nucypher/tests/characters/test_crypto_characters_and_...

259 lines
9.5 KiB
Python
Raw Normal View History

"""
This file is part of nucypher.
nucypher is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
nucypher is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with nucypher. If not, see <https://www.gnu.org/licenses/>.
"""
2018-06-24 21:46:48 +00:00
import eth_utils
import pytest
from constant_sorrow import constants
from nucypher.characters.lawful import Alice, Character, Bob
2018-05-08 19:35:34 +00:00
from nucypher.crypto import api
from nucypher.crypto.powers import CryptoPower, SigningPower, NoSigningPower, \
BlockchainPower, PowerUpError
from nucypher.data_sources import DataSource
"""
Chapter 1: SIGNING
"""
def test_actor_without_signing_power_cannot_sign():
"""
We can create a Character with no real CryptoPower to speak of.
This Character can't even sign a message.
"""
cannot_sign = CryptoPower(power_ups=[])
non_signer = Character(crypto_power=cannot_sign,
start_learning_now=False,
federated_only=True)
2018-02-24 06:39:10 +00:00
# The non-signer's stamp doesn't work for signing...
with pytest.raises(NoSigningPower) as e_info:
2018-02-24 06:39:10 +00:00
non_signer.stamp("something")
# ...or as a way to cast the (non-existent) public key to bytes.
with pytest.raises(NoSigningPower) as e_info:
2018-02-24 06:39:10 +00:00
bytes(non_signer.stamp)
def test_actor_with_signing_power_can_sign():
"""
However, simply giving that character a PowerUp bestows the power to sign.
Instead of having a Character verify the signature, we'll use the lower level API.
"""
message = b"Llamas."
signer = Character(crypto_power_ups=[SigningPower], is_me=True,
start_learning_now=False, federated_only=True)
2018-02-24 06:39:10 +00:00
stamp_of_the_signer = signer.stamp
2018-02-24 06:39:10 +00:00
# We can use the signer's stamp to sign a message (since the signer is_me)...
signature = stamp_of_the_signer(message)
# ...or to get the signer's public key for verification purposes.
# (note: we use the private _der_encoded_bytes here to test directly against the API, instead of Character)
verification = api.ecdsa_verify(message, signature._der_encoded_bytes(),
2018-02-24 06:39:10 +00:00
stamp_of_the_signer.as_umbral_pubkey())
assert verification is True
def test_anybody_can_verify():
"""
In the last example, we used the lower-level Crypto API to verify the signature.
Here, we show that anybody can do it without needing to directly access Crypto.
"""
# Alice can sign by default, by dint of her _default_crypto_powerups.
alice = Alice(federated_only=True, start_learning_now=False)
# So, our story is fairly simple: an everyman meets Alice.
somebody = Character(start_learning_now=False, federated_only=True)
# Alice signs a message.
message = b"A message for all my friends who can only verify and not sign."
2018-02-24 06:39:10 +00:00
signature = alice.stamp(message)
# Our everyman can verify it.
2018-07-16 18:58:24 +00:00
cleartext = somebody.verify_from(alice, message, signature, decrypt=False)
2018-04-02 03:17:47 +00:00
assert cleartext is constants.NO_DECRYPTION_PERFORMED
2018-05-21 19:40:42 +00:00
2018-06-24 21:46:48 +00:00
def test_character_blockchain_power(testerchain):
2018-08-12 03:18:24 +00:00
# TODO: Handle multiple providers
2018-06-24 21:46:48 +00:00
eth_address = testerchain.interface.w3.eth.accounts[0]
sig_privkey = testerchain.interface.providers[0].ethereum_tester.backend._key_lookup[eth_utils.to_canonical_address(eth_address)]
2018-06-24 21:46:48 +00:00
sig_pubkey = sig_privkey.public_key
signer = Character(is_me=True, checksum_public_address=eth_address)
2018-06-24 21:46:48 +00:00
signer._crypto_power.consume_power_up(BlockchainPower(testerchain, eth_address))
# Due to testing backend, the account is already unlocked.
power = signer._crypto_power.power_ups(BlockchainPower)
power.is_unlocked = True
# power.unlock_account('this-is-not-a-secure-password')
2018-06-24 21:46:48 +00:00
data_to_sign = b'What does Ursula look like?!?'
sig = power.sign_message(data_to_sign)
is_verified = power.verify_message(eth_address, sig_pubkey.to_bytes(), data_to_sign, sig)
assert is_verified == True
# Test a bad message:
with pytest.raises(PowerUpError):
power.verify_message(eth_address, sig_pubkey.to_bytes(), data_to_sign + b'bad', sig)
2018-06-24 21:46:48 +00:00
# Test a bad address/pubkey pair
with pytest.raises(ValueError):
power.verify_message(
testerchain.interface.w3.eth.accounts[1],
sig_pubkey.to_bytes(),
data_to_sign,
sig)
# Test a signature without unlocking the account
power.is_unlocked = False
with pytest.raises(PowerUpError):
power.sign_message(b'test')
# Test lockAccount call
del power
2018-06-24 21:46:48 +00:00
"""
Chapter 2: ENCRYPTION
"""
2018-02-14 08:18:55 +00:00
2018-02-14 01:32:15 +00:00
def test_anybody_can_encrypt():
"""
2018-02-14 01:32:15 +00:00
Similar to anybody_can_verify() above; we show that anybody can encrypt.
"""
someone = Character(start_learning_now=False, federated_only=True)
bob = Bob(is_me=False, federated_only=True)
cleartext = b"This is Officer Rod Farva. Come in, Ursula! Come in Ursula!"
ciphertext, signature = someone.encrypt_for(bob, cleartext, sign=False)
2018-04-02 01:52:08 +00:00
assert signature == constants.NOT_SIGNED
assert ciphertext is not None
2018-05-21 19:40:42 +00:00
def test_node_deployer(federated_ursulas):
for ursula in federated_ursulas:
deployer = ursula.get_deployer()
2018-09-06 18:44:03 +00:00
assert deployer.options['https_port'] == ursula.rest_information()[0].port
assert deployer.application == ursula.rest_app
"""
2018-07-16 18:58:24 +00:00
What follows are various combinations of signing and encrypting, to match
real-world scenarios.
"""
2018-05-21 19:40:42 +00:00
def test_sign_cleartext_and_encrypt(federated_alice, federated_bob):
"""
Exhibit One: federated_alice signs the cleartext and encrypts her signature inside
2018-07-16 18:58:24 +00:00
the ciphertext.
"""
message = b"Have you accepted my answer on StackOverflow yet?"
message_kit, _signature = federated_alice.encrypt_for(federated_bob, message,
sign_plaintext=True)
# Notice that our function still returns the signature here, in case federated_alice
2018-07-16 18:58:24 +00:00
# wants to do something else with it, such as post it publicly for later
# public verifiability.
2018-07-16 18:58:24 +00:00
# However, we can expressly refrain from passing the Signature, and the
# verification still works:
cleartext = federated_bob.verify_from(federated_alice, message_kit, signature=None,
decrypt=True)
assert cleartext == message
def test_encrypt_and_sign_the_ciphertext(federated_alice, federated_bob):
"""
Now, federated_alice encrypts first and then signs the ciphertext, providing a
2018-07-16 18:58:24 +00:00
Signature that is completely separate from the message.
This is useful in a scenario in which federated_bob needs to prove authenticity
2018-07-16 18:58:24 +00:00
publicly without disclosing contents.
"""
message = b"We have a reaaall problem."
message_kit, signature = federated_alice.encrypt_for(federated_bob, message,
sign_plaintext=False)
cleartext = federated_bob.verify_from(federated_alice, message_kit, signature, decrypt=True)
assert cleartext == message
def test_encrypt_and_sign_including_signature_in_both_places(federated_alice, federated_bob):
"""
2018-07-16 18:58:24 +00:00
Same as above, but showing that we can include the signature in both
the plaintext (to be found upon decryption) and also passed into
verify_from() (eg, gleaned over a side-channel).
"""
message = b"We have a reaaall problem."
message_kit, signature = federated_alice.encrypt_for(federated_bob, message,
sign_plaintext=True)
cleartext = federated_bob.verify_from(federated_alice, message_kit, signature,
decrypt=True)
assert cleartext == message
def test_encrypt_but_do_not_sign(federated_alice, federated_bob):
2018-02-28 03:55:46 +00:00
"""
Finally, federated_alice encrypts but declines to sign.
This is useful in a scenario in which federated_alice wishes to plausibly disavow
2018-07-16 18:58:24 +00:00
having created this content.
2018-02-28 03:55:46 +00:00
"""
2018-07-16 18:58:24 +00:00
# TODO: How do we accurately demonstrate this test safely, if at all?
message = b"If Bonnie comes home and finds an unencrypted private key in her keystore, I'm gonna get divorced."
2018-07-16 18:58:24 +00:00
# Alice might also want to encrypt a message but *not* sign it, in order
# to refrain from creating evidence that can prove she was the
# original sender.
message_kit, not_signature = federated_alice.encrypt_for(federated_bob, message, sign=False)
# The message is not signed...
2018-04-02 01:52:08 +00:00
assert not_signature == constants.NOT_SIGNED
# ...and thus, the message is not verified.
2018-07-16 18:58:24 +00:00
with pytest.raises(Character.InvalidSignature):
federated_bob.verify_from(federated_alice, message_kit, decrypt=True)
def test_alice_can_decrypt(federated_alice):
label = b"boring test label"
policy_pubkey = federated_alice.get_policy_pubkey_from_label(label)
data_source = DataSource(policy_pubkey_enc=policy_pubkey,
label=label)
message = b"boring test message"
message_kit, signature = data_source.encrypt_message(message=message)
cleartext = federated_alice.verify_from(stranger=data_source,
message_kit=message_kit,
signature=signature,
decrypt=True)
assert cleartext == message
2018-12-03 10:28:52 +00:00