2 # PyGOST -- Pure Python GOST cryptographic functions library
3 # Copyright (C) 2015-2019 Sergey Matveev <stargrave@stargrave.org>
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU General Public License as published by
7 # the Free Software Foundation, either version 3 of the License, or
8 # (at your option) any later version.
10 # This program is distributed in the hope that it will be useful,
11 # but WITHOUT ANY WARRANTY; without even the implied warranty of
12 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 # GNU General Public License for more details.
15 # You should have received a copy of the GNU General Public License
16 # along with this program. If not, see <http://www.gnu.org/licenses/>.
18 from unittest import skip
19 from unittest import TestCase
22 from pygost import gost34112012256
23 from pygost import gost34112012512
24 from pygost.gost34112012256 import GOST34112012256
25 from pygost.gost34112012512 import GOST34112012512
26 from pygost.gost34112012512 import pbkdf2
27 from pygost.utils import hexdec
28 from pygost.utils import hexenc
31 class TestCopy(TestCase):
38 self.assertSequenceEqual(m.digest(), c.digest())
41 class TestHMAC(TestCase):
45 for digestmod in (GOST34112012256, gost34112012256):
46 self.assertSequenceEqual(
48 key=hexdec("000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f"),
49 msg=hexdec("0126bdb87800af214341456563780100"),
52 "a1aa5f7de402d7b3d323f2991c8d4534013137010a83754fd0af6d7cd4922ed9",
56 for digestmod in (GOST34112012512, gost34112012512):
57 self.assertSequenceEqual(
59 key=hexdec("000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f"),
60 msg=hexdec("0126bdb87800af214341456563780100"),
63 "a59bab22ecae19c65fbde6e5f4e9f5d8549d31f037f9df9b905500e171923a773d5f1530f2ed7e964cb2eedc29e9ad2f3afe93b2814f79f5000ffc0366c251e6",
67 class TestVectors(TestCase):
69 m = hexdec("323130393837363534333231303938373635343332313039383736353433323130393837363534333231303938373635343332313039383736353433323130")[::-1]
70 self.assertSequenceEqual(
71 GOST34112012512(m).digest(),
72 hexdec("486f64c1917879417fef082b3381a4e211c324f074654c38823a7b76f830ad00fa1fbae42b1285c0352f227524bc9ab16254288dd6863dccd5b9f54a1ad0541b")[::-1]
74 self.assertSequenceEqual(
75 GOST34112012256(m).digest(),
76 hexdec("00557be5e584fd52a449b16b0251d05d27f94ab76cbaa6da890b59d8ef1e159d")[::-1]
80 m = u"Се ветри, Стрибожи внуци, веютъ с моря стрелами на храбрыя плъкы Игоревы".encode("cp1251")
81 self.assertSequenceEqual(m, hexdec("fbe2e5f0eee3c820fbeafaebef20fffbf0e1e0f0f520e0ed20e8ece0ebe5f0f2f120fff0eeec20f120faf2fee5e2202ce8f6f3ede220e8e6eee1e8f0f2d1202ce8f0f2e5e220e5d1")[::-1])
82 self.assertSequenceEqual(
83 GOST34112012512(m).digest(),
84 hexdec("28fbc9bada033b1460642bdcddb90c3fb3e56c497ccd0f62b8a2ad4935e85f037613966de4ee00531ae60f3b5a47f8dae06915d5f2f194996fcabf2622e6881e")[::-1]
86 self.assertSequenceEqual(
87 GOST34112012256(m).digest(),
88 hexdec("508f7e553c06501d749a66fc28c6cac0b005746d97537fa85d9e40904efed29d")[::-1]
90 def test_habr144(self):
91 """Test vector from https://habr.com/ru/post/450024/
93 m = hexdec("d0cf11e0a1b11ae1000000000000000000000000000000003e000300feff0900060000000000000000000000010000000100000000000000001000002400000001000000feffffff0000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff")
94 self.assertSequenceEqual(
95 GOST34112012256(m).hexdigest(),
96 "c766085540caaa8953bfcf7a1ba220619cee50d65dc242f82f23ba4b180b18e0",
100 class TestPBKDF2(TestCase):
101 """http://tc26.ru/.../R_50.1.111-2016.pdf
104 self.assertSequenceEqual(
105 hexenc(pbkdf2(b"password", b"salt", 1, 64)),
106 "64770af7f748c3b1c9ac831dbcfd85c26111b30a8a657ddc3056b80ca73e040d2854fd36811f6d825cc4ab66ec0a68a490a9e5cf5156b3a2b7eecddbf9a16b47",
110 self.assertSequenceEqual(
111 hexenc(pbkdf2(b"password", b"salt", 2, 64)),
112 "5a585bafdfbb6e8830d6d68aa3b43ac00d2e4aebce01c9b31c2caed56f0236d4d34b2b8fbd2c4e89d54d46f50e47d45bbac301571743119e8d3c42ba66d348de",
116 self.assertSequenceEqual(
117 hexenc(pbkdf2(b"password", b"salt", 4096, 64)),
118 "e52deb9a2d2aaff4e2ac9d47a41f34c20376591c67807f0477e32549dc341bc7867c09841b6d58e29d0347c996301d55df0d34e47cf68f4e3c2cdaf1d9ab86c3",
121 @skip("it takes too long")
123 self.assertSequenceEqual(
124 hexenc(pbkdf2(b"password", b"salt", 1677216, 64)),
125 "49e4843bba76e300afe24c4d23dc7392def12f2c0e244172367cd70a8982ac361adb601c7e2a314e8cb7b1e9df840e36ab5615be5d742b6cf203fb55fdc48071",
129 self.assertSequenceEqual(
131 b"passwordPASSWORDpassword",
132 b"saltSALTsaltSALTsaltSALTsaltSALTsalt",
136 "b2d8f1245fc4d29274802057e4b54e0a0753aa22fc53760b301cf008679e58fe4bee9addcae99ba2b0b20f431a9c5e50f395c89387d0945aedeca6eb4015dfc2bd2421ee9bb71183ba882ceebfef259f33f9e27dc6178cb89dc37428cf9cc52a2baa2d3a",
140 self.assertSequenceEqual(
141 hexenc(pbkdf2(b"pass\x00word", b"sa\x00lt", 4096, 64)),
142 "50df062885b69801a3c10248eb0a27ab6e522ffeb20c991c660f001475d73a4e167f782c18e97e92976d9c1d970831ea78ccb879f67068cdac1910740844e830",