def test_setter_getter(self): content = EncryptedContent() self.assertEqual(content.getAlgorithmType(), None) self.assertTrue(content.getPayload().isNull()) self.assertTrue(content.getInitialVector().isNull()) self.assertEqual(content.getKeyLocator().getType(), None) content.setAlgorithmType(EncryptAlgorithmType.RsaOaep) self.assertEqual(content.getAlgorithmType(), EncryptAlgorithmType.RsaOaep) self.assertTrue(content.getPayload().isNull()) self.assertTrue(content.getInitialVector().isNull()) self.assertEqual(content.getKeyLocator().getType(), None) keyLocator = KeyLocator() keyLocator.setType(KeyLocatorType.KEYNAME) keyLocator.getKeyName().set("/test/key/locator") content.setKeyLocator(keyLocator) self.assertTrue(content.getKeyLocator().getType() != None) self.assertTrue(content.getKeyLocator().getKeyName().equals( Name("/test/key/locator"))) self.assertTrue(content.getPayload().isNull()) self.assertTrue(content.getInitialVector().isNull()) content.setPayload(Blob(message, False)) self.assertTrue(content.getPayload().equals(Blob(message, False))) content.setInitialVector(Blob(iv, False)) self.assertTrue(content.getInitialVector().equals(Blob(iv, False))) encoded = content.wireEncode() contentBlob = Blob(encrypted, False) self.assertTrue(contentBlob.equals(encoded))
def test_create_d_key_data(self): # Create the group manager. manager = GroupManager( Name("Alice"), Name("data_type"), Sqlite3GroupManagerDb(self.dKeyDatabaseFilePath), 2048, 1, self.keyChain) newCertificateBlob = self.certificate.wireEncode() newCertificate = IdentityCertificate() newCertificate.wireDecode(newCertificateBlob) # Encrypt the D-KEY. data = manager._createDKeyData( "20150825T000000", "20150827T000000", Name("/ndn/memberA/KEY"), self.decryptKeyBlob, newCertificate.getPublicKeyInfo().getKeyDer()) # Verify the encrypted D-KEY. dataContent = data.getContent() # Get the nonce key. # dataContent is a sequence of the two EncryptedContent. encryptedNonce = EncryptedContent() encryptedNonce.wireDecode(dataContent) self.assertEqual(0, encryptedNonce.getInitialVector().size()) self.assertEqual(EncryptAlgorithmType.RsaOaep, encryptedNonce.getAlgorithmType()) blobNonce = encryptedNonce.getPayload() decryptParams = EncryptParams(EncryptAlgorithmType.RsaOaep) nonce = RsaAlgorithm.decrypt(self.decryptKeyBlob, blobNonce, decryptParams) # Get the D-KEY. # Use the size of encryptedNonce to find the start of encryptedPayload. payloadContent = dataContent.buf()[encryptedNonce.wireEncode().size():] encryptedPayload = EncryptedContent() encryptedPayload.wireDecode(payloadContent) self.assertEqual(16, encryptedPayload.getInitialVector().size()) self.assertEqual(EncryptAlgorithmType.AesCbc, encryptedPayload.getAlgorithmType()) decryptParams.setAlgorithmType(EncryptAlgorithmType.AesCbc) decryptParams.setInitialVector(encryptedPayload.getInitialVector()) blobPayload = encryptedPayload.getPayload() largePayload = AesAlgorithm.decrypt(nonce, blobPayload, decryptParams) self.assertTrue(largePayload.equals(self.decryptKeyBlob))
def test_content_asymmetric_encrypt_large(self): for input in encryptorRsaTestInputs: largeContent = Blob(bytearray([ 0x73, 0x5a, 0xbd, 0x47, 0x0c, 0xfe, 0xf8, 0x7d, 0x2e, 0x17, 0xaa, 0x11, 0x6f, 0x23, 0xc5, 0x10, 0x23, 0x36, 0x88, 0xc4, 0x2a, 0x0f, 0x9a, 0x72, 0x54, 0x31, 0xa8, 0xb3, 0x51, 0x18, 0x9f, 0x0e, 0x1b, 0x93, 0x62, 0xd9, 0xc4, 0xf5, 0xf4, 0x3d, 0x61, 0x9a, 0xca, 0x05, 0x65, 0x6b, 0xc6, 0x41, 0xf9, 0xd5, 0x1c, 0x67, 0xc1, 0xd0, 0xd5, 0x6f, 0x7b, 0x70, 0xb8, 0x8f, 0xdb, 0x19, 0x68, 0x7c, 0xe0, 0x2d, 0x04, 0x49, 0xa9, 0xa2, 0x77, 0x4e, 0xfc, 0x60, 0x0d, 0x7c, 0x1b, 0x93, 0x6c, 0xd2, 0x61, 0xc4, 0x6b, 0x01, 0xe9, 0x12, 0x28, 0x6d, 0xf5, 0x78, 0xe9, 0x99, 0x0b, 0x9c, 0x4f, 0x90, 0x34, 0x3e, 0x06, 0x92, 0x57, 0xe3, 0x7a, 0x8f, 0x13, 0xc7, 0xf3, 0xfe, 0xf0, 0xe2, 0x59, 0x48, 0x15, 0xb9, 0xdb, 0x77, 0x07, 0x1d, 0x6d, 0xb5, 0x65, 0x17, 0xdf, 0x76, 0x6f, 0xb5, 0x43, 0xde, 0x71, 0xac, 0xf1, 0x22, 0xbf, 0xb2, 0xe5, 0xd9, 0x22, 0xf1, 0x67, 0x76, 0x71, 0x0c, 0xff, 0x99, 0x7b, 0x94, 0x9b, 0x24, 0x20, 0x80, 0xe3, 0xcc, 0x06, 0x4a, 0xed, 0xdf, 0xec, 0x50, 0xd5, 0x87, 0x3d, 0xa0, 0x7d, 0x9c, 0xe5, 0x13, 0x10, 0x98, 0x14, 0xc3, 0x90, 0x10, 0xd9, 0x25, 0x9a, 0x59, 0xe9, 0x37, 0x26, 0xfd, 0x87, 0xd7, 0xf4, 0xf9, 0x11, 0x91, 0xad, 0x5c, 0x00, 0x95, 0xf5, 0x2b, 0x37, 0xf7, 0x4e, 0xb4, 0x4b, 0x42, 0x7c, 0xb3, 0xad, 0xd6, 0x33, 0x5f, 0x0b, 0x84, 0x57, 0x7f, 0xa7, 0x07, 0x73, 0x37, 0x4b, 0xab, 0x2e, 0xfb, 0xfe, 0x1e, 0xcb, 0xb6, 0x4a, 0xc1, 0x21, 0x5f, 0xec, 0x92, 0xb7, 0xac, 0x97, 0x75, 0x20, 0xc9, 0xd8, 0x9e, 0x93, 0xd5, 0x12, 0x7a, 0x64, 0xb9, 0x4c, 0xed, 0x49, 0x87, 0x44, 0x5b, 0x4f, 0x90, 0x34, 0x3e, 0x06, 0x92, 0x57, 0xe3, 0x7a, 0x8f, 0x13, 0xc7, 0xf3, 0xfe, 0xf0, 0xe2, 0x59, 0x48, 0x15, 0xb9, 0xdb, 0x77, 0x07, 0x1d, 0x6d, 0xb5, 0x65, 0x17, 0xdf, 0x76, 0x6f, 0xb5, 0x43, 0xde, 0x71, 0xac, 0xf1, 0x22, 0xbf, 0xb2, 0xe5, 0xd9 ]), False) data = Data() rsaParams = RsaKeyParams(1024) keyName = Name("test") decryptKey = RsaAlgorithm.generateKey(rsaParams) encryptKey = RsaAlgorithm.deriveEncryptKey(decryptKey.getKeyBits()) eKey = encryptKey.getKeyBits() dKey = decryptKey.getKeyBits() encryptParams = EncryptParams(input.type) Encryptor.encryptData(data, largeContent, keyName, eKey, encryptParams) self.assertTrue(data.getName().equals(Name("/FOR").append(keyName)), input.testName) largeDataContent = data.getContent() # largeDataContent is a sequence of the two EncryptedContent. encryptedNonce = EncryptedContent() encryptedNonce.wireDecode(largeDataContent) self.assertTrue(keyName.equals(encryptedNonce.getKeyLocator().getKeyName()), input.testName) self.assertEqual(encryptedNonce.getInitialVector().size(), 0, input.testName) self.assertEqual(encryptedNonce.getAlgorithmType(), input.type, input.testName) # Use the size of encryptedNonce to find the start of encryptedPayload. payloadContent = largeDataContent.buf()[encryptedNonce.wireEncode().size():] encryptedPayload = EncryptedContent() encryptedPayload.wireDecode(payloadContent) nonceKeyName = Name(keyName) nonceKeyName.append("nonce") self.assertTrue(nonceKeyName.equals(encryptedPayload.getKeyLocator().getKeyName()), input.testName) self.assertEqual(encryptedPayload.getInitialVector().size(), 16, input.testName) self.assertEqual(encryptedPayload.getAlgorithmType(), EncryptAlgorithmType.AesCbc, input.testName) self.assertEqual( largeDataContent.size(), encryptedNonce.wireEncode().size() + encryptedPayload.wireEncode().size(), input.testName) blobNonce = encryptedNonce.getPayload() nonce = RsaAlgorithm.decrypt(dKey, blobNonce, encryptParams) encryptParams.setAlgorithmType(EncryptAlgorithmType.AesCbc) encryptParams.setInitialVector(encryptedPayload.getInitialVector()) bufferPayload = encryptedPayload.getPayload() largePayload = AesAlgorithm.decrypt(nonce, bufferPayload, encryptParams) self.assertTrue(largeContent.equals(largePayload), input.testName)
def test_get_group_key(self): # Create the group manager. manager = GroupManager( Name("Alice"), Name("data_type"), Sqlite3GroupManagerDb(self.groupKeyDatabaseFilePath), 1024, 1, self.keyChain) self.setManager(manager) # Get the data list from the group manager. timePoint1 = Schedule.fromIsoString("20150825T093000") result = manager.getGroupKey(timePoint1) self.assertEqual(4, len(result)) # The first data packet contains the group's encryption key (public key). data = result[0] self.assertEqual( "/Alice/READ/data_type/E-KEY/20150825T090000/20150825T100000", data.getName().toUri()) groupEKey = EncryptKey(data.getContent()) # Get the second data packet and decrypt. data = result[1] self.assertEqual( "/Alice/READ/data_type/D-KEY/20150825T090000/20150825T100000/FOR/ndn/memberA/ksk-123", data.getName().toUri()) ####################################################### Start decryption. dataContent = data.getContent() # Get the nonce key. # dataContent is a sequence of the two EncryptedContent. encryptedNonce = EncryptedContent() encryptedNonce.wireDecode(dataContent) self.assertEqual(0, encryptedNonce.getInitialVector().size()) self.assertEqual(EncryptAlgorithmType.RsaOaep, encryptedNonce.getAlgorithmType()) decryptParams = EncryptParams(EncryptAlgorithmType.RsaOaep) blobNonce = encryptedNonce.getPayload() nonce = RsaAlgorithm.decrypt(self.decryptKeyBlob, blobNonce, decryptParams) # Get the payload. # Use the size of encryptedNonce to find the start of encryptedPayload. payloadContent = dataContent.buf()[encryptedNonce.wireEncode().size():] encryptedPayload = EncryptedContent() encryptedPayload.wireDecode(payloadContent) self.assertEqual(16, encryptedPayload.getInitialVector().size()) self.assertEqual(EncryptAlgorithmType.AesCbc, encryptedPayload.getAlgorithmType()) decryptParams.setAlgorithmType(EncryptAlgorithmType.AesCbc) decryptParams.setInitialVector(encryptedPayload.getInitialVector()) blobPayload = encryptedPayload.getPayload() largePayload = AesAlgorithm.decrypt(nonce, blobPayload, decryptParams) # Get the group D-KEY. groupDKey = DecryptKey(largePayload) ####################################################### End decryption. # Check the D-KEY. derivedGroupEKey = RsaAlgorithm.deriveEncryptKey( groupDKey.getKeyBits()) self.assertTrue(groupEKey.getKeyBits().equals( derivedGroupEKey.getKeyBits())) # Check the third data packet. data = result[2] self.assertEqual( "/Alice/READ/data_type/D-KEY/20150825T090000/20150825T100000/FOR/ndn/memberB/ksk-123", data.getName().toUri()) # Check the fourth data packet. data = result[3] self.assertEqual( "/Alice/READ/data_type/D-KEY/20150825T090000/20150825T100000/FOR/ndn/memberC/ksk-123", data.getName().toUri()) # Check invalid time stamps for getting the group key. timePoint2 = Schedule.fromIsoString("20150826T083000") self.assertEqual(0, len(manager.getGroupKey(timePoint2))) timePoint3 = Schedule.fromIsoString("20150827T023000") self.assertEqual(0, len(manager.getGroupKey(timePoint3)))
def test_constructor(self): # Check default settings. content = EncryptedContent() self.assertEqual(content.getAlgorithmType(), None) self.assertTrue(content.getPayload().isNull()) self.assertTrue(content.getInitialVector().isNull()) self.assertEqual(content.getKeyLocator().getType(), None) # Check an encrypted content with IV. keyLocator = KeyLocator() keyLocator.setType(KeyLocatorType.KEYNAME) keyLocator.getKeyName().set("/test/key/locator") rsaOaepContent = EncryptedContent() rsaOaepContent.setAlgorithmType( EncryptAlgorithmType.RsaOaep).setKeyLocator(keyLocator).setPayload( Blob(message, False)).setInitialVector(Blob(iv, False)) self.assertEqual(rsaOaepContent.getAlgorithmType(), EncryptAlgorithmType.RsaOaep) self.assertTrue(rsaOaepContent.getPayload().equals(Blob( message, False))) self.assertTrue(rsaOaepContent.getInitialVector().equals( Blob(iv, False))) self.assertTrue(rsaOaepContent.getKeyLocator().getType() != None) self.assertTrue(rsaOaepContent.getKeyLocator().getKeyName().equals( Name("/test/key/locator"))) # Encoding. encryptedBlob = Blob(encrypted, False) encoded = rsaOaepContent.wireEncode() self.assertTrue(encryptedBlob.equals(encoded)) # Decoding. rsaOaepContent2 = EncryptedContent() rsaOaepContent2.wireDecode(encryptedBlob) self.assertEqual(rsaOaepContent2.getAlgorithmType(), EncryptAlgorithmType.RsaOaep) self.assertTrue(rsaOaepContent2.getPayload().equals( Blob(message, False))) self.assertTrue(rsaOaepContent2.getInitialVector().equals( Blob(iv, False))) self.assertTrue(rsaOaepContent2.getKeyLocator().getType() != None) self.assertTrue(rsaOaepContent2.getKeyLocator().getKeyName().equals( Name("/test/key/locator"))) # Check the no IV case. rsaOaepContentNoIv = EncryptedContent() rsaOaepContentNoIv.setAlgorithmType( EncryptAlgorithmType.RsaOaep).setKeyLocator(keyLocator).setPayload( Blob(message, False)) self.assertEqual(rsaOaepContentNoIv.getAlgorithmType(), EncryptAlgorithmType.RsaOaep) self.assertTrue(rsaOaepContentNoIv.getPayload().equals( Blob(message, False))) self.assertTrue(rsaOaepContentNoIv.getInitialVector().isNull()) self.assertTrue(rsaOaepContentNoIv.getKeyLocator().getType() != None) self.assertTrue(rsaOaepContentNoIv.getKeyLocator().getKeyName().equals( Name("/test/key/locator"))) # Encoding. encryptedBlob2 = Blob(encryptedNoIv, False) encodedNoIv = rsaOaepContentNoIv.wireEncode() self.assertTrue(encryptedBlob2.equals(encodedNoIv)) # Decoding. rsaOaepContentNoIv2 = EncryptedContent() rsaOaepContentNoIv2.wireDecode(encryptedBlob2) self.assertEqual(rsaOaepContentNoIv2.getAlgorithmType(), EncryptAlgorithmType.RsaOaep) self.assertTrue(rsaOaepContentNoIv2.getPayload().equals( Blob(message, False))) self.assertTrue(rsaOaepContentNoIv2.getInitialVector().isNull()) self.assertTrue(rsaOaepContentNoIv2.getKeyLocator().getType() != None) self.assertTrue( rsaOaepContentNoIv2.getKeyLocator().getKeyName().equals( Name("/test/key/locator")))
def test_constructor(self): # Check default settings. content = EncryptedContent() self.assertEqual(content.getAlgorithmType(), None) self.assertTrue(content.getPayload().isNull()) self.assertTrue(content.getInitialVector().isNull()) self.assertEqual(content.getKeyLocator().getType(), None) # Check an encrypted content with IV. keyLocator = KeyLocator() keyLocator.setType(KeyLocatorType.KEYNAME) keyLocator.getKeyName().set("/test/key/locator") rsaOaepContent = EncryptedContent() rsaOaepContent.setAlgorithmType(EncryptAlgorithmType.RsaOaep).setKeyLocator( keyLocator).setPayload(Blob(message, False)).setInitialVector(Blob(iv, False)) self.assertEqual(rsaOaepContent.getAlgorithmType(), EncryptAlgorithmType.RsaOaep) self.assertTrue(rsaOaepContent.getPayload().equals(Blob(message, False))) self.assertTrue(rsaOaepContent.getInitialVector().equals(Blob(iv, False))) self.assertTrue(rsaOaepContent.getKeyLocator().getType() != None) self.assertTrue(rsaOaepContent.getKeyLocator().getKeyName().equals( Name("/test/key/locator"))) # Encoding. encryptedBlob = Blob(encrypted, False) encoded = rsaOaepContent.wireEncode() self.assertTrue(encryptedBlob.equals(encoded)) # Decoding. rsaOaepContent2 = EncryptedContent() rsaOaepContent2.wireDecode(encryptedBlob) self.assertEqual(rsaOaepContent2.getAlgorithmType(), EncryptAlgorithmType.RsaOaep) self.assertTrue(rsaOaepContent2.getPayload().equals(Blob(message, False))) self.assertTrue(rsaOaepContent2.getInitialVector().equals(Blob(iv, False))) self.assertTrue(rsaOaepContent2.getKeyLocator().getType() != None) self.assertTrue(rsaOaepContent2.getKeyLocator().getKeyName().equals( Name("/test/key/locator"))) # Check the no IV case. rsaOaepContentNoIv = EncryptedContent() rsaOaepContentNoIv.setAlgorithmType(EncryptAlgorithmType.RsaOaep).setKeyLocator( keyLocator).setPayload(Blob(message, False)) self.assertEqual(rsaOaepContentNoIv.getAlgorithmType(), EncryptAlgorithmType.RsaOaep) self.assertTrue(rsaOaepContentNoIv.getPayload().equals(Blob(message, False))) self.assertTrue(rsaOaepContentNoIv.getInitialVector().isNull()) self.assertTrue(rsaOaepContentNoIv.getKeyLocator().getType() != None) self.assertTrue(rsaOaepContentNoIv.getKeyLocator().getKeyName().equals( Name("/test/key/locator"))) # Encoding. encryptedBlob2 = Blob(encryptedNoIv, False) encodedNoIv = rsaOaepContentNoIv.wireEncode() self.assertTrue(encryptedBlob2.equals(encodedNoIv)) # Decoding. rsaOaepContentNoIv2 = EncryptedContent() rsaOaepContentNoIv2.wireDecode(encryptedBlob2) self.assertEqual(rsaOaepContentNoIv2.getAlgorithmType(), EncryptAlgorithmType.RsaOaep) self.assertTrue(rsaOaepContentNoIv2.getPayload().equals(Blob(message, False))) self.assertTrue(rsaOaepContentNoIv2.getInitialVector().isNull()) self.assertTrue(rsaOaepContentNoIv2.getKeyLocator().getType() != None) self.assertTrue(rsaOaepContentNoIv2.getKeyLocator().getKeyName().equals( Name("/test/key/locator")))
def test_get_group_key(self): # Create the group manager. manager = GroupManager( Name("Alice"), Name("data_type"), Sqlite3GroupManagerDb(self.groupKeyDatabaseFilePath), 1024, 1, self.keyChain) self.setManager(manager) # Get the data list from the group manager. timePoint1 = Schedule.fromIsoString("20150825T093000") result = manager.getGroupKey(timePoint1) self.assertEqual(4, len(result)) # The first data packet contains the group's encryption key (public key). data = result[0] self.assertEqual( "/Alice/READ/data_type/E-KEY/20150825T090000/20150825T100000", data.getName().toUri()) groupEKey = EncryptKey(data.getContent()) # Get the second data packet and decrypt. data = result[1] self.assertEqual( "/Alice/READ/data_type/D-KEY/20150825T090000/20150825T100000/FOR/ndn/memberA/ksk-123", data.getName().toUri()) ####################################################### Start decryption. dataContent = data.getContent() # Get the nonce key. # dataContent is a sequence of the two EncryptedContent. encryptedNonce = EncryptedContent() encryptedNonce.wireDecode(dataContent) self.assertEqual(0, encryptedNonce.getInitialVector().size()) self.assertEqual(EncryptAlgorithmType.RsaOaep, encryptedNonce.getAlgorithmType()) decryptParams = EncryptParams(EncryptAlgorithmType.RsaOaep) blobNonce = encryptedNonce.getPayload() nonce = RsaAlgorithm.decrypt(self.decryptKeyBlob, blobNonce, decryptParams) # Get the payload. # Use the size of encryptedNonce to find the start of encryptedPayload. payloadContent = dataContent.buf()[encryptedNonce.wireEncode().size():] encryptedPayload = EncryptedContent() encryptedPayload.wireDecode(payloadContent) self.assertEqual(16, encryptedPayload.getInitialVector().size()) self.assertEqual(EncryptAlgorithmType.AesCbc, encryptedPayload.getAlgorithmType()) decryptParams.setAlgorithmType(EncryptAlgorithmType.AesCbc) decryptParams.setInitialVector(encryptedPayload.getInitialVector()) blobPayload = encryptedPayload.getPayload() largePayload = AesAlgorithm.decrypt(nonce, blobPayload, decryptParams) # Get the group D-KEY. groupDKey = DecryptKey(largePayload) ####################################################### End decryption. # Check the D-KEY. derivedGroupEKey = RsaAlgorithm.deriveEncryptKey(groupDKey.getKeyBits()) self.assertTrue(groupEKey.getKeyBits().equals(derivedGroupEKey.getKeyBits())) # Check the third data packet. data = result[2] self.assertEqual( "/Alice/READ/data_type/D-KEY/20150825T090000/20150825T100000/FOR/ndn/memberB/ksk-123", data.getName().toUri()) # Check the fourth data packet. data = result[3] self.assertEqual( "/Alice/READ/data_type/D-KEY/20150825T090000/20150825T100000/FOR/ndn/memberC/ksk-123", data.getName().toUri()) # Check invalid time stamps for getting the group key. timePoint2 = Schedule.fromIsoString("20150826T083000") self.assertEqual(0, len(manager.getGroupKey(timePoint2))) timePoint3 = Schedule.fromIsoString("20150827T023000") self.assertEqual(0, len(manager.getGroupKey(timePoint3)))