]> Cypherpunks.ru repositories - pygost.git/blob - pygost/test_pfx.py
6f066431eda3f5e32a244ebded8132ea060be82c
[pygost.git] / pygost / test_pfx.py
1 # coding: utf-8
2 # PyGOST -- Pure Python GOST cryptographic functions library
3 # Copyright (C) 2015-2020 Sergey Matveev <stargrave@stargrave.org>
4 #
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU General Public License as published by
7 # the Free Software Foundation, version 3 of the License.
8 #
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
12 # GNU General Public License for more details.
13 #
14 # You should have received a copy of the GNU General Public License
15 # along with this program.  If not, see <http://www.gnu.org/licenses/>.
16
17 from base64 import b64decode
18 from hmac import new as hmac_new
19 from unittest import skipIf
20 from unittest import TestCase
21
22 from pygost.gost28147 import cfb_decrypt
23 from pygost.gost34112012512 import GOST34112012512
24 from pygost.gost34112012512 import pbkdf2 as gost34112012_pbkdf2
25
26
27 try:
28     from pygost.asn1schemas.pfx import OctetStringSafeContents
29     from pygost.asn1schemas.pfx import PFX
30     from pygost.asn1schemas.pfx import PKCS8ShroudedKeyBag
31     from pygost.asn1schemas.pfx import SafeContents
32 except ImportError:
33     pyderasn_exists = False
34 else:
35     pyderasn_exists = True
36
37
38 @skipIf(not pyderasn_exists, "PyDERASN dependency is required")
39 class TestPFX(TestCase):
40     """PFX test vectors from "Транспортный ключевой контейнер" (R50.1.112-2016.pdf)
41     """
42     pfx_raw = b64decode("""
43 MIIFqgIBAzCCBSsGCSqGSIb3DQEHAaCCBRwEggUYMIIFFDCCASIGCSqGSIb3DQEH
44 AaCCARMEggEPMIIBCzCCAQcGCyqGSIb3DQEMCgECoIHgMIHdMHEGCSqGSIb3DQEF
45 DTBkMEEGCSqGSIb3DQEFDDA0BCD5qZr0TTIsBvdgUoq/zFwOzdyJohj6/4Wiyccg
46 j9AK/QICB9AwDAYIKoUDBwEBBAIFADAfBgYqhQMCAhUwFQQI3Ip/Vp0IsyIGCSqF
47 AwcBAgUBAQRoSfLhgx9s/zn+BjnhT0ror07vS55Ys5hgvVpWDx4mXGWWyez/2sMc
48 aFgSr4H4UTGGwoMynGLpF1IOVo+bGJ0ePqHB+gS5OL9oV+PUmZ/ELrRENKlCDqfY
49 WvpSystX29CvCFrnTnDsbBYxFTATBgkqhkiG9w0BCRUxBgQEAQAAADCCA+oGCSqG
50 SIb3DQEHBqCCA9swggPXAgEAMIID0AYJKoZIhvcNAQcBMHEGCSqGSIb3DQEFDTBk
51 MEEGCSqGSIb3DQEFDDA0BCCJTJLZQRi1WIpQHzyjXbq7+Vw2+1280C45x8ff6kMS
52 VAICB9AwDAYIKoUDBwEBBAIFADAfBgYqhQMCAhUwFQQIxepowwvS11MGCSqFAwcB
53 AgUBAYCCA06n09P/o+eDEKoSWpvlpOLKs7dKmVquKzJ81nCngvLQ5fEWL1WkxwiI
54 rEhm53JKLD0wy4hekalEk011Bvc51XP9gkDkmaoBpnV/TyKIY35wl6ATfeGXno1M
55 KoA+Ktdhv4gLnz0k2SXdkUj11JwYskXue+REA0p4m2ZsoaTmvoODamh9JeY/5Qjy
56 Xe58CGnyXFzX3eU86qs4WfdWdS3NzYYOk9zzVl46le9u79O/LnW2j4n2of/Jpk/L
57 YjrRmz5oYeQOqKOKhEyhpO6e+ejr6laduEv7TwJQKRNiygogbVvkNn3VjHTSOUG4
58 W+3NRPhjb0jD9obdyx6MWa6O3B9bUzFMNav8/gYn0vTDxqXMLy/92oTngNrVx6Gc
59 cNl128ISrDS6+RxtAMiEBRK6xNkemqX5yNXG5GrLQQFGP6mbs2nNpjKlgj3pljmX
60 Eky2/G78XiJrv02OgGs6CKnI9nMpa6N7PBHV34MJ6EZzWOWDRQ420xk63mnicrs0
61 WDVJ0xjdu4FW3iEk02EaiRTvGBpa6GL7LBp6QlaXSSwONx725cyRsL9cTlukqXER
62 WHDlMpjYLbkGZRrCc1myWgEfsputfSIPNF/oLv9kJNWacP3uuDOfecg3us7eg2OA
63 xo5zrYfn39GcBMF1WHAYRO/+PnJb9jrDuLAE8+ONNqjNulWNK9CStEhb6Te+yE6q
64 oeP6hJjFLi+nFLE9ymIo0A7gLQD5vzFvl+7v1ZNVnQkwRUsWoRiEVVGnv3Z1iZU6
65 xStxgoHMl62V/P5cz4dr9vJM2adEWNZcVXl6mk1H8DRc1sRGnvs2l237oKWRVntJ
66 hoWnZ8qtD+3ZUqsX79QhVzUQBzKuBt6jwNhaHLGl5B+Or/zA9FezsOh6+Uc+fZaV
67 W7fFfeUyWwGy90XD3ybTrjzep9f3nt55Z2c+fu2iEwhoyImWLuC3+CVhf9Af59j9
68 8/BophMJuATDJEtgi8rt4vLnfxKu250Mv2ZpbfF69EGTgFYbwc55zRfaUG9zlyCu
69 1YwMJ6HC9FUVtJp9gObSrirbzTH7mVaMjQkBLotazWbegzI+be8V3yT06C+ehD+2
70 GdLWAVs9hp8gPHEUShb/XrgPpDSJmFlOiyeOFBO/j4edDACKqVcwdjBOMAoGCCqF
71 AwcBAQIDBEAIFX0fyZe20QKKhWm6WYX+S92Gt6zaXroXOvAmayzLfZ5Sd9C2t9zZ
72 JSg6M8RBUYpw/8ym5ou1o2nDa09M5zF3BCCpzyCQBI+rzfISeKvPV1ROfcXiYU93
73 mwcl1xQV2G5/fgICB9A=
74     """)
75     password = u"Пароль для PFX"
76
77     def test_shrouded_key_bag(self):
78         private_key_info_expected = b64decode(b"""
79 MGYCAQAwHwYIKoUDBwEBAQEwEwYHKoUDAgIjAQYIKoUDBwEBAgIEQEYbRu86z+1JFKDcPDN9UbTG
80 G2ki9enTqos4KpUU0j9IDpl1UXiaA1YDIwUjlAp+81GkLmyt8Fw6Gt/X5JZySAY=
81         """)
82
83         pfx, tail = PFX().decode(self.pfx_raw)
84         self.assertSequenceEqual(tail, b"")
85         _, outer_safe_contents = pfx["authSafe"]["content"].defined
86         safe_contents, tail = OctetStringSafeContents().decode(
87             bytes(outer_safe_contents[0]["bagValue"]),
88         )
89         self.assertSequenceEqual(tail, b"")
90         safe_bag = safe_contents[0]
91         shrouded_key_bag, tail = PKCS8ShroudedKeyBag().decode(
92             bytes(safe_bag["bagValue"]),
93         )
94         self.assertSequenceEqual(tail, b"")
95         _, pbes2_params = shrouded_key_bag["encryptionAlgorithm"]["parameters"].defined
96         _, pbkdf2_params = pbes2_params["keyDerivationFunc"]["parameters"].defined
97         _, enc_scheme_params = pbes2_params["encryptionScheme"]["parameters"].defined
98
99         key = gost34112012_pbkdf2(
100             password=self.password.encode("utf-8"),
101             salt=bytes(pbkdf2_params["salt"]["specified"]),
102             iterations=int(pbkdf2_params["iterationCount"]),
103             dklen=32,
104         )
105         # key = hexdec("309dd0354c5603739403f2335e9e2055138f8b5c98b63009de0635eea1fd7ba8")
106         self.assertSequenceEqual(
107             cfb_decrypt(
108                 key,
109                 bytes(shrouded_key_bag["encryptedData"]),
110                 iv=bytes(enc_scheme_params["iv"]),
111                 sbox="id-tc26-gost-28147-param-Z",
112             ),
113             private_key_info_expected,
114         )
115
116     def test_encrypted_data(self):
117         cert_bag_expected = b64decode(b"""
118 MIIDSjCCA0YGCyqGSIb3DQEMCgEDoIIDHjCCAxoGCiqGSIb3DQEJFgGgggMKBIIDBjCCAwIwggKt
119 oAMCAQICEAHQaF8xH5bAAAAACycJAAEwDAYIKoUDBwEBAwIFADBgMQswCQYDVQQGEwJSVTEVMBMG
120 A1UEBwwM0JzQvtGB0LrQstCwMQ8wDQYDVQQKDAbQotCaMjYxKTAnBgNVBAMMIENBIGNlcnRpZmlj
121 YXRlIChQS0NTIzEyIGV4YW1wbGUpMB4XDTE1MDMyNzA3MjUwMFoXDTIwMDMyNzA3MjMwMFowZDEL
122 MAkGA1UEBhMCUlUxFTATBgNVBAcMDNCc0L7RgdC60LLQsDEPMA0GA1UECgwG0KLQmjI2MS0wKwYD
123 VQQDDCRUZXN0IGNlcnRpZmljYXRlIDEgKFBLQ1MjMTIgZXhhbXBsZSkwZjAfBggqhQMHAQEBATAT
124 BgcqhQMCAiMBBggqhQMHAQECAgNDAARA1xzymkpvr2dYJT8WTOX3Dt96/+hGsXNytUQpkWB5ImJM
125 4tg9AsC4RIUwV5H41MhG0uBRFweTzN6AsAdBvhTClYEJADI3MDkwMDAxo4IBKTCCASUwKwYDVR0Q
126 BCQwIoAPMjAxNTAzMjcwNzI1MDBagQ8yMDE2MDMyNzA3MjUwMFowDgYDVR0PAQH/BAQDAgTwMB0G
127 A1UdDgQWBBQhWOsRQ68yYN2Utg/owHoWcqsVbTAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUH
128 AwQwDAYDVR0TAQH/BAIwADCBmQYDVR0jBIGRMIGOgBQmnc7Xh5ykb5t/BMwOkxA4drfEmqFkpGIw
129 YDELMAkGA1UEBhMCUlUxFTATBgNVBAcMDNCc0L7RgdC60LLQsDEPMA0GA1UECgwG0KLQmjI2MSkw
130 JwYDVQQDDCBDQSBjZXJ0aWZpY2F0ZSAoUEtDUyMxMiBleGFtcGxlKYIQAdBoXvL8TSAAAAALJwkA
131 ATAMBggqhQMHAQEDAgUAA0EA9oq0Vvk8kkgIwkp0x0J5eKtia4MNTiwKAm7jgnCZIx3O98BThaTX
132 3ZQhEo2RL9pTCPr6wFMheeJ+YdGMReXvsjEVMBMGCSqGSIb3DQEJFTEGBAQBAAAA
133         """)
134
135         pfx, tail = PFX().decode(self.pfx_raw)
136         self.assertSequenceEqual(tail, b"")
137         _, outer_safe_contents = pfx["authSafe"]["content"].defined
138         _, encrypted_data = outer_safe_contents[1]["bagValue"].defined
139         _, pbes2_params = encrypted_data["encryptedContentInfo"]["contentEncryptionAlgorithm"]["parameters"].defined
140         _, pbkdf2_params = pbes2_params["keyDerivationFunc"]["parameters"].defined
141         _, enc_scheme_params = pbes2_params["encryptionScheme"]["parameters"].defined
142         key = gost34112012_pbkdf2(
143             password=self.password.encode("utf-8"),
144             salt=bytes(pbkdf2_params["salt"]["specified"]),
145             iterations=int(pbkdf2_params["iterationCount"]),
146             dklen=32,
147         )
148         # key = hexdec("0e93d71339e7f53b79a0bc41f9109dd4fb60b30ae10736c1bb77b84c07681cfc")
149         self.assertSequenceEqual(
150             cfb_decrypt(
151                 key,
152                 bytes(encrypted_data["encryptedContentInfo"]["encryptedContent"]),
153                 iv=bytes(enc_scheme_params["iv"]),
154                 sbox="id-tc26-gost-28147-param-Z",
155             ),
156             cert_bag_expected,
157         )
158
159     def test_mac(self):
160         pfx, tail = PFX().decode(self.pfx_raw)
161         self.assertSequenceEqual(tail, b"")
162         _, outer_safe_contents = pfx["authSafe"]["content"].defined
163         mac_data = pfx["macData"]
164         mac_key = gost34112012_pbkdf2(
165             password=self.password.encode("utf-8"),
166             salt=bytes(mac_data["macSalt"]),
167             iterations=int(mac_data["iterations"]),
168             dklen=96,
169         )[-32:]
170         # mac_key = hexdec("cadbfbf3bceaa9b79f651508fac5abbeb4a13d0bd0e1876bd3c3efb2112128a5")
171         self.assertSequenceEqual(
172             hmac_new(
173                 key=mac_key,
174                 msg=SafeContents(outer_safe_contents).encode(),
175                 digestmod=GOST34112012512,
176             ).digest(),
177             bytes(mac_data["mac"]["digest"]),
178         )