Server IP : 66.29.132.122 / Your IP : 3.135.220.163 Web Server : LiteSpeed System : Linux business142.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64 User : admazpex ( 531) PHP Version : 7.2.34 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : OFF | Pkexec : OFF Directory : /proc/self/root/proc/thread-self/root/opt/imunify360/venv/lib64/python3.11/site-packages/Crypto/SelfTest/Signature/ |
Upload File : |
# =================================================================== # # Copyright (c) 2014, Legrandin <helderijs@gmail.com> # All rights reserved. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions # are met: # # 1. Redistributions of source code must retain the above copyright # notice, this list of conditions and the following disclaimer. # 2. Redistributions in binary form must reproduce the above copyright # notice, this list of conditions and the following disclaimer in # the documentation and/or other materials provided with the # distribution. # # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS # "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT # LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS # FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE # COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, # INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, # BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; # LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER # CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN # ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE # POSSIBILITY OF SUCH DAMAGE. # =================================================================== import json import unittest from binascii import unhexlify from Crypto.Util.py3compat import bchr from Crypto.Util.number import bytes_to_long from Crypto.Util.strxor import strxor from Crypto.SelfTest.st_common import list_test_cases from Crypto.SelfTest.loader import load_test_vectors, load_test_vectors_wycheproof from Crypto.Hash import (SHA1, SHA224, SHA256, SHA384, SHA512, SHA3_384, SHA3_224, SHA3_256, SHA3_512) from Crypto.PublicKey import RSA from Crypto.Signature import pkcs1_15 from Crypto.Signature import PKCS1_v1_5 from Crypto.Util._file_system import pycryptodome_filename from Crypto.Util.strxor import strxor def load_hash_by_name(hash_name): return __import__("Crypto.Hash." + hash_name, globals(), locals(), ["new"]) class FIPS_PKCS1_Verify_Tests(unittest.TestCase): def shortDescription(self): return "FIPS PKCS1 Tests (Verify)" def test_can_sign(self): test_public_key = RSA.generate(1024).public_key() verifier = pkcs1_15.new(test_public_key) self.assertEqual(verifier.can_sign(), False) class FIPS_PKCS1_Verify_Tests_KAT(unittest.TestCase): pass test_vectors_verify = load_test_vectors(("Signature", "PKCS1-v1.5"), "SigVer15_186-3.rsp", "Signature Verification 186-3", {'shaalg': lambda x: x, 'd': lambda x: int(x), 'result': lambda x: x}) or [] for count, tv in enumerate(test_vectors_verify): if isinstance(tv, str): continue if hasattr(tv, "n"): modulus = tv.n continue hash_module = load_hash_by_name(tv.shaalg.upper()) hash_obj = hash_module.new(tv.msg) public_key = RSA.construct([bytes_to_long(x) for x in (modulus, tv.e)]) # type: ignore verifier = pkcs1_15.new(public_key) def positive_test(self, hash_obj=hash_obj, verifier=verifier, signature=tv.s): verifier.verify(hash_obj, signature) def negative_test(self, hash_obj=hash_obj, verifier=verifier, signature=tv.s): self.assertRaises(ValueError, verifier.verify, hash_obj, signature) if tv.result == 'f': setattr(FIPS_PKCS1_Verify_Tests_KAT, "test_negative_%d" % count, negative_test) else: setattr(FIPS_PKCS1_Verify_Tests_KAT, "test_positive_%d" % count, positive_test) class FIPS_PKCS1_Sign_Tests(unittest.TestCase): def shortDescription(self): return "FIPS PKCS1 Tests (Sign)" def test_can_sign(self): test_private_key = RSA.generate(1024) signer = pkcs1_15.new(test_private_key) self.assertEqual(signer.can_sign(), True) class FIPS_PKCS1_Sign_Tests_KAT(unittest.TestCase): pass test_vectors_sign = load_test_vectors(("Signature", "PKCS1-v1.5"), "SigGen15_186-2.txt", "Signature Generation 186-2", {'shaalg': lambda x: x}) or [] test_vectors_sign += load_test_vectors(("Signature", "PKCS1-v1.5"), "SigGen15_186-3.txt", "Signature Generation 186-3", {'shaalg': lambda x: x}) or [] for count, tv in enumerate(test_vectors_sign): if isinstance(tv, str): continue if hasattr(tv, "n"): modulus = tv.n continue if hasattr(tv, "e"): private_key = RSA.construct([bytes_to_long(x) for x in (modulus, tv.e, tv.d)]) # type: ignore signer = pkcs1_15.new(private_key) continue hash_module = load_hash_by_name(tv.shaalg.upper()) hash_obj = hash_module.new(tv.msg) def new_test(self, hash_obj=hash_obj, signer=signer, result=tv.s): signature = signer.sign(hash_obj) self.assertEqual(signature, result) setattr(FIPS_PKCS1_Sign_Tests_KAT, "test_%d" % count, new_test) class PKCS1_15_NoParams(unittest.TestCase): """Verify that PKCS#1 v1.5 signatures pass even without NULL parameters in the algorithm identifier (PyCrypto/LP bug #1119552).""" rsakey = """-----BEGIN RSA PRIVATE KEY----- MIIBOwIBAAJBAL8eJ5AKoIsjURpcEoGubZMxLD7+kT+TLr7UkvEtFrRhDDKMtuII q19FrL4pUIMymPMSLBn3hJLe30Dw48GQM4UCAwEAAQJACUSDEp8RTe32ftq8IwG8 Wojl5mAd1wFiIOrZ/Uv8b963WJOJiuQcVN29vxU5+My9GPZ7RA3hrDBEAoHUDPrI OQIhAPIPLz4dphiD9imAkivY31Rc5AfHJiQRA7XixTcjEkojAiEAyh/pJHks/Mlr +rdPNEpotBjfV4M4BkgGAA/ipcmaAjcCIQCHvhwwKVBLzzTscT2HeUdEeBMoiXXK JACAr3sJQJGxIQIgarRp+m1WSKV1MciwMaTOnbU7wxFs9DP1pva76lYBzgUCIQC9 n0CnZCJ6IZYqSt0H5N7+Q+2Ro64nuwV/OSQfM6sBwQ== -----END RSA PRIVATE KEY-----""" msg = b"This is a test\x0a" # PKCS1 v1.5 signature of the message computed using SHA-1. # The digestAlgorithm SEQUENCE does NOT contain the NULL parameter. sig_str = "a287a13517f716e72fb14eea8e33a8db4a4643314607e7ca3e3e28"\ "1893db74013dda8b855fd99f6fecedcb25fcb7a434f35cd0a101f8"\ "b19348e0bd7b6f152dfc" signature = unhexlify(sig_str) def runTest(self): verifier = pkcs1_15.new(RSA.importKey(self.rsakey)) hashed = SHA1.new(self.msg) verifier.verify(hashed, self.signature) class PKCS1_Legacy_Module_Tests(unittest.TestCase): """Verify that the legacy module Crypto.Signature.PKCS1_v1_5 behaves as expected. The only difference is that the verify() method returns True/False and does not raise exceptions.""" def shortDescription(self): return "Test legacy Crypto.Signature.PKCS1_v1_5" def runTest(self): key = RSA.importKey(PKCS1_15_NoParams.rsakey) hashed = SHA1.new(b"Test") good_signature = PKCS1_v1_5.new(key).sign(hashed) verifier = PKCS1_v1_5.new(key.public_key()) self.assertEqual(verifier.verify(hashed, good_signature), True) # Flip a few bits in the signature bad_signature = strxor(good_signature, bchr(1) * len(good_signature)) self.assertEqual(verifier.verify(hashed, bad_signature), False) class PKCS1_All_Hashes_Tests(unittest.TestCase): def shortDescription(self): return "Test PKCS#1v1.5 signature in combination with all hashes" def runTest(self): key = RSA.generate(1024) signer = pkcs1_15.new(key) hash_names = ("MD2", "MD4", "MD5", "RIPEMD160", "SHA1", "SHA224", "SHA256", "SHA384", "SHA512", "SHA3_224", "SHA3_256", "SHA3_384", "SHA3_512") for name in hash_names: hashed = load_hash_by_name(name).new(b"Test") signer.sign(hashed) from Crypto.Hash import BLAKE2b, BLAKE2s for hash_size in (20, 32, 48, 64): hashed_b = BLAKE2b.new(digest_bytes=hash_size, data=b"Test") signer.sign(hashed_b) for hash_size in (16, 20, 28, 32): hashed_s = BLAKE2s.new(digest_bytes=hash_size, data=b"Test") signer.sign(hashed_s) class TestVectorsWycheproof(unittest.TestCase): def __init__(self, wycheproof_warnings): unittest.TestCase.__init__(self) self._wycheproof_warnings = wycheproof_warnings self._id = "None" def setUp(self): self.tv = [] self.add_tests("rsa_sig_gen_misc_test.json") self.add_tests("rsa_signature_2048_sha224_test.json") self.add_tests("rsa_signature_2048_sha256_test.json") self.add_tests("rsa_signature_2048_sha384_test.json") self.add_tests("rsa_signature_2048_sha3_224_test.json") self.add_tests("rsa_signature_2048_sha3_256_test.json") self.add_tests("rsa_signature_2048_sha3_384_test.json") self.add_tests("rsa_signature_2048_sha3_512_test.json") self.add_tests("rsa_signature_2048_sha512_test.json") self.add_tests("rsa_signature_2048_sha512_224_test.json") self.add_tests("rsa_signature_2048_sha512_256_test.json") self.add_tests("rsa_signature_3072_sha256_test.json") self.add_tests("rsa_signature_3072_sha384_test.json") self.add_tests("rsa_signature_3072_sha3_256_test.json") self.add_tests("rsa_signature_3072_sha3_384_test.json") self.add_tests("rsa_signature_3072_sha3_512_test.json") self.add_tests("rsa_signature_3072_sha512_test.json") self.add_tests("rsa_signature_3072_sha512_256_test.json") self.add_tests("rsa_signature_4096_sha384_test.json") self.add_tests("rsa_signature_4096_sha512_test.json") self.add_tests("rsa_signature_4096_sha512_256_test.json") self.add_tests("rsa_signature_test.json") def add_tests(self, filename): def filter_rsa(group): return RSA.import_key(group['keyPem']) def filter_sha(group): hash_name = group['sha'] if hash_name == "SHA-512": return SHA512 elif hash_name == "SHA-512/224": return SHA512.new(truncate="224") elif hash_name == "SHA-512/256": return SHA512.new(truncate="256") elif hash_name == "SHA3-512": return SHA3_512 elif hash_name == "SHA-384": return SHA384 elif hash_name == "SHA3-384": return SHA3_384 elif hash_name == "SHA-256": return SHA256 elif hash_name == "SHA3-256": return SHA3_256 elif hash_name == "SHA-224": return SHA224 elif hash_name == "SHA3-224": return SHA3_224 elif hash_name == "SHA-1": return SHA1 else: raise ValueError("Unknown hash algorithm: " + hash_name) def filter_type(group): type_name = group['type'] if type_name not in ("RsassaPkcs1Verify", "RsassaPkcs1Generate"): raise ValueError("Unknown type name " + type_name) result = load_test_vectors_wycheproof(("Signature", "wycheproof"), filename, "Wycheproof PKCS#1v1.5 signature (%s)" % filename, group_tag={'rsa_key': filter_rsa, 'hash_mod': filter_sha, 'type': filter_type}) return result def shortDescription(self): return self._id def warn(self, tv): if tv.warning and self._wycheproof_warnings: import warnings warnings.warn("Wycheproof warning: %s (%s)" % (self._id, tv.comment)) def test_verify(self, tv): self._id = "Wycheproof RSA PKCS$#1 Test #" + str(tv.id) hashed_msg = tv.hash_module.new(tv.msg) signer = pkcs1_15.new(tv.key) try: signature = signer.verify(hashed_msg, tv.sig) except ValueError as e: if tv.warning: return assert not tv.valid else: assert tv.valid self.warn(tv) def runTest(self): for tv in self.tv: self.test_verify(tv) def get_tests(config={}): wycheproof_warnings = config.get('wycheproof_warnings') tests = [] tests += list_test_cases(FIPS_PKCS1_Verify_Tests) tests += list_test_cases(FIPS_PKCS1_Sign_Tests) tests += list_test_cases(PKCS1_15_NoParams) tests += list_test_cases(PKCS1_Legacy_Module_Tests) tests += list_test_cases(PKCS1_All_Hashes_Tests) tests += [ TestVectorsWycheproof(wycheproof_warnings) ] if config.get('slow_tests'): tests += list_test_cases(FIPS_PKCS1_Verify_Tests_KAT) tests += list_test_cases(FIPS_PKCS1_Sign_Tests_KAT) return tests if __name__ == '__main__': suite = lambda: unittest.TestSuite(get_tests()) unittest.main(defaultTest='suite')