]> Cypherpunks.ru repositories - pygost.git/blob - pygost/test_pfx.py
Forbid any later GNU GPL versions autousage
[pygost.git] / pygost / test_pfx.py
1 # coding: utf-8
2 # PyGOST -- Pure Python GOST cryptographic functions library
3 # Copyright (C) 2015-2019 Sergey Matveev <stargrave@stargrave.org>
4 #
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU General Public License as published by
7 # the Free Software Foundation, version 3 of the License.
8 #
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
12 # GNU General Public License for more details.
13 #
14 # You should have received a copy of the GNU General Public License
15 # along with this program.  If not, see <http://www.gnu.org/licenses/>.
16
17 from base64 import b64decode
18 from hmac import new as hmac_new
19 from unittest import skipIf
20 from unittest import TestCase
21
22 from pygost.gost28147 import cfb_decrypt
23 from pygost.gost34112012512 import GOST34112012512
24 from pygost.gost34112012512 import pbkdf2 as gost34112012_pbkdf2
25 from pygost.utils import hexdec
26
27
28 try:
29     from pygost.asn1schemas.pfx import OctetStringSafeContents
30     from pygost.asn1schemas.pfx import PFX
31     from pygost.asn1schemas.pfx import PKCS8ShroudedKeyBag
32     from pygost.asn1schemas.pfx import SafeContents
33 except ImportError:
34     pyderasn_exists = False
35 else:
36     pyderasn_exists = True
37
38
39 @skipIf(not pyderasn_exists, "PyDERASN dependency is required")
40 class TestPFX(TestCase):
41     """PFX test vectors from "Транспортный ключевой контейнер" (R50.1.112-2016.pdf)
42     """
43     pfx_raw = b64decode("""
44 MIIFqgIBAzCCBSsGCSqGSIb3DQEHAaCCBRwEggUYMIIFFDCCASIGCSqGSIb3DQEH
45 AaCCARMEggEPMIIBCzCCAQcGCyqGSIb3DQEMCgECoIHgMIHdMHEGCSqGSIb3DQEF
46 DTBkMEEGCSqGSIb3DQEFDDA0BCD5qZr0TTIsBvdgUoq/zFwOzdyJohj6/4Wiyccg
47 j9AK/QICB9AwDAYIKoUDBwEBBAIFADAfBgYqhQMCAhUwFQQI3Ip/Vp0IsyIGCSqF
48 AwcBAgUBAQRoSfLhgx9s/zn+BjnhT0ror07vS55Ys5hgvVpWDx4mXGWWyez/2sMc
49 aFgSr4H4UTGGwoMynGLpF1IOVo+bGJ0ePqHB+gS5OL9oV+PUmZ/ELrRENKlCDqfY
50 WvpSystX29CvCFrnTnDsbBYxFTATBgkqhkiG9w0BCRUxBgQEAQAAADCCA+oGCSqG
51 SIb3DQEHBqCCA9swggPXAgEAMIID0AYJKoZIhvcNAQcBMHEGCSqGSIb3DQEFDTBk
52 MEEGCSqGSIb3DQEFDDA0BCCJTJLZQRi1WIpQHzyjXbq7+Vw2+1280C45x8ff6kMS
53 VAICB9AwDAYIKoUDBwEBBAIFADAfBgYqhQMCAhUwFQQIxepowwvS11MGCSqFAwcB
54 AgUBAYCCA06n09P/o+eDEKoSWpvlpOLKs7dKmVquKzJ81nCngvLQ5fEWL1WkxwiI
55 rEhm53JKLD0wy4hekalEk011Bvc51XP9gkDkmaoBpnV/TyKIY35wl6ATfeGXno1M
56 KoA+Ktdhv4gLnz0k2SXdkUj11JwYskXue+REA0p4m2ZsoaTmvoODamh9JeY/5Qjy
57 Xe58CGnyXFzX3eU86qs4WfdWdS3NzYYOk9zzVl46le9u79O/LnW2j4n2of/Jpk/L
58 YjrRmz5oYeQOqKOKhEyhpO6e+ejr6laduEv7TwJQKRNiygogbVvkNn3VjHTSOUG4
59 W+3NRPhjb0jD9obdyx6MWa6O3B9bUzFMNav8/gYn0vTDxqXMLy/92oTngNrVx6Gc
60 cNl128ISrDS6+RxtAMiEBRK6xNkemqX5yNXG5GrLQQFGP6mbs2nNpjKlgj3pljmX
61 Eky2/G78XiJrv02OgGs6CKnI9nMpa6N7PBHV34MJ6EZzWOWDRQ420xk63mnicrs0
62 WDVJ0xjdu4FW3iEk02EaiRTvGBpa6GL7LBp6QlaXSSwONx725cyRsL9cTlukqXER
63 WHDlMpjYLbkGZRrCc1myWgEfsputfSIPNF/oLv9kJNWacP3uuDOfecg3us7eg2OA
64 xo5zrYfn39GcBMF1WHAYRO/+PnJb9jrDuLAE8+ONNqjNulWNK9CStEhb6Te+yE6q
65 oeP6hJjFLi+nFLE9ymIo0A7gLQD5vzFvl+7v1ZNVnQkwRUsWoRiEVVGnv3Z1iZU6
66 xStxgoHMl62V/P5cz4dr9vJM2adEWNZcVXl6mk1H8DRc1sRGnvs2l237oKWRVntJ
67 hoWnZ8qtD+3ZUqsX79QhVzUQBzKuBt6jwNhaHLGl5B+Or/zA9FezsOh6+Uc+fZaV
68 W7fFfeUyWwGy90XD3ybTrjzep9f3nt55Z2c+fu2iEwhoyImWLuC3+CVhf9Af59j9
69 8/BophMJuATDJEtgi8rt4vLnfxKu250Mv2ZpbfF69EGTgFYbwc55zRfaUG9zlyCu
70 1YwMJ6HC9FUVtJp9gObSrirbzTH7mVaMjQkBLotazWbegzI+be8V3yT06C+ehD+2
71 GdLWAVs9hp8gPHEUShb/XrgPpDSJmFlOiyeOFBO/j4edDACKqVcwdjBOMAoGCCqF
72 AwcBAQIDBEAIFX0fyZe20QKKhWm6WYX+S92Gt6zaXroXOvAmayzLfZ5Sd9C2t9zZ
73 JSg6M8RBUYpw/8ym5ou1o2nDa09M5zF3BCCpzyCQBI+rzfISeKvPV1ROfcXiYU93
74 mwcl1xQV2G5/fgICB9A=
75     """)
76     password = u'Пароль для PFX'
77
78     def test_shrouded_key_bag(self):
79         private_key_info_expected = b64decode(b"""
80 MGYCAQAwHwYIKoUDBwEBAQEwEwYHKoUDAgIjAQYIKoUDBwEBAgIEQEYbRu86z+1JFKDcPDN9UbTG
81 G2ki9enTqos4KpUU0j9IDpl1UXiaA1YDIwUjlAp+81GkLmyt8Fw6Gt/X5JZySAY=
82         """)
83
84         pfx, tail = PFX().decode(self.pfx_raw)
85         self.assertSequenceEqual(tail, b"")
86         _, outer_safe_contents = pfx["authSafe"]["content"].defined
87         safe_contents, tail = OctetStringSafeContents().decode(
88             bytes(outer_safe_contents[0]["bagValue"]),
89         )
90         self.assertSequenceEqual(tail, b"")
91         safe_bag = safe_contents[0]
92         shrouded_key_bag, tail = PKCS8ShroudedKeyBag().decode(
93             bytes(safe_bag["bagValue"]),
94         )
95         self.assertSequenceEqual(tail, b"")
96         _, pbes2_params = shrouded_key_bag["encryptionAlgorithm"]["parameters"].defined
97         _, pbkdf2_params = pbes2_params["keyDerivationFunc"]["parameters"].defined
98         _, enc_scheme_params = pbes2_params["encryptionScheme"]["parameters"].defined
99
100         key = gost34112012_pbkdf2(
101             password=self.password.encode("utf-8"),
102             salt=bytes(pbkdf2_params["salt"]["specified"]),
103             iterations=int(pbkdf2_params["iterationCount"]),
104             dklen=32,
105         )
106         # key = hexdec("309dd0354c5603739403f2335e9e2055138f8b5c98b63009de0635eea1fd7ba8")
107         self.assertSequenceEqual(
108             cfb_decrypt(
109                 key,
110                 bytes(shrouded_key_bag["encryptedData"]),
111                 iv=bytes(enc_scheme_params["iv"]),
112                 sbox="id-tc26-gost-28147-param-Z",
113             ),
114             private_key_info_expected,
115         )
116
117     def test_encrypted_data(self):
118         cert_bag_expected = b64decode(b"""
119 MIIDSjCCA0YGCyqGSIb3DQEMCgEDoIIDHjCCAxoGCiqGSIb3DQEJFgGgggMKBIIDBjCCAwIwggKt
120 oAMCAQICEAHQaF8xH5bAAAAACycJAAEwDAYIKoUDBwEBAwIFADBgMQswCQYDVQQGEwJSVTEVMBMG
121 A1UEBwwM0JzQvtGB0LrQstCwMQ8wDQYDVQQKDAbQotCaMjYxKTAnBgNVBAMMIENBIGNlcnRpZmlj
122 YXRlIChQS0NTIzEyIGV4YW1wbGUpMB4XDTE1MDMyNzA3MjUwMFoXDTIwMDMyNzA3MjMwMFowZDEL
123 MAkGA1UEBhMCUlUxFTATBgNVBAcMDNCc0L7RgdC60LLQsDEPMA0GA1UECgwG0KLQmjI2MS0wKwYD
124 VQQDDCRUZXN0IGNlcnRpZmljYXRlIDEgKFBLQ1MjMTIgZXhhbXBsZSkwZjAfBggqhQMHAQEBATAT
125 BgcqhQMCAiMBBggqhQMHAQECAgNDAARA1xzymkpvr2dYJT8WTOX3Dt96/+hGsXNytUQpkWB5ImJM
126 4tg9AsC4RIUwV5H41MhG0uBRFweTzN6AsAdBvhTClYEJADI3MDkwMDAxo4IBKTCCASUwKwYDVR0Q
127 BCQwIoAPMjAxNTAzMjcwNzI1MDBagQ8yMDE2MDMyNzA3MjUwMFowDgYDVR0PAQH/BAQDAgTwMB0G
128 A1UdDgQWBBQhWOsRQ68yYN2Utg/owHoWcqsVbTAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUH
129 AwQwDAYDVR0TAQH/BAIwADCBmQYDVR0jBIGRMIGOgBQmnc7Xh5ykb5t/BMwOkxA4drfEmqFkpGIw
130 YDELMAkGA1UEBhMCUlUxFTATBgNVBAcMDNCc0L7RgdC60LLQsDEPMA0GA1UECgwG0KLQmjI2MSkw
131 JwYDVQQDDCBDQSBjZXJ0aWZpY2F0ZSAoUEtDUyMxMiBleGFtcGxlKYIQAdBoXvL8TSAAAAALJwkA
132 ATAMBggqhQMHAQEDAgUAA0EA9oq0Vvk8kkgIwkp0x0J5eKtia4MNTiwKAm7jgnCZIx3O98BThaTX
133 3ZQhEo2RL9pTCPr6wFMheeJ+YdGMReXvsjEVMBMGCSqGSIb3DQEJFTEGBAQBAAAA
134         """)
135
136         pfx, tail = PFX().decode(self.pfx_raw)
137         self.assertSequenceEqual(tail, b"")
138         _, outer_safe_contents = pfx["authSafe"]["content"].defined
139         _, encrypted_data = outer_safe_contents[1]["bagValue"].defined
140         _, pbes2_params = encrypted_data["encryptedContentInfo"]["contentEncryptionAlgorithm"]["parameters"].defined
141         _, pbkdf2_params = pbes2_params["keyDerivationFunc"]["parameters"].defined
142         _, enc_scheme_params = pbes2_params["encryptionScheme"]["parameters"].defined
143         key = gost34112012_pbkdf2(
144             password=self.password.encode("utf-8"),
145             salt=bytes(pbkdf2_params["salt"]["specified"]),
146             iterations=int(pbkdf2_params["iterationCount"]),
147             dklen=32,
148         )
149         # key = hexdec("0e93d71339e7f53b79a0bc41f9109dd4fb60b30ae10736c1bb77b84c07681cfc")
150         self.assertSequenceEqual(
151             cfb_decrypt(
152                 key,
153                 bytes(encrypted_data["encryptedContentInfo"]["encryptedContent"]),
154                 iv=bytes(enc_scheme_params["iv"]),
155                 sbox="id-tc26-gost-28147-param-Z",
156             ),
157             cert_bag_expected,
158         )
159
160     def test_mac(self):
161         pfx, tail = PFX().decode(self.pfx_raw)
162         self.assertSequenceEqual(tail, b"")
163         _, outer_safe_contents = pfx["authSafe"]["content"].defined
164         mac_data = pfx["macData"]
165         mac_key = gost34112012_pbkdf2(
166             password=self.password.encode('utf-8'),
167             salt=bytes(mac_data["macSalt"]),
168             iterations=int(mac_data["iterations"]),
169             dklen=96,
170         )[-32:]
171         # mac_key = hexdec("cadbfbf3bceaa9b79f651508fac5abbeb4a13d0bd0e1876bd3c3efb2112128a5")
172         self.assertSequenceEqual(
173             hmac_new(
174                 key=mac_key,
175                 msg=SafeContents(outer_safe_contents).encode(),
176                 digestmod=GOST34112012512,
177             ).digest(),
178             bytes(mac_data["mac"]["digest"]),
179         )