2013-06-24 20:41:05 +00:00
|
|
|
import os
|
|
|
|
import re
|
|
|
|
import shutil
|
|
|
|
import tempfile
|
2013-06-26 20:00:23 +00:00
|
|
|
from binascii import hexlify
|
2015-05-22 17:21:41 +00:00
|
|
|
|
2015-06-05 20:58:08 +00:00
|
|
|
from ..key import PlaintextKey, PassphraseKey, KeyfileKey, COMPR_DEFAULT, increment_iv
|
2015-05-22 17:21:41 +00:00
|
|
|
from ..helpers import Location, unhexlify
|
|
|
|
from . import BaseTestCase
|
2013-06-24 20:41:05 +00:00
|
|
|
|
|
|
|
|
2015-05-09 18:47:50 +00:00
|
|
|
class KeyTestCase(BaseTestCase):
|
2013-06-24 20:41:05 +00:00
|
|
|
|
2015-03-17 22:03:36 +00:00
|
|
|
class MockArgs:
|
2013-06-24 20:41:05 +00:00
|
|
|
repository = Location(tempfile.mkstemp()[1])
|
2015-03-02 20:34:19 +00:00
|
|
|
compression = COMPR_DEFAULT
|
|
|
|
mac = None
|
2015-03-13 21:30:22 +00:00
|
|
|
cipher = None
|
2013-06-24 20:41:05 +00:00
|
|
|
|
|
|
|
keyfile2_key_file = """
|
2015-06-05 20:58:08 +00:00
|
|
|
BORG_KEY 0000000000000000000000000000000000000000000000000000000000000000
|
2015-03-23 10:40:13 +00:00
|
|
|
hqRzYWx02gAgA1l4jfyv22y6U/mxxDT8HodSWAcX0g3nOESrQcNnBsundmVyc2lvbgGqaX
|
|
|
|
RlcmF0aW9uc84AAYagqWFsZ29yaXRobaRnbWFjpGhhc2iw7eaB54JssAOnM1S4S9CeTaRk
|
|
|
|
YXRh2gDQzmuyg3iYjMeTLObY+ybI+QfngB+5mmHeEAfBa42fuEZgqM3rYyMj2XfgvamF+O
|
|
|
|
0asvhEyy9om190FaOxQ4RiiTMNqSP0FKLmd1i5ZyDMfRyp7JbscRFs9Ryk28yXWkv0MgQy
|
|
|
|
EAYlaycY+6lWdRSgEPxidyPl9t9dr2AI/UuiQytwqmcmXgWD6Px6wgpOS/4AcRmEvDqIIl
|
|
|
|
Rc2xsu+RevGAxk5rnrIIRPr7WB5R2cinzEn9ylDgBDt9LZbq706ELgtwVTnjWB8FBTPwVI
|
|
|
|
vLTTXQ==
|
2015-03-22 23:05:57 +00:00
|
|
|
""".strip()
|
2013-06-24 20:41:05 +00:00
|
|
|
|
|
|
|
keyfile2_cdata = unhexlify(re.sub('\W', '', """
|
2015-03-23 10:40:13 +00:00
|
|
|
0393c4102e5ce8f5e9477c9e4ce2de453121aa139600001402c41000000000000000000000000000000000
|
|
|
|
c2c407b0147a64a379d1
|
2013-06-24 20:41:05 +00:00
|
|
|
"""))
|
2015-03-23 10:40:13 +00:00
|
|
|
keyfile2_id = unhexlify('dd9451069663931c8abd85452d016733')
|
2013-06-24 20:41:05 +00:00
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
self.tmppath = tempfile.mkdtemp()
|
2015-05-09 16:40:55 +00:00
|
|
|
os.environ['BORG_KEYS_DIR'] = self.tmppath
|
2013-06-24 20:41:05 +00:00
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
shutil.rmtree(self.tmppath)
|
|
|
|
|
2015-03-17 22:03:36 +00:00
|
|
|
class MockRepository:
|
|
|
|
class _Location:
|
2013-06-24 20:41:05 +00:00
|
|
|
orig = '/some/place'
|
|
|
|
|
|
|
|
_location = _Location()
|
|
|
|
id = bytes(32)
|
|
|
|
|
2015-03-06 02:29:29 +00:00
|
|
|
def _test_make_testdata(self):
|
|
|
|
# modify tearDown to not kill the key file first, before using this
|
|
|
|
os.environ['ATTIC_PASSPHRASE'] = 'passphrase'
|
|
|
|
key = KeyfileKey.create(self.MockRepository(), self.MockArgs())
|
|
|
|
print("keyfile2_key_file: find the it in the filesystem, see location in test log output")
|
|
|
|
print("keyfile2_cdata:", hexlify(key.encrypt(b'payload')))
|
|
|
|
print("keyfile2_id:", hexlify(key.id_hash(b'payload')))
|
|
|
|
assert False
|
|
|
|
|
2013-06-24 20:41:05 +00:00
|
|
|
def test_plaintext(self):
|
2015-03-02 20:34:19 +00:00
|
|
|
key = PlaintextKey.create(None, self.MockArgs())
|
2013-06-24 20:41:05 +00:00
|
|
|
data = b'foo'
|
2015-03-23 10:40:13 +00:00
|
|
|
self.assert_equal(hexlify(key.id_hash(data)), b'4c9137bc0dd3ddb31de4e138a49d7eb3')
|
2013-06-24 20:41:05 +00:00
|
|
|
self.assert_equal(data, key.decrypt(key.id_hash(data), key.encrypt(data)))
|
|
|
|
|
|
|
|
def test_keyfile(self):
|
2015-05-09 16:40:55 +00:00
|
|
|
os.environ['BORG_PASSPHRASE'] = 'test'
|
2013-06-24 20:41:05 +00:00
|
|
|
key = KeyfileKey.create(self.MockRepository(), self.MockArgs())
|
2015-03-22 23:05:57 +00:00
|
|
|
self.assert_equal(key.enc_iv, b'\0'*16)
|
2013-08-12 12:39:14 +00:00
|
|
|
manifest = key.encrypt(b'XXX')
|
2015-03-22 23:05:57 +00:00
|
|
|
self.assert_equal(key.extract_iv(manifest), b'\0'*16)
|
2013-08-12 12:39:14 +00:00
|
|
|
manifest2 = key.encrypt(b'XXX')
|
|
|
|
self.assert_not_equal(manifest, manifest2)
|
|
|
|
self.assert_equal(key.decrypt(None, manifest), key.decrypt(None, manifest2))
|
2015-03-22 23:05:57 +00:00
|
|
|
self.assert_equal(key.extract_iv(manifest2), b'\0'*15+b'\x01')
|
|
|
|
iv = key.extract_iv(manifest)
|
2013-06-24 20:41:05 +00:00
|
|
|
key2 = KeyfileKey.detect(self.MockRepository(), manifest)
|
2015-03-22 23:05:57 +00:00
|
|
|
# we assume that the payload fits into one 16B AES block (which is given for b'XXX').
|
|
|
|
iv_plus_1 = increment_iv(iv, 16)
|
|
|
|
self.assert_equal(key2.enc_iv, iv_plus_1)
|
2013-06-24 20:41:05 +00:00
|
|
|
# Key data sanity check
|
|
|
|
self.assert_equal(len(set([key2.id_key, key2.enc_key, key2.enc_hmac_key])), 3)
|
|
|
|
self.assert_equal(key2.chunk_seed == 0, False)
|
|
|
|
data = b'foo'
|
|
|
|
self.assert_equal(data, key2.decrypt(key.id_hash(data), key.encrypt(data)))
|
|
|
|
|
|
|
|
def test_keyfile2(self):
|
2015-05-09 16:40:55 +00:00
|
|
|
with open(os.path.join(os.environ['BORG_KEYS_DIR'], 'keyfile'), 'w') as fd:
|
2013-06-24 20:41:05 +00:00
|
|
|
fd.write(self.keyfile2_key_file)
|
2015-05-09 16:40:55 +00:00
|
|
|
os.environ['BORG_PASSPHRASE'] = 'passphrase'
|
2013-06-24 20:41:05 +00:00
|
|
|
key = KeyfileKey.detect(self.MockRepository(), self.keyfile2_cdata)
|
|
|
|
self.assert_equal(key.decrypt(self.keyfile2_id, self.keyfile2_cdata), b'payload')
|
|
|
|
|
|
|
|
def test_passphrase(self):
|
2015-05-09 16:40:55 +00:00
|
|
|
os.environ['BORG_PASSPHRASE'] = 'test'
|
2015-03-02 20:34:19 +00:00
|
|
|
key = PassphraseKey.create(self.MockRepository(), self.MockArgs())
|
2015-06-05 20:58:08 +00:00
|
|
|
# XXX self.assert_equal(bytes_to_long(key.enc_cipher.iv, 8), 0)
|
2015-03-22 23:05:57 +00:00
|
|
|
self.assert_equal(key.enc_iv, b'\0'*16)
|
2013-06-24 20:41:05 +00:00
|
|
|
self.assert_equal(hexlify(key.id_key), b'793b0717f9d8fb01c751a487e9b827897ceea62409870600013fbc6b4d8d7ca6')
|
|
|
|
self.assert_equal(hexlify(key.enc_hmac_key), b'b885a05d329a086627412a6142aaeb9f6c54ab7950f996dd65587251f6bc0901')
|
|
|
|
self.assert_equal(hexlify(key.enc_key), b'2ff3654c6daf7381dbbe718d2b20b4f1ea1e34caa6cc65f6bb3ac376b93fed2a')
|
|
|
|
self.assert_equal(key.chunk_seed, -775740477)
|
2013-08-12 12:39:14 +00:00
|
|
|
manifest = key.encrypt(b'XXX')
|
2015-03-22 23:05:57 +00:00
|
|
|
self.assert_equal(key.extract_iv(manifest), b'\0'*16)
|
2013-08-12 12:39:14 +00:00
|
|
|
manifest2 = key.encrypt(b'XXX')
|
|
|
|
self.assert_not_equal(manifest, manifest2)
|
|
|
|
self.assert_equal(key.decrypt(None, manifest), key.decrypt(None, manifest2))
|
2015-03-22 23:05:57 +00:00
|
|
|
self.assert_equal(key.extract_iv(manifest2), b'\0'*15+b'\x01')
|
|
|
|
iv = key.extract_iv(manifest)
|
2013-06-24 20:41:05 +00:00
|
|
|
key2 = PassphraseKey.detect(self.MockRepository(), manifest)
|
2015-03-22 23:05:57 +00:00
|
|
|
# we assume that the payload fits into one 16B AES block (which is given for b'XXX').
|
|
|
|
iv_plus_1 = increment_iv(iv, 16)
|
|
|
|
self.assert_equal(key2.enc_iv, iv_plus_1)
|
2013-06-24 20:41:05 +00:00
|
|
|
self.assert_equal(key.id_key, key2.id_key)
|
|
|
|
self.assert_equal(key.enc_hmac_key, key2.enc_hmac_key)
|
|
|
|
self.assert_equal(key.enc_key, key2.enc_key)
|
|
|
|
self.assert_equal(key.chunk_seed, key2.chunk_seed)
|
|
|
|
data = b'foo'
|
2015-03-23 10:40:13 +00:00
|
|
|
self.assert_equal(hexlify(key.id_hash(data)), b'a409d69859b8a07625f066e42cde0501')
|
2013-06-24 20:41:05 +00:00
|
|
|
self.assert_equal(data, key2.decrypt(key2.id_hash(data), key.encrypt(data)))
|