| # Licensed under the Apache License, Version 2.0 (the "License"); |
| # you may not use this file except in compliance with the License. |
| # You may obtain a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or |
| # implied. |
| # See the License for the specific language governing permissions and |
| # limitations under the License. |
| |
| import os |
| import textwrap |
| |
| import pytest |
| |
| from .utils import ( |
| load_nist_vectors, load_nist_vectors_from_file, load_cryptrec_vectors, |
| load_cryptrec_vectors_from_file, load_openssl_vectors, |
| load_openssl_vectors_from_file, load_hash_vectors, |
| load_hash_vectors_from_file |
| ) |
| |
| |
| def test_load_nist_vectors(): |
| vector_data = textwrap.dedent(""" |
| # CAVS 11.1 |
| # Config info for aes_values |
| # AESVS GFSbox test data for CBC |
| # State : Encrypt and Decrypt |
| # Key Length : 128 |
| # Generated on Fri Apr 22 15:11:33 2011 |
| |
| [ENCRYPT] |
| |
| COUNT = 0 |
| KEY = 00000000000000000000000000000000 |
| IV = 00000000000000000000000000000000 |
| PLAINTEXT = f34481ec3cc627bacd5dc3fb08f273e6 |
| CIPHERTEXT = 0336763e966d92595a567cc9ce537f5e |
| |
| COUNT = 1 |
| KEY = 00000000000000000000000000000000 |
| IV = 00000000000000000000000000000000 |
| PLAINTEXT = 9798c4640bad75c7c3227db910174e72 |
| CIPHERTEXT = a9a1631bf4996954ebc093957b234589 |
| |
| [DECRYPT] |
| |
| COUNT = 0 |
| KEY = 00000000000000000000000000000000 |
| IV = 00000000000000000000000000000000 |
| CIPHERTEXT = 0336763e966d92595a567cc9ce537f5e |
| PLAINTEXT = f34481ec3cc627bacd5dc3fb08f273e6 |
| |
| COUNT = 1 |
| KEY = 00000000000000000000000000000000 |
| IV = 00000000000000000000000000000000 |
| CIPHERTEXT = a9a1631bf4996954ebc093957b234589 |
| PLAINTEXT = 9798c4640bad75c7c3227db910174e72 |
| """).splitlines() |
| |
| assert load_nist_vectors(vector_data) == [ |
| { |
| "key": b"00000000000000000000000000000000", |
| "iv": b"00000000000000000000000000000000", |
| "plaintext": b"f34481ec3cc627bacd5dc3fb08f273e6", |
| "ciphertext": b"0336763e966d92595a567cc9ce537f5e", |
| }, |
| { |
| "key": b"00000000000000000000000000000000", |
| "iv": b"00000000000000000000000000000000", |
| "plaintext": b"9798c4640bad75c7c3227db910174e72", |
| "ciphertext": b"a9a1631bf4996954ebc093957b234589", |
| }, |
| { |
| "key": b"00000000000000000000000000000000", |
| "iv": b"00000000000000000000000000000000", |
| "plaintext": b"f34481ec3cc627bacd5dc3fb08f273e6", |
| "ciphertext": b"0336763e966d92595a567cc9ce537f5e", |
| }, |
| { |
| "key": b"00000000000000000000000000000000", |
| "iv": b"00000000000000000000000000000000", |
| "plaintext": b"9798c4640bad75c7c3227db910174e72", |
| "ciphertext": b"a9a1631bf4996954ebc093957b234589", |
| }, |
| ] |
| |
| |
| def test_load_nist_vectors_from_file(): |
| assert load_nist_vectors_from_file( |
| os.path.join("ciphers", "AES", "CBC", "CBCGFSbox128.rsp") |
| ) == [ |
| { |
| "key": b"00000000000000000000000000000000", |
| "iv": b"00000000000000000000000000000000", |
| "plaintext": b"f34481ec3cc627bacd5dc3fb08f273e6", |
| "ciphertext": b"0336763e966d92595a567cc9ce537f5e", |
| }, |
| { |
| "key": b"00000000000000000000000000000000", |
| "iv": b"00000000000000000000000000000000", |
| "plaintext": b"9798c4640bad75c7c3227db910174e72", |
| "ciphertext": b"a9a1631bf4996954ebc093957b234589", |
| }, |
| { |
| "key": b"00000000000000000000000000000000", |
| "iv": b"00000000000000000000000000000000", |
| "plaintext": b"96ab5c2ff612d9dfaae8c31f30c42168", |
| "ciphertext": b"ff4f8391a6a40ca5b25d23bedd44a597", |
| }, |
| { |
| "key": b"00000000000000000000000000000000", |
| "iv": b"00000000000000000000000000000000", |
| "plaintext": b"6a118a874519e64e9963798a503f1d35", |
| "ciphertext": b"dc43be40be0e53712f7e2bf5ca707209", |
| }, |
| { |
| "key": b"00000000000000000000000000000000", |
| "iv": b"00000000000000000000000000000000", |
| "plaintext": b"cb9fceec81286ca3e989bd979b0cb284", |
| "ciphertext": b"92beedab1895a94faa69b632e5cc47ce", |
| }, |
| { |
| "key": b"00000000000000000000000000000000", |
| "iv": b"00000000000000000000000000000000", |
| "plaintext": b"b26aeb1874e47ca8358ff22378f09144", |
| "ciphertext": b"459264f4798f6a78bacb89c15ed3d601", |
| }, |
| { |
| "key": b"00000000000000000000000000000000", |
| "iv": b"00000000000000000000000000000000", |
| "plaintext": b"58c8e00b2631686d54eab84b91f0aca1", |
| "ciphertext": b"08a4e2efec8a8e3312ca7460b9040bbf", |
| }, |
| { |
| "key": b"00000000000000000000000000000000", |
| "iv": b"00000000000000000000000000000000", |
| "plaintext": b"f34481ec3cc627bacd5dc3fb08f273e6", |
| "ciphertext": b"0336763e966d92595a567cc9ce537f5e", |
| }, |
| { |
| "key": b"00000000000000000000000000000000", |
| "iv": b"00000000000000000000000000000000", |
| "plaintext": b"9798c4640bad75c7c3227db910174e72", |
| "ciphertext": b"a9a1631bf4996954ebc093957b234589", |
| }, |
| { |
| "key": b"00000000000000000000000000000000", |
| "iv": b"00000000000000000000000000000000", |
| "plaintext": b"96ab5c2ff612d9dfaae8c31f30c42168", |
| "ciphertext": b"ff4f8391a6a40ca5b25d23bedd44a597", |
| }, |
| { |
| "key": b"00000000000000000000000000000000", |
| "iv": b"00000000000000000000000000000000", |
| "plaintext": b"6a118a874519e64e9963798a503f1d35", |
| "ciphertext": b"dc43be40be0e53712f7e2bf5ca707209", |
| }, |
| { |
| "key": b"00000000000000000000000000000000", |
| "iv": b"00000000000000000000000000000000", |
| "plaintext": b"cb9fceec81286ca3e989bd979b0cb284", |
| "ciphertext": b"92beedab1895a94faa69b632e5cc47ce", |
| }, |
| { |
| "key": b"00000000000000000000000000000000", |
| "iv": b"00000000000000000000000000000000", |
| "plaintext": b"b26aeb1874e47ca8358ff22378f09144", |
| "ciphertext": b"459264f4798f6a78bacb89c15ed3d601", |
| }, |
| { |
| "key": b"00000000000000000000000000000000", |
| "iv": b"00000000000000000000000000000000", |
| "plaintext": b"58c8e00b2631686d54eab84b91f0aca1", |
| "ciphertext": b"08a4e2efec8a8e3312ca7460b9040bbf", |
| }, |
| ] |
| |
| |
| def test_load_cryptrec_vectors(): |
| vector_data = textwrap.dedent(""" |
| # Vectors taken from http://info.isl.ntt.co.jp/crypt/eng/camellia/ |
| # Download is t_camelia.txt |
| |
| # Camellia with 128-bit key |
| |
| K No.001 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
| |
| P No.001 : 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
| C No.001 : 07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C |
| |
| P No.002 : 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
| C No.002 : 48 CD 64 19 80 96 72 D2 34 92 60 D8 9A 08 D3 D3 |
| |
| K No.002 : 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
| |
| P No.001 : 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
| C No.001 : 07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C |
| """).splitlines() |
| |
| assert load_cryptrec_vectors(vector_data) == [ |
| { |
| "key": b"00000000000000000000000000000000", |
| "plaintext": b"80000000000000000000000000000000", |
| "ciphertext": b"07923A39EB0A817D1C4D87BDB82D1F1C", |
| }, |
| { |
| "key": b"00000000000000000000000000000000", |
| "plaintext": b"40000000000000000000000000000000", |
| "ciphertext": b"48CD6419809672D2349260D89A08D3D3", |
| }, |
| { |
| "key": b"10000000000000000000000000000000", |
| "plaintext": b"80000000000000000000000000000000", |
| "ciphertext": b"07923A39EB0A817D1C4D87BDB82D1F1C", |
| }, |
| ] |
| |
| |
| def test_load_cryptrec_vectors_invalid(): |
| vector_data = textwrap.dedent(""" |
| # Vectors taken from http://info.isl.ntt.co.jp/crypt/eng/camellia/ |
| # Download is t_camelia.txt |
| |
| # Camellia with 128-bit key |
| |
| E No.001 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
| """).splitlines() |
| |
| with pytest.raises(ValueError): |
| load_cryptrec_vectors(vector_data) |
| |
| |
| def test_load_cryptrec_vectors_from_file_encrypt(): |
| test_set = load_cryptrec_vectors_from_file( |
| os.path.join("ciphers", "Camellia", "camellia-128-ecb.txt"), |
| ) |
| assert test_set[0] == ( |
| { |
| "key": b"00000000000000000000000000000000", |
| "plaintext": b"80000000000000000000000000000000", |
| "ciphertext": b"07923A39EB0A817D1C4D87BDB82D1F1C", |
| } |
| ) |
| assert len(test_set) == 1280 |
| |
| |
| def test_load_openssl_vectors(): |
| vector_data = textwrap.dedent( |
| """ |
| # We don't support CFB{1,8}-CAMELLIAxxx.{En,De}crypt |
| # For all CFB128 encrypts and decrypts, the transformed sequence is |
| # CAMELLIA-bits-CFB:key:IV/ciphertext':plaintext:ciphertext:encdec |
| # CFB128-CAMELLIA128.Encrypt |
| """ |
| "CAMELLIA-128-CFB:2B7E151628AED2A6ABF7158809CF4F3C:" |
| "000102030405060708090A0B0C0D0E0F:6BC1BEE22E409F96E93D7E117393172A:" |
| "14F7646187817EB586599146B82BD719:1\n" |
| "CAMELLIA-128-CFB:2B7E151628AED2A6ABF7158809CF4F3C:" |
| "14F7646187817EB586599146B82BD719:AE2D8A571E03AC9C9EB76FAC45AF8E51:" |
| "A53D28BB82DF741103EA4F921A44880B:1\n\n" |
| "# CFB128-CAMELLIA128.Decrypt\n" |
| "CAMELLIA-128-CFB:2B7E151628AED2A6ABF7158809CF4F3C:" |
| "000102030405060708090A0B0C0D0E0F:6BC1BEE22E409F96E93D7E117393172A:" |
| "14F7646187817EB586599146B82BD719:0\n" |
| "CAMELLIA-128-CFB:2B7E151628AED2A6ABF7158809CF4F3C:" |
| "14F7646187817EB586599146B82BD719:AE2D8A571E03AC9C9EB76FAC45AF8E51:" |
| "A53D28BB82DF741103EA4F921A44880B:0" |
| ).splitlines() |
| |
| assert load_openssl_vectors(vector_data) == [ |
| { |
| "key": b"2B7E151628AED2A6ABF7158809CF4F3C", |
| "iv": b"000102030405060708090A0B0C0D0E0F", |
| "plaintext": b"6BC1BEE22E409F96E93D7E117393172A", |
| "ciphertext": b"14F7646187817EB586599146B82BD719", |
| }, |
| { |
| "key": b"2B7E151628AED2A6ABF7158809CF4F3C", |
| "iv": b"14F7646187817EB586599146B82BD719", |
| "plaintext": b"AE2D8A571E03AC9C9EB76FAC45AF8E51", |
| "ciphertext": b"A53D28BB82DF741103EA4F921A44880B", |
| }, |
| { |
| "key": b"2B7E151628AED2A6ABF7158809CF4F3C", |
| "iv": b"000102030405060708090A0B0C0D0E0F", |
| "plaintext": b"6BC1BEE22E409F96E93D7E117393172A", |
| "ciphertext": b"14F7646187817EB586599146B82BD719", |
| }, |
| { |
| "key": b"2B7E151628AED2A6ABF7158809CF4F3C", |
| "iv": b"14F7646187817EB586599146B82BD719", |
| "plaintext": b"AE2D8A571E03AC9C9EB76FAC45AF8E51", |
| "ciphertext": b"A53D28BB82DF741103EA4F921A44880B", |
| }, |
| ] |
| |
| |
| def test_load_openssl_vectors_from_file(): |
| test_list = load_openssl_vectors_from_file( |
| os.path.join("ciphers", "Camellia", "camellia-ofb.txt") |
| ) |
| assert len(test_list) == 24 |
| assert test_list[:4] == [ |
| { |
| "key": b"2B7E151628AED2A6ABF7158809CF4F3C", |
| "iv": b"000102030405060708090A0B0C0D0E0F", |
| "plaintext": b"6BC1BEE22E409F96E93D7E117393172A", |
| "ciphertext": b"14F7646187817EB586599146B82BD719", |
| }, |
| { |
| "key": b"2B7E151628AED2A6ABF7158809CF4F3C", |
| "iv": b"50FE67CC996D32B6DA0937E99BAFEC60", |
| "plaintext": b"AE2D8A571E03AC9C9EB76FAC45AF8E51", |
| "ciphertext": b"25623DB569CA51E01482649977E28D84", |
| }, |
| { |
| "key": b"2B7E151628AED2A6ABF7158809CF4F3C", |
| "iv": b"D9A4DADA0892239F6B8B3D7680E15674", |
| "plaintext": b"30C81C46A35CE411E5FBC1191A0A52EF", |
| "ciphertext": b"C776634A60729DC657D12B9FCA801E98", |
| }, |
| { |
| "key": b"2B7E151628AED2A6ABF7158809CF4F3C", |
| "iv": b"A78819583F0308E7A6BF36B1386ABF23", |
| "plaintext": b"F69F2445DF4F9B17AD2B417BE66C3710", |
| "ciphertext": b"D776379BE0E50825E681DA1A4C980E8E", |
| }, |
| ] |
| |
| |
| def test_load_hash_vectors(): |
| vector_data = textwrap.dedent(""" |
| |
| # http://tools.ietf.org/html/rfc1321 |
| [irrelevant] |
| |
| Len = 0 |
| Msg = 00 |
| MD = d41d8cd98f00b204e9800998ecf8427e |
| |
| Len = 8 |
| Msg = 61 |
| MD = 0cc175b9c0f1b6a831c399e269772661 |
| |
| Len = 24 |
| Msg = 616263 |
| MD = 900150983cd24fb0d6963f7d28e17f72 |
| |
| Len = 112 |
| Msg = 6d65737361676520646967657374 |
| MD = f96b697d7cb7938d525a2f31aaf161d0 |
| """).splitlines() |
| assert load_hash_vectors(vector_data) == [ |
| (b"", "d41d8cd98f00b204e9800998ecf8427e"), |
| (b"61", "0cc175b9c0f1b6a831c399e269772661"), |
| (b"616263", "900150983cd24fb0d6963f7d28e17f72"), |
| (b"6d65737361676520646967657374", "f96b697d7cb7938d525a2f31aaf161d0"), |
| ] |
| |
| |
| def test_load_hmac_vectors(): |
| vector_data = textwrap.dedent(""" |
| Len = 224 |
| # "Jefe" |
| Key = 4a656665 |
| # "what do ya want for nothing?" |
| Msg = 7768617420646f2079612077616e7420666f72206e6f7468696e673f |
| MD = 750c783e6ab0b503eaa86e310a5db738 |
| """).splitlines() |
| assert load_hash_vectors(vector_data) == [ |
| (b"7768617420646f2079612077616e7420666f72206e6f7468696e673f", |
| "750c783e6ab0b503eaa86e310a5db738", |
| b"4a656665"), |
| ] |
| |
| |
| def test_load_hash_vectors_bad_data(): |
| vector_data = textwrap.dedent(""" |
| # http://tools.ietf.org/html/rfc1321 |
| |
| Len = 0 |
| Msg = 00 |
| UNKNOWN=Hello World |
| """).splitlines() |
| with pytest.raises(ValueError): |
| load_hash_vectors(vector_data) |
| |
| |
| def test_load_hash_vectors_from_file(): |
| test_list = load_hash_vectors_from_file( |
| os.path.join("hashes", "MD5", "rfc-1321.txt") |
| ) |
| assert len(test_list) == 7 |
| assert test_list[:4] == [ |
| (b"", "d41d8cd98f00b204e9800998ecf8427e"), |
| (b"61", "0cc175b9c0f1b6a831c399e269772661"), |
| (b"616263", "900150983cd24fb0d6963f7d28e17f72"), |
| (b"6d65737361676520646967657374", "f96b697d7cb7938d525a2f31aaf161d0"), |
| ] |