_pem_2(self):
- # PKCS8 inside PEM with PKCS8 encryption
- encoded = self.ref_private._export_private_encrypted_pkcs8_in_clear_pem("secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- # This should prove that the output is password-protected
- self.assertRaises(ValueError, ECC.import_key, encoded)
- assert "ENCRYPTED PRIVATE KEY" in encoded
- decoded = ECC.import_key(encoded, "secret")
- self.assertEqual(self.ref_private, decoded)
- # ---
- encoded = self.ref_private.export_key(format="PEM",
- passphrase="secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- decoded = ECC.import_key(encoded, "secret")
- self.assertEqual(self.ref_private, decoded)
- def test_export_openssh_uncompressed(self):
- key_file = load_file("ecc_p384_public_openssh.txt", "rt")
- encoded = self.ref_public._export_openssh(False)
- self.assertEquals(key_file, encoded)
- # ---
- encoded = self.ref_public.export_key(format="OpenSSH")
- self.assertEquals(key_file, encoded)
- encoded = self.ref_public.export_key(format="OpenSSH", compress=False)
- self.assertEquals(key_file, encoded)
- def test_export_openssh_compressed(self):
- key_file = load_file("ecc_p384_public_openssh.txt", "rt")
- pub_key = ECC.import_key(key_file)
- key_file_compressed = pub_key.export_key(format="OpenSSH", compress=True)
- assert len(key_file) > len(key_file_compressed)
- self.assertEquals(pub_key, ECC.import_key(key_file_compressed))
- def test_prng(self):
- # Test that password-protected containers use the provided PRNG
- encoded1 = self.ref_private.export_key(format="PEM",
- passphrase="secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC",
- randfunc=get_fixed_prng())
- encoded2 = self.ref_private.export_key(format="PEM",
- passphrase="secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC",
- randfunc=get_fixed_prng())
- self.assertEquals(encoded1, encoded2)
- # ---
- encoded1 = self.ref_private.export_key(format="PEM",
- use_pkcs8=False,
- passphrase="secret",
- randfunc=get_fixed_prng())
- encoded2 = self.ref_private.export_key(format="PEM",
- use_pkcs8=False,
- passphrase="secret",
- randfunc=get_fixed_prng())
- self.assertEquals(encoded1, encoded2)
- def test_byte_or_string_passphrase(self):
- encoded1 = self.ref_private.export_key(format="PEM",
- use_pkcs8=False,
- passphrase="secret",
- randfunc=get_fixed_prng())
- encoded2 = self.ref_private.export_key(format="PEM",
- use_pkcs8=False,
- passphrase=b"secret",
- randfunc=get_fixed_prng())
- self.assertEquals(encoded1, encoded2)
- def test_error_params1(self):
- # Unknown format
- self.assertRaises(ValueError, self.ref_private.export_key, format="XXX")
- # Missing 'protection' parameter when PKCS#8 is used
- self.ref_private.export_key(format="PEM", passphrase="secret",
- use_pkcs8=False)
- self.assertRaises(ValueError, self.ref_private.export_key, format="PEM",
- passphrase="secret")
- # DER format but no PKCS#8
- self.assertRaises(ValueError, self.ref_private.export_key, format="DER",
- passphrase="secret",
- use_pkcs8=False,
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- # Incorrect parameters for public keys
- self.assertRaises(ValueError, self.ref_public.export_key, format="DER",
- use_pkcs8=False)
- # Empty password
- self.assertRaises(ValueError, self.ref_private.export_key, format="PEM",
- passphrase="", use_pkcs8=False)
- self.assertRaises(ValueError, self.ref_private.export_key, format="PEM",
- passphrase="",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- # No private keys with OpenSSH
- self.assertRaises(ValueError, self.ref_private.export_key, format="OpenSSH",
- passphrase="secret")
- def test_compressed_curve(self):
- # Compressed P-384 curve (Y-point is even)
- # openssl ecparam -name secp384p1 -genkey -noout -conv_form compressed -out /tmp/a.pem
- # openssl ec -in /tmp/a.pem -text -noout
- pem1 = """-----BEGIN EC PRIVATE KEY-----
- MIGkAgEBBDAM0lEIhvXuekK2SWtdbgOcZtBaxa9TxfpO/GcDFZLCJ3JVXaTgwken
- QT+C+XLtD6WgBwYFK4EEACKhZANiAATs0kZMhFDu8DoBC21jrSDPyAUn4aXZ/DM4
- ylhDfWmb4LEbeszXceIzfhIUaaGs5y1xXaqf5KXTiAAYx2pKUzAAM9lcGUHCGKJG
- k4AgUmVJON29XoUilcFrzjDmuye3B6Q=
- -----END EC PRIVATE KEY-----"""
- # Compressed P-384 curve (Y-point is odd)
- pem2 = """-----BEGIN EC PRIVATE KEY-----
- MIGkAgEBBDDHPFTslYLltE16fHdSDTtE/2HTmd3M8mqy5MttAm4wZ833KXiGS9oe
- kFdx9sNV0KygBwYFK4EEACKhZANiAASLIE5RqVMtNhtBH/u/p/ifqOAlKnK/+RrQ
- YC46ZRsnKNayw3wATdPjgja7L/DSII3nZK0G6KOOVwJBznT/e+zudUJYhZKaBLRx
- /bgXyxUtYClOXxb1Y/5N7txLstYRyP0=
- -----END EC PRIVATE KEY-----"""
- key1 = ECC.import_key(pem1)
- low16 = int(key1.pointQ.y % 65536)
- self.assertEqual(low16, 0x07a4)
- key2 = ECC.import_key(pem2)
- low16 = int(key2.pointQ.y % 65536)
- self.assertEqual(low16, 0xc8fd)
- class TestExport_P521(unittest.TestCase):
- ref_private, ref_public = create_ref_keys_p521()
- def test_export_public_der_uncompressed(self):
- key_file = load_file("ecc_p521_public.der")
- encoded = self.ref_public._export_subjectPublicKeyInfo(False)
- self.assertEqual(key_file, encoded)
- encoded = self.ref_public.export_key(format="DER")
- self.assertEqual(key_file, encoded)
- encoded = self.ref_public.export_key(format="DER", compress=False)
- self.assertEqual(key_file, encoded)
- def test_export_public_der_compressed(self):
- key_file = load_file("ecc_p521_public.der")
- pub_key = ECC.import_key(key_file)
- key_file_compressed = pub_key.export_key(format="DER", compress=True)
- key_file_compressed_ref = load_file("ecc_p521_public_compressed.der")
- self.assertEqual(key_file_compressed, key_file_compressed_ref)
- def test_export_private_der(self):
- key_file = load_file("ecc_p521_private.der")
- encoded = self.ref_private._export_private_der()
- self.assertEqual(key_file, encoded)
- # ---
- encoded = self.ref_private.export_key(format="DER", use_pkcs8=False)
- self.assertEqual(key_file, encoded)
- def test_export_private_pkcs8_clear(self):
- key_file = load_file("ecc_p521_private_p8_clear.der")
- encoded = self.ref_private._export_pkcs8()
- self.assertEqual(key_file, encoded)
- # ---
- encoded = self.ref_private.export_key(format="DER")
- self.assertEqual(key_file, encoded)
- def test_export_private_pkcs8_encrypted(self):
- encoded = self.ref_private._export_pkcs8(passphrase="secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- # This should prove that the output is password-protected
- self.assertRaises(ValueError, ECC._import_pkcs8, encoded, None)
- decoded = ECC._import_pkcs8(encoded, "secret")
- self.assertEqual(self.ref_private, decoded)
- # ---
- encoded = self.ref_private.export_key(format="DER",
- passphrase="secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- decoded = ECC.import_key(encoded, "secret")
- self.assertEqual(self.ref_private, decoded)
- def test_export_public_pem_uncompressed(self):
- key_file = load_file("ecc_p521_public.pem", "rt").strip()
- encoded = self.ref_private._export_public_pem(False)
- self.assertEqual(key_file, encoded)
- # ---
- encoded = self.ref_public.export_key(format="PEM")
- self.assertEqual(key_file, encoded)
- encoded = self.ref_public.export_key(format="PEM", compress=False)
- self.assertEqual(key_file, encoded)
- def test_export_public_pem_compressed(self):
- key_file = load_file("ecc_p521_public.pem", "rt").strip()
- pub_key = ECC.import_key(key_file)
- key_file_compressed = pub_key.export_key(format="PEM", compress=True)
- key_file_compressed_ref = load_file("ecc_p521_public_compressed.pem", "rt").strip()
- self.assertEqual(key_file_compressed, key_file_compressed_ref)
- def test_export_private_pem_clear(self):
- key_file = load_file("ecc_p521_private.pem", "rt").strip()
- encoded = self.ref_private._export_private_pem(None)
- self.assertEqual(key_file, encoded)
- # ---
- encoded = self.ref_private.export_key(format="PEM", use_pkcs8=False)
- self.assertEqual(key_file, encoded)
- def test_export_private_pem_encrypted(self):
- encoded = self.ref_private._export_private_pem(passphrase=b"secret")
- # This should prove that the output is password-protected
- self.assertRaises(ValueError, ECC.import_key, encoded)
- assert "EC PRIVATE KEY" in encoded
- decoded = ECC.import_key(encoded, "secret")
- self.assertEqual(self.ref_private, decoded)
- # ---
- encoded = self.ref_private.export_key(format="PEM",
- passphrase="secret",
- use_pkcs8=False)
- decoded = ECC.import_key(encoded, "secret")
- self.assertEqual(self.ref_private, decoded)
- def test_export_private_pkcs8_and_pem_1(self):
- # PKCS8 inside PEM with both unencrypted
- key_file = load_file("ecc_p521_private_p8_clear.pem", "rt").strip()
- encoded = self.ref_private._export_private_clear_pkcs8_in_clear_pem()
- self.assertEqual(key_file, encoded)
- # ---
- encoded = self.ref_private.export_key(format="PEM")
- self.assertEqual(key_file, encoded)
- def test_export_private_pkcs8_and_pem_2(self):
- # PKCS8 inside PEM with PKCS8 encryption
- encoded = self.ref_private._export_private_encrypted_pkcs8_in_clear_pem("secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- # This should prove that the output is password-protected
- self.assertRaises(ValueError, ECC.import_key, encoded)
- assert "ENCRYPTED PRIVATE KEY" in encoded
- decoded = ECC.import_key(encoded, "secret")
- self.assertEqual(self.ref_private, decoded)
- # ---
- encoded = self.ref_private.export_key(format="PEM",
- passphrase="secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- decoded = ECC.import_key(encoded, "secret")
- self.assertEqual(self.ref_private, decoded)
- def test_export_openssh_uncompressed(self):
- key_file = load_file("ecc_p521_public_openssh.txt", "rt")
- encoded = self.ref_public._export_openssh(False)
- self.assertEquals(key_file, encoded)
- # ---
- encoded = self.ref_public.export_key(format="OpenSSH")
- self.assertEquals(key_file, encoded)
- encoded = self.ref_public.export_key(format="OpenSSH", compress=False)
- self.assertEquals(key_file, encoded)
- def test_export_openssh_compressed(self):
- key_file = load_file("ecc_p521_public_openssh.txt", "rt")
- pub_key = ECC.import_key(key_file)
- key_file_compressed = pub_key.export_key(format="OpenSSH", compress=True)
- assert len(key_file) > len(key_file_compressed)
- self.assertEquals(pub_key, ECC.import_key(key_file_compressed))
- def test_prng(self):
- # Test that password-protected containers use the provided PRNG
- encoded1 = self.ref_private.export_key(format="PEM",
- passphrase="secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC",
- randfunc=get_fixed_prng())
- encoded2 = self.ref_private.export_key(format="PEM",
- passphrase="secret",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC",
- randfunc=get_fixed_prng())
- self.assertEquals(encoded1, encoded2)
- # ---
- encoded1 = self.ref_private.export_key(format="PEM",
- use_pkcs8=False,
- passphrase="secret",
- randfunc=get_fixed_prng())
- encoded2 = self.ref_private.export_key(format="PEM",
- use_pkcs8=False,
- passphrase="secret",
- randfunc=get_fixed_prng())
- self.assertEquals(encoded1, encoded2)
- def test_byte_or_string_passphrase(self):
- encoded1 = self.ref_private.export_key(format="PEM",
- use_pkcs8=False,
- passphrase="secret",
- randfunc=get_fixed_prng())
- encoded2 = self.ref_private.export_key(format="PEM",
- use_pkcs8=False,
- passphrase=b"secret",
- randfunc=get_fixed_prng())
- self.assertEquals(encoded1, encoded2)
- def test_error_params1(self):
- # Unknown format
- self.assertRaises(ValueError, self.ref_private.export_key, format="XXX")
- # Missing 'protection' parameter when PKCS#8 is used
- self.ref_private.export_key(format="PEM", passphrase="secret",
- use_pkcs8=False)
- self.assertRaises(ValueError, self.ref_private.export_key, format="PEM",
- passphrase="secret")
- # DER format but no PKCS#8
- self.assertRaises(ValueError, self.ref_private.export_key, format="DER",
- passphrase="secret",
- use_pkcs8=False,
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- # Incorrect parameters for public keys
- self.assertRaises(ValueError, self.ref_public.export_key, format="DER",
- use_pkcs8=False)
- # Empty password
- self.assertRaises(ValueError, self.ref_private.export_key, format="PEM",
- passphrase="", use_pkcs8=False)
- self.assertRaises(ValueError, self.ref_private.export_key, format="PEM",
- passphrase="",
- protection="PBKDF2WithHMAC-SHA1AndAES128-CBC")
- # No private keys with OpenSSH
- self.assertRaises(ValueError, self.ref_private.export_key, format="OpenSSH",
- passphrase="secret")
- def test_compressed_curve(self):
- # Compressed P-521 curve (Y-point is even)
- # openssl ecparam -name secp521r1 -genkey -noout -conv_form compressed -out /tmp/a.pem
- # openssl ec -in /tmp/a.pem -text -noout
- pem1 = """-----BEGIN EC PRIVATE KEY-----
- MIHcAgEBBEIAnm1CEjVjvNfXEN730p+D6su5l+mOztdc5XmTEoti+s2R4GQ4mAv3
- 0zYLvyklvOHw0+yy8d0cyGEJGb8T3ZVKmg2gBwYFK4EEACOhgYkDgYYABAHzjTI1
- ckxQ3Togi0LAxiG0PucdBBBs5oIy3df95xv6SInp70z+4qQ2EltEmdNMssH8eOrl
- M5CYdZ6nbcHMVaJUvQEzTrYxvFjOgJiOd+E9eBWbLkbMNqsh1UKVO6HbMbW0ohCI
- uGxO8tM6r3w89/qzpG2SvFM/fvv3mIR30wSZDD84qA==
- -----END EC PRIVATE KEY-----"""
- # Compressed P-521 curve (Y-point is odd)
- pem2 = """-----BEGIN EC PRIVATE KEY-----
- MIHcAgEBBEIB84OfhJluLBRLn3+cC/RQ37C2SfQVP/t0gQK2tCsTf5avRcWYRrOJ
- PmX9lNnkC0Hobd75QFRmdxrB0Wd1/M4jZOWgBwYFK4EEACOhgYkDgYYABAAMZcdJ
- 1YLCGHt3bHCEzdidVy6+brlJIbv1aQ9fPQLF7WKNv4c8w3H8d5a2+SDZilBOsk5c
- 6cNJDMz2ExWQvxl4CwDJtJGt1+LHVKFGy73NANqVxMbRu+2F8lOxkNp/ziFTbVyV
- vv6oYkMIIi7r5oQWAiQDrR2mlrrFDL9V7GH/r8SWQw==
- -----END EC PRIVATE KEY-----"""
- key1 = ECC.import_key(pem1)
- low16 = int(key1.pointQ.y % 65536)
- self.assertEqual(low16, 0x38a8)
- key2 = ECC.import_key(pem2)
- low16 = int(key2.pointQ.y % 65536)
- self.assertEqual(low16, 0x9643)
- def get_tests(config={}):
- tests = []
- tests += list_test_cases(TestImport)
- tests += list_test_cases(TestImport_P256)
- tests += list_test_cases(TestImport_P384)
- tests += list_test_cases(TestImport_P521)
- tests += list_test_cases(TestExport_P256)
- tests += list_test_cases(TestExport_P384)
- tests += list_test_cases(TestExport_P521)
- return tests
- if __name__ == '__main__':
- suite = lambda: unittest.TestSuite(get_tests())
- unittest.main(defaultTest='suite')
|