| '''Tests block operations.''' |
| |
| try: |
| from StringIO import StringIO |
| except ImportError: |
| from io import StringIO |
| import unittest |
| |
| import rsa |
| from rsa import bigfile, varblock, pkcs1 |
| |
| class BigfileTest(unittest.TestCase): |
| |
| def test_encrypt_decrypt_bigfile(self): |
| |
| # Expected block size + 11 bytes padding |
| pub_key, priv_key = rsa.newkeys((6 + 11) * 8) |
| |
| # Encrypt the file |
| message = '123456Sybren' |
| infile = StringIO(message) |
| outfile = StringIO() |
| |
| bigfile.encrypt_bigfile(infile, outfile, pub_key) |
| |
| # Test |
| crypto = outfile.getvalue() |
| |
| cryptfile = StringIO(crypto) |
| clearfile = StringIO() |
| |
| bigfile.decrypt_bigfile(cryptfile, clearfile, priv_key) |
| self.assertEquals(clearfile.getvalue(), message) |
| |
| # We have 2x6 bytes in the message, so that should result in two |
| # bigfile. |
| cryptfile.seek(0) |
| varblocks = list(varblock.yield_varblocks(cryptfile)) |
| self.assertEqual(2, len(varblocks)) |
| |
| |
| def test_sign_verify_bigfile(self): |
| |
| # Large enough to store MD5-sum and ASN.1 code for MD5 |
| pub_key, priv_key = rsa.newkeys((34 + 11) * 8) |
| |
| # Sign the file |
| msgfile = StringIO('123456Sybren') |
| signature = pkcs1.sign(msgfile, priv_key, 'MD5') |
| |
| # Check the signature |
| msgfile.seek(0) |
| pkcs1.verify(msgfile, signature, pub_key) |
| |
| # Alter the message, re-check |
| msgfile = StringIO('123456sybren') |
| self.assertRaises(pkcs1.VerificationError, |
| pkcs1.verify, msgfile, signature, pub_key) |
| |