]> Cypherpunks.ru repositories - pygost.git/blob - pygost/test_gost34112012.py
78a638461ffaa58644d7d5c861aa1f58c7284513
[pygost.git] / pygost / test_gost34112012.py
1 # coding: utf-8
2 # PyGOST -- Pure Python GOST cryptographic functions library
3 # Copyright (C) 2015-2019 Sergey Matveev <stargrave@stargrave.org>
4 #
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU General Public License as published by
7 # the Free Software Foundation, either version 3 of the License, or
8 # (at your option) any later version.
9 #
10 # This program is distributed in the hope that it will be useful,
11 # but WITHOUT ANY WARRANTY; without even the implied warranty of
12 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
13 # GNU General Public License for more details.
14 #
15 # You should have received a copy of the GNU General Public License
16 # along with this program.  If not, see <http://www.gnu.org/licenses/>.
17
18 from unittest import skip
19 from unittest import TestCase
20 import hmac
21
22 from pygost import gost34112012256
23 from pygost import gost34112012512
24 from pygost.gost34112012256 import GOST34112012256
25 from pygost.gost34112012512 import GOST34112012512
26 from pygost.gost34112012512 import pbkdf2
27 from pygost.utils import hexdec
28 from pygost.utils import hexenc
29
30
31 class TestCopy(TestCase):
32     def runTest(self):
33         m = GOST34112012256()
34         c = m.copy()
35         m.update(b"foobar")
36         c.update(b"foo")
37         c.update(b"bar")
38         self.assertSequenceEqual(m.digest(), c.digest())
39
40
41 class TestHMAC(TestCase):
42     """RFC 7836
43     """
44     def test_256(self):
45         for digestmod in (GOST34112012256, gost34112012256):
46             self.assertSequenceEqual(
47                 hmac.new(
48                     key=hexdec("000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f"),
49                     msg=hexdec("0126bdb87800af214341456563780100"),
50                     digestmod=digestmod,
51                 ).hexdigest(),
52                 "a1aa5f7de402d7b3d323f2991c8d4534013137010a83754fd0af6d7cd4922ed9",
53             )
54
55     def test_512(self):
56         for digestmod in (GOST34112012512, gost34112012512):
57             self.assertSequenceEqual(
58                 hmac.new(
59                     key=hexdec("000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f"),
60                     msg=hexdec("0126bdb87800af214341456563780100"),
61                     digestmod=digestmod,
62                 ).hexdigest(),
63                 "a59bab22ecae19c65fbde6e5f4e9f5d8549d31f037f9df9b905500e171923a773d5f1530f2ed7e964cb2eedc29e9ad2f3afe93b2814f79f5000ffc0366c251e6",
64             )
65
66
67 class TestVectors(TestCase):
68     def test_m1(self):
69         m = hexdec("323130393837363534333231303938373635343332313039383736353433323130393837363534333231303938373635343332313039383736353433323130")[::-1]
70         self.assertSequenceEqual(
71             GOST34112012512(m).digest(),
72             hexdec("486f64c1917879417fef082b3381a4e211c324f074654c38823a7b76f830ad00fa1fbae42b1285c0352f227524bc9ab16254288dd6863dccd5b9f54a1ad0541b")[::-1]
73         )
74         self.assertSequenceEqual(
75             GOST34112012256(m).digest(),
76             hexdec("00557be5e584fd52a449b16b0251d05d27f94ab76cbaa6da890b59d8ef1e159d")[::-1]
77         )
78
79     def test_m2(self):
80         m = u"Се ветри, Стрибожи внуци, веютъ с моря стрелами на храбрыя плъкы Игоревы".encode("cp1251")
81         self.assertSequenceEqual(m, hexdec("fbe2e5f0eee3c820fbeafaebef20fffbf0e1e0f0f520e0ed20e8ece0ebe5f0f2f120fff0eeec20f120faf2fee5e2202ce8f6f3ede220e8e6eee1e8f0f2d1202ce8f0f2e5e220e5d1")[::-1])
82         self.assertSequenceEqual(
83             GOST34112012512(m).digest(),
84             hexdec("28fbc9bada033b1460642bdcddb90c3fb3e56c497ccd0f62b8a2ad4935e85f037613966de4ee00531ae60f3b5a47f8dae06915d5f2f194996fcabf2622e6881e")[::-1]
85         )
86         self.assertSequenceEqual(
87             GOST34112012256(m).digest(),
88             hexdec("508f7e553c06501d749a66fc28c6cac0b005746d97537fa85d9e40904efed29d")[::-1]
89         )
90
91     def test_habr144(self):
92         """Test vector from https://habr.com/ru/post/450024/
93         """
94         m = hexdec("d0cf11e0a1b11ae1000000000000000000000000000000003e000300feff0900060000000000000000000000010000000100000000000000001000002400000001000000feffffff0000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff")
95         self.assertSequenceEqual(
96             GOST34112012256(m).hexdigest(),
97             "c766085540caaa8953bfcf7a1ba220619cee50d65dc242f82f23ba4b180b18e0",
98         )
99
100
101 class TestPBKDF2(TestCase):
102     """http://tc26.ru/.../R_50.1.111-2016.pdf
103     """
104     def test_1(self):
105         self.assertSequenceEqual(
106             hexenc(pbkdf2(b"password", b"salt", 1, 64)),
107             "64770af7f748c3b1c9ac831dbcfd85c26111b30a8a657ddc3056b80ca73e040d2854fd36811f6d825cc4ab66ec0a68a490a9e5cf5156b3a2b7eecddbf9a16b47",
108         )
109
110     def test_2(self):
111         self.assertSequenceEqual(
112             hexenc(pbkdf2(b"password", b"salt", 2, 64)),
113             "5a585bafdfbb6e8830d6d68aa3b43ac00d2e4aebce01c9b31c2caed56f0236d4d34b2b8fbd2c4e89d54d46f50e47d45bbac301571743119e8d3c42ba66d348de",
114         )
115
116     def test_3(self):
117         self.assertSequenceEqual(
118             hexenc(pbkdf2(b"password", b"salt", 4096, 64)),
119             "e52deb9a2d2aaff4e2ac9d47a41f34c20376591c67807f0477e32549dc341bc7867c09841b6d58e29d0347c996301d55df0d34e47cf68f4e3c2cdaf1d9ab86c3",
120         )
121
122     @skip("it takes too long")
123     def test_4(self):
124         self.assertSequenceEqual(
125             hexenc(pbkdf2(b"password", b"salt", 1677216, 64)),
126             "49e4843bba76e300afe24c4d23dc7392def12f2c0e244172367cd70a8982ac361adb601c7e2a314e8cb7b1e9df840e36ab5615be5d742b6cf203fb55fdc48071",
127         )
128
129     def test_5(self):
130         self.assertSequenceEqual(
131             hexenc(pbkdf2(
132                 b"passwordPASSWORDpassword",
133                 b"saltSALTsaltSALTsaltSALTsaltSALTsalt",
134                 4096,
135                 100,
136             )),
137             "b2d8f1245fc4d29274802057e4b54e0a0753aa22fc53760b301cf008679e58fe4bee9addcae99ba2b0b20f431a9c5e50f395c89387d0945aedeca6eb4015dfc2bd2421ee9bb71183ba882ceebfef259f33f9e27dc6178cb89dc37428cf9cc52a2baa2d3a",
138         )
139
140     def test_6(self):
141         self.assertSequenceEqual(
142             hexenc(pbkdf2(b"pass\x00word", b"sa\x00lt", 4096, 64)),
143             "50df062885b69801a3c10248eb0a27ab6e522ffeb20c991c660f001475d73a4e167f782c18e97e92976d9c1d970831ea78ccb879f67068cdac1910740844e830",
144         )