Exemple #1
0
def testValidSecp256k1Delete(client):
    cryptoScheme = "secp256k1"

    vk, sk, did, body = genOtpBlob(crypto=cryptoScheme)
    url = "{0}/{1}".format(BLOB_BASE_PATH, did)

    signature = ecdsa.signResource(body, sk)
    headers = {
        "Signature": 'name="{0}"; signer="{1}"'.format(cryptoScheme, signature)
    }

    client.simulate_post(BLOB_BASE_PATH, body=body,
                         headers=headers)  # Add did to database

    data = json.dumps({"id": did}, ensure_ascii=False).encode()
    headers = {
        "Signature":
        'name="{0}"; signer="{1}"'.format(cryptoScheme,
                                          ecdsa.signResource(data, sk))
    }
    response = client.simulate_delete(url, body=data, headers=headers)

    resp_content = json.loads(response.content)

    assert response.status == falcon.HTTP_200
    assert resp_content["deleted"]["otp_data"] == json.loads(body)
    assert resp_content["deleted"]["signatures"]["signer"] == signature
Exemple #2
0
def testVerify64u():
    resource = "message"
    vk, sk = ecdsa.generateByteKeys()
    vk = bytesToStr64u(vk)
    signature = ecdsa.signResource(resource.encode(), sk)

    assert ecdsa.verify64u(signature, resource, vk)
Exemple #3
0
def testVerify():
    resource = b"message"
    vk, sk = ecdsa.generateByteKeys()
    vk = keys.VerifyingKey.from_string(vk, curves.SECP256k1)
    signature = str64uToBytes(ecdsa.signResource(resource, sk))

    assert ecdsa.verify(signature, resource, vk)
Exemple #4
0
def testInvalidEcdsaPostSig(client):
    cryptoScheme = "ECDSA"

    vk, sk, did, body = genOtpBlob(crypto=cryptoScheme)

    signature = ecdsa.signResource(body, sk)
    headers = {
        "Signature": 'name="{0}"; signer="{1}"'.format(cryptoScheme, signature)
    }

    body = json.loads(body)
    body['changed'] = "2000-01-01T11:11:11+11:11"

    exp_result = {
        "title":
        "Authorization Error",
        "description":
        "Could not validate the request signature for signer field. Unverifiable signature."
    }

    verifyRequest(client.simulate_post,
                  BLOB_BASE_PATH,
                  body,
                  headers=headers,
                  exp_status=falcon.HTTP_401,
                  exp_result=exp_result)
Exemple #5
0
def testSignResource():
    resource = b"message"
    vk, sk = ecdsa.generateByteKeys()

    signature = ecdsa.signResource(resource, sk)

    assert str(signature) == signature
    assert len(signature) == 88
    assert len(str64uToBytes(signature)) == 64
Exemple #6
0
def testInvalidSecp256k1PutSig(client):
    cryptoScheme = "secp256k1"

    vk, sk, did, body = genOtpBlob(crypto=cryptoScheme)

    signature = ecdsa.signResource(body, sk)
    headers = {
        "Signature": 'name="{0}"; signer="{1}"'.format(cryptoScheme, signature)
    }

    verifyRequest(client.simulate_post,
                  BLOB_BASE_PATH,
                  json.loads(body),
                  headers=headers,
                  exp_status=falcon.HTTP_201)

    body = json.loads(body)
    body['changed'] = "2000-01-01T00:00:01+00:00"

    signature = ecdsa.signResource(json.dumps(body).encode(), sk)
    headers = {
        "Signature": 'name="{0}"; signer="{1}"'.format(cryptoScheme, signature)
    }

    # Invalidate Signature
    body['changed'] = "2000-01-01T11:11:11+11:11"

    exp_result = {
        "title":
        "Authorization Error",
        "description":
        "Could not validate the request signature for signer field. Unverifiable signature."
    }

    verifyRequest(client.simulate_put,
                  "{0}/{1}".format(BLOB_BASE_PATH, did),
                  body,
                  headers=headers,
                  exp_status=falcon.HTTP_401,
                  exp_result=exp_result)
Exemple #7
0
def testValidSecp256k1Put(client):
    cryptoScheme = "secp256k1"

    vk, sk, did, body = genOtpBlob(crypto=cryptoScheme)

    signature = ecdsa.signResource(body, sk)
    headers = {
        "Signature": 'name="{0}"; signer="{1}"'.format(cryptoScheme, signature)
    }

    verifyRequest(client.simulate_post,
                  BLOB_BASE_PATH,
                  json.loads(body),
                  headers=headers,
                  exp_status=falcon.HTTP_201)

    body = json.loads(body)
    body['changed'] = "2000-01-01T00:00:01+00:00"

    signature = ecdsa.signResource(json.dumps(body).encode(), sk)
    headers = {
        "Signature": 'name="{0}"; signer="{1}"'.format(cryptoScheme, signature)
    }

    exp_result = {
        "otp_data": body,
        "signatures": {
            "name": cryptoScheme,
            "signer": signature
        }
    }

    verifyRequest(client.simulate_put,
                  "{0}/{1}".format(BLOB_BASE_PATH, did),
                  body,
                  headers=headers,
                  exp_status=falcon.HTTP_200,
                  exp_result=exp_result)
Exemple #8
0
def testValidSecp256k1Post(client):
    cryptoScheme = "secp256k1"

    vk, sk, did, body = genOtpBlob(crypto=cryptoScheme)

    signature = ecdsa.signResource(body, sk)
    headers = {
        "Signature": 'name="{0}"; signer="{1}"'.format(cryptoScheme, signature)
    }

    exp_result = {
        "otp_data": json.loads(body),
        "signatures": {
            "name": cryptoScheme,
            "signer": signature
        }
    }

    verifyRequest(client.simulate_post,
                  BLOB_BASE_PATH,
                  json.loads(body),
                  headers=headers,
                  exp_status=falcon.HTTP_201,
                  exp_result=exp_result)