1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
|
#!/usr/bin/env python
"""Unit tests for M2Crypto.EC, ECDSA part.
Copyright (c) 2000 Ng Pheng Siong. All rights reserved.
Portions copyright (c) 2005-2006 Vrije Universiteit Amsterdam. All rights reserved.
"""
import unittest
import sha
from M2Crypto import EC, BIO, Rand, m2
class ECDSATestCase(unittest.TestCase):
errkey = 'tests/rsa.priv.pem'
privkey = 'tests/ec.priv.pem'
pubkey = 'tests/ec.pub.pem'
data = sha.sha('Can you spell subliminal channel?').digest()
def callback(self, *args):
pass
def callback2(self):
pass
def test_loadkey_junk(self):
self.assertRaises(ValueError, EC.load_key, self.errkey)
def test_loadkey(self):
ec = EC.load_key(self.privkey)
assert len(ec) == 233
def test_loadpubkey(self):
# XXX more work needed
ec = EC.load_pub_key(self.pubkey)
assert len(ec) == 233
self.assertRaises(EC.ECError, EC.load_pub_key, self.errkey)
def _test_sign_dsa(self):
ec = EC.gen_params(EC.NID_sect233k1)
# ec.gen_key()
self.assertRaises(EC.ECError, ec.sign_dsa, self.data)
ec = EC.load_key(self.privkey)
r, s = ec.sign_dsa(self.data)
assert ec.verify_dsa(self.data, r, s)
assert not ec.verify_dsa(self.data, s, r)
def test_sign_dsa_asn1(self):
ec = EC.load_key(self.privkey)
blob = ec.sign_dsa_asn1(self.data)
assert ec.verify_dsa_asn1(self.data, blob)
self.assertRaises(EC.ECError, ec.verify_dsa_asn1, blob, self.data)
def test_verify_dsa(self):
ec = EC.load_key(self.privkey)
r, s = ec.sign_dsa(self.data)
ec2 = EC.load_pub_key(self.pubkey)
assert ec2.verify_dsa(self.data, r, s)
assert not ec2.verify_dsa(self.data, s, r)
def test_genparam(self):
ec = EC.gen_params(EC.NID_sect233k1)
assert len(ec) == 233
def suite():
return unittest.makeSuite(ECDSATestCase)
if __name__ == '__main__':
Rand.load_file('randpool.dat', -1)
unittest.TextTestRunner().run(suite())
Rand.save_file('randpool.dat')
|