From d5244fa21e9288d61dda9bbfff7579696e6677a7 Mon Sep 17 00:00:00 2001 From: Ayrx Date: Tue, 18 Feb 2014 14:56:27 +0800 Subject: Added TOTP implementation and tests. --- tests/hazmat/primitives/twofactor/test_totp.py | 58 ++++++++++++++++++++++++++ 1 file changed, 58 insertions(+) create mode 100644 tests/hazmat/primitives/twofactor/test_totp.py (limited to 'tests/hazmat/primitives/twofactor/test_totp.py') diff --git a/tests/hazmat/primitives/twofactor/test_totp.py b/tests/hazmat/primitives/twofactor/test_totp.py new file mode 100644 index 00000000..0549fa59 --- /dev/null +++ b/tests/hazmat/primitives/twofactor/test_totp.py @@ -0,0 +1,58 @@ +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or +# implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +import pytest + +from cryptography.exceptions import InvalidToken +from cryptography.hazmat.primitives import hashes +from cryptography.hazmat.primitives.hashes import SHA1 +from cryptography.hazmat.primitives.twofactor.totp import TOTP +from tests.utils import load_vectors_from_file, load_nist_vectors + +vectors = load_vectors_from_file( + "twofactor/rfc-6238.txt", load_nist_vectors) + +@pytest.mark.hmac +class TestTOTP(object): + + @pytest.mark.parametrize("params", vectors) + def test_generate(self, backend, params): + secret = params["secret"] + time = int(params["time"]) + mode = params["mode"] + totp_value = params["totp"] + + algorithm = getattr(hashes, mode.decode()) + totp = TOTP(secret, 8, algorithm(), 30, backend) + assert totp.generate(time) == totp_value + + @pytest.mark.parametrize("params", vectors) + def test_verify(self, backend, params): + secret = params["secret"] + time = int(params["time"]) + mode = params["mode"] + totp_value = params["totp"] + + algorithm = getattr(hashes, mode.decode()) + totp = TOTP(secret, 8, algorithm(), 30, backend) + + assert totp.verify(totp_value, time) is None + + def test_invalid_verify(self, backend): + secret = b"12345678901234567890" + time = 59 + + totp = TOTP(secret, 8, SHA1(), 30, backend) + + with pytest.raises(InvalidToken): + totp.verify(b"12345678", time) -- cgit v1.2.3 From 7ea36ed7b7ae6b608d35dfea06aff8ca974940f2 Mon Sep 17 00:00:00 2001 From: Ayrx Date: Tue, 18 Feb 2014 15:22:52 +0800 Subject: Added documentation for TOTP. --- tests/hazmat/primitives/twofactor/test_totp.py | 1 + 1 file changed, 1 insertion(+) (limited to 'tests/hazmat/primitives/twofactor/test_totp.py') diff --git a/tests/hazmat/primitives/twofactor/test_totp.py b/tests/hazmat/primitives/twofactor/test_totp.py index 0549fa59..ea18a40c 100644 --- a/tests/hazmat/primitives/twofactor/test_totp.py +++ b/tests/hazmat/primitives/twofactor/test_totp.py @@ -22,6 +22,7 @@ from tests.utils import load_vectors_from_file, load_nist_vectors vectors = load_vectors_from_file( "twofactor/rfc-6238.txt", load_nist_vectors) + @pytest.mark.hmac class TestTOTP(object): -- cgit v1.2.3 From 341399d1ed7237568d3a2a7016e671700be9d627 Mon Sep 17 00:00:00 2001 From: Ayrx Date: Sat, 22 Feb 2014 14:50:24 +0800 Subject: Fixed documentation based on alexs' comments. --- tests/hazmat/primitives/twofactor/test_totp.py | 8 ++++++++ 1 file changed, 8 insertions(+) (limited to 'tests/hazmat/primitives/twofactor/test_totp.py') diff --git a/tests/hazmat/primitives/twofactor/test_totp.py b/tests/hazmat/primitives/twofactor/test_totp.py index ea18a40c..58819be4 100644 --- a/tests/hazmat/primitives/twofactor/test_totp.py +++ b/tests/hazmat/primitives/twofactor/test_totp.py @@ -57,3 +57,11 @@ class TestTOTP(object): with pytest.raises(InvalidToken): totp.verify(b"12345678", time) + + def test_floating_point_time_generate(self, backend): + secret = b"12345678901234567890" + time = 59.1 + + totp = TOTP(secret, 8, SHA1(), 30, backend) + + assert totp.generate(time) == b"94287082" -- cgit v1.2.3 From c18dc45eb241d58ec0e81d04ec3f961ad7562ad0 Mon Sep 17 00:00:00 2001 From: Ayrx Date: Tue, 25 Feb 2014 12:06:18 +0800 Subject: Seperated the totp tests based on different hash types --- tests/hazmat/primitives/twofactor/test_totp.py | 97 +++++++++++++++++++++----- 1 file changed, 80 insertions(+), 17 deletions(-) (limited to 'tests/hazmat/primitives/twofactor/test_totp.py') diff --git a/tests/hazmat/primitives/twofactor/test_totp.py b/tests/hazmat/primitives/twofactor/test_totp.py index 58819be4..8877a70a 100644 --- a/tests/hazmat/primitives/twofactor/test_totp.py +++ b/tests/hazmat/primitives/twofactor/test_totp.py @@ -15,7 +15,6 @@ import pytest from cryptography.exceptions import InvalidToken from cryptography.hazmat.primitives import hashes -from cryptography.hazmat.primitives.hashes import SHA1 from cryptography.hazmat.primitives.twofactor.totp import TOTP from tests.utils import load_vectors_from_file, load_nist_vectors @@ -26,42 +25,106 @@ vectors = load_vectors_from_file( @pytest.mark.hmac class TestTOTP(object): - @pytest.mark.parametrize("params", vectors) - def test_generate(self, backend, params): + @pytest.mark.supported( + only_if=lambda backend: backend.hmac_supported(hashes.SHA1()), + skip_message="Does not support HMAC-SHA1." + ) + @pytest.mark.parametrize( + "params", [i for i in vectors if i["mode"] == b"SHA1"]) + def test_generate_sha1(self, backend, params): secret = params["secret"] time = int(params["time"]) - mode = params["mode"] totp_value = params["totp"] - algorithm = getattr(hashes, mode.decode()) - totp = TOTP(secret, 8, algorithm(), 30, backend) + totp = TOTP(secret, 8, hashes.SHA1(), 30, backend) assert totp.generate(time) == totp_value - @pytest.mark.parametrize("params", vectors) - def test_verify(self, backend, params): + @pytest.mark.supported( + only_if=lambda backend: backend.hmac_supported(hashes.SHA256()), + skip_message="Does not support HMAC-SHA256." + ) + @pytest.mark.parametrize( + "params", [i for i in vectors if i["mode"] == b"SHA256"]) + def test_generate_sha256(self, backend, params): secret = params["secret"] time = int(params["time"]) - mode = params["mode"] totp_value = params["totp"] - algorithm = getattr(hashes, mode.decode()) - totp = TOTP(secret, 8, algorithm(), 30, backend) + totp = TOTP(secret, 8, hashes.SHA256(), 30, backend) + assert totp.generate(time) == totp_value + + @pytest.mark.supported( + only_if=lambda backend: backend.hmac_supported(hashes.SHA512()), + skip_message="Does not support HMAC-SHA512." + ) + @pytest.mark.parametrize( + "params", [i for i in vectors if i["mode"] == b"SHA512"]) + def test_generate_sha512(self, backend, params): + secret = params["secret"] + time = int(params["time"]) + totp_value = params["totp"] + + totp = TOTP(secret, 8, hashes.SHA512(), 30, backend) + assert totp.generate(time) == totp_value + + @pytest.mark.supported( + only_if=lambda backend: backend.hmac_supported(hashes.SHA1()), + skip_message="Does not support HMAC-SHA1." + ) + @pytest.mark.parametrize( + "params", [i for i in vectors if i["mode"] == b"SHA1"]) + def test_verify_sha1(self, backend, params): + secret = params["secret"] + time = int(params["time"]) + totp_value = params["totp"] + + totp = TOTP(secret, 8, hashes.SHA1(), 30, backend) + + assert totp.verify(totp_value, time) is None + + @pytest.mark.supported( + only_if=lambda backend: backend.hmac_supported(hashes.SHA256()), + skip_message="Does not support HMAC-SHA256." + ) + @pytest.mark.parametrize( + "params", [i for i in vectors if i["mode"] == b"SHA256"]) + def test_verify_sha256(self, backend, params): + secret = params["secret"] + time = int(params["time"]) + totp_value = params["totp"] + + totp = TOTP(secret, 8, hashes.SHA256(), 30, backend) + + assert totp.verify(totp_value, time) is None + + @pytest.mark.supported( + only_if=lambda backend: backend.hmac_supported(hashes.SHA512()), + skip_message="Does not support HMAC-SHA512." + ) + @pytest.mark.parametrize( + "params", [i for i in vectors if i["mode"] == b"SHA512"]) + def test_verify_sha512(self, backend, params): + secret = params["secret"] + time = int(params["time"]) + totp_value = params["totp"] + + totp = TOTP(secret, 8, hashes.SHA512(), 30, backend) assert totp.verify(totp_value, time) is None def test_invalid_verify(self, backend): - secret = b"12345678901234567890" - time = 59 + secret = b"12345678901234567890" + time = 59 - totp = TOTP(secret, 8, SHA1(), 30, backend) + totp = TOTP(secret, 8, hashes.SHA1(), 30, backend) - with pytest.raises(InvalidToken): - totp.verify(b"12345678", time) + with pytest.raises(InvalidToken): + totp.verify(b"12345678", time) def test_floating_point_time_generate(self, backend): secret = b"12345678901234567890" time = 59.1 - totp = TOTP(secret, 8, SHA1(), 30, backend) + totp = TOTP(secret, 8, hashes.SHA1(), 30, backend) assert totp.generate(time) == b"94287082" -- cgit v1.2.3