aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/test
diff options
context:
space:
mode:
authorEgor Tensin <Egor.Tensin@gmail.com>2015-06-04 08:05:49 +0300
committerEgor Tensin <Egor.Tensin@gmail.com>2015-06-04 08:05:49 +0300
commit31eb9272bedd00476b6b109e282465940925d716 (patch)
tree3dda74824495d2d32f1002ea79a86d1067c3f817 /test
parentadd .gitignore (diff)
downloadaes-tools-31eb9272bedd00476b6b109e282465940925d716.tar.gz
aes-tools-31eb9272bedd00476b6b109e282465940925d716.zip
test: add test vectors from NIST 800-38A
Diffstat (limited to 'test')
-rw-r--r--test/800-38a.json239
-rw-r--r--test/800-38a.py33
-rw-r--r--test/toolkit.py62
3 files changed, 334 insertions, 0 deletions
diff --git a/test/800-38a.json b/test/800-38a.json
new file mode 100644
index 0000000..66511eb
--- /dev/null
+++ b/test/800-38a.json
@@ -0,0 +1,239 @@
+{
+ "aes128ecb": {
+ "key": "2b7e151628aed2a6abf7158809cf4f3c",
+ "plaintexts": [
+ "6bc1bee22e409f96e93d7e117393172a",
+ "ae2d8a571e03ac9c9eb76fac45af8e51",
+ "30c81c46a35ce411e5fbc1191a0a52ef",
+ "f69f2445df4f9b17ad2b417be66c3710"
+ ],
+ "ciphers": [
+ "3ad77bb40d7a3660a89ecaf32466ef97",
+ "f5d3d58503b9699de785895a96fdbaaf",
+ "43b1cd7f598ece23881b00e3ed030688",
+ "7b0c785e27e8ad3f8223207104725dd4"
+ ]
+ },
+ "aes128cbc": {
+ "key": "2b7e151628aed2a6abf7158809cf4f3c",
+ "iv": "000102030405060708090a0b0c0d0e0f",
+ "plaintexts": [
+ "6bc1bee22e409f96e93d7e117393172a",
+ "ae2d8a571e03ac9c9eb76fac45af8e51",
+ "30c81c46a35ce411e5fbc1191a0a52ef",
+ "f69f2445df4f9b17ad2b417be66c3710"
+ ],
+ "ciphers": [
+ "7649abac8119b246cee98e9b12e9197d",
+ "5086cb9b507219ee95db113a917678b2",
+ "73bed6b8e3c1743b7116e69e22229516",
+ "3ff1caa1681fac09120eca307586e1a7"
+ ]
+ },
+ "aes128cfb": {
+ "key": "2b7e151628aed2a6abf7158809cf4f3c",
+ "iv": "000102030405060708090a0b0c0d0e0f",
+ "plaintexts": [
+ "6bc1bee22e409f96e93d7e117393172a",
+ "ae2d8a571e03ac9c9eb76fac45af8e51",
+ "30c81c46a35ce411e5fbc1191a0a52ef",
+ "f69f2445df4f9b17ad2b417be66c3710"
+ ],
+ "ciphers": [
+ "3b3fd92eb72dad20333449f8e83cfb4a",
+ "c8a64537a0b3a93fcde3cdad9f1ce58b",
+ "26751f67a3cbb140b1808cf187a4f4df",
+ "c04b05357c5d1c0eeac4c66f9ff7f2e6"
+ ]
+ },
+ "aes128ofb": {
+ "key": "2b7e151628aed2a6abf7158809cf4f3c",
+ "iv": "000102030405060708090a0b0c0d0e0f",
+ "plaintexts": [
+ "6bc1bee22e409f96e93d7e117393172a",
+ "ae2d8a571e03ac9c9eb76fac45af8e51",
+ "30c81c46a35ce411e5fbc1191a0a52ef",
+ "f69f2445df4f9b17ad2b417be66c3710"
+ ],
+ "ciphers": [
+ "3b3fd92eb72dad20333449f8e83cfb4a",
+ "7789508d16918f03f53c52dac54ed825",
+ "9740051e9c5fecf64344f7a82260edcc",
+ "304c6528f659c77866a510d9c1d6ae5e"
+ ]
+ },
+ "aes128ctr": {
+ "key": "2b7e151628aed2a6abf7158809cf4f3c",
+ "iv": "f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
+ "plaintexts": [
+ "6bc1bee22e409f96e93d7e117393172a",
+ "ae2d8a571e03ac9c9eb76fac45af8e51",
+ "30c81c46a35ce411e5fbc1191a0a52ef",
+ "f69f2445df4f9b17ad2b417be66c3710"
+ ],
+ "ciphers": [
+ "874d6191b620e3261bef6864990db6ce",
+ "9806f66b7970fdff8617187bb9fffdff",
+ "5ae4df3edbd5d35e5b4f09020db03eab",
+ "1e031dda2fbe03d1792170a0f3009cee"
+ ]
+ },
+ "aes192ecb": {
+ "key": "8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b",
+ "plaintexts": [
+ "6bc1bee22e409f96e93d7e117393172a",
+ "ae2d8a571e03ac9c9eb76fac45af8e51",
+ "30c81c46a35ce411e5fbc1191a0a52ef",
+ "f69f2445df4f9b17ad2b417be66c3710"
+ ],
+ "ciphers": [
+ "bd334f1d6e45f25ff712a214571fa5cc",
+ "974104846d0ad3ad7734ecb3ecee4eef",
+ "ef7afd2270e2e60adce0ba2face6444e",
+ "9a4b41ba738d6c72fb16691603c18e0e"
+ ]
+ },
+ "aes192cbc": {
+ "key": "8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b",
+ "iv": "000102030405060708090a0b0c0d0e0f",
+ "plaintexts": [
+ "6bc1bee22e409f96e93d7e117393172a",
+ "ae2d8a571e03ac9c9eb76fac45af8e51",
+ "30c81c46a35ce411e5fbc1191a0a52ef",
+ "f69f2445df4f9b17ad2b417be66c3710"
+ ],
+ "ciphers": [
+ "4f021db243bc633d7178183a9fa071e8",
+ "b4d9ada9ad7dedf4e5e738763f69145a",
+ "571b242012fb7ae07fa9baac3df102e0",
+ "08b0e27988598881d920a9e64f5615cd"
+ ]
+ },
+ "aes192cfb": {
+ "key": "8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b",
+ "iv": "000102030405060708090a0b0c0d0e0f",
+ "plaintexts": [
+ "6bc1bee22e409f96e93d7e117393172a",
+ "ae2d8a571e03ac9c9eb76fac45af8e51",
+ "30c81c46a35ce411e5fbc1191a0a52ef",
+ "f69f2445df4f9b17ad2b417be66c3710"
+ ],
+ "ciphers": [
+ "cdc80d6fddf18cab34c25909c99a4174",
+ "67ce7f7f81173621961a2b70171d3d7a",
+ "2e1e8a1dd59b88b1c8e60fed1efac4c9",
+ "c05f9f9ca9834fa042ae8fba584b09ff"
+ ]
+ },
+ "aes192ofb": {
+ "key": "8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b",
+ "iv": "000102030405060708090a0b0c0d0e0f",
+ "plaintexts": [
+ "6bc1bee22e409f96e93d7e117393172a",
+ "ae2d8a571e03ac9c9eb76fac45af8e51",
+ "30c81c46a35ce411e5fbc1191a0a52ef",
+ "f69f2445df4f9b17ad2b417be66c3710"
+ ],
+ "ciphers": [
+ "cdc80d6fddf18cab34c25909c99a4174",
+ "fcc28b8d4c63837c09e81700c1100401",
+ "8d9a9aeac0f6596f559c6d4daf59a5f2",
+ "6d9f200857ca6c3e9cac524bd9acc92a"
+ ]
+ },
+ "aes192ctr": {
+ "key": "8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b",
+ "iv": "f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
+ "plaintexts": [
+ "6bc1bee22e409f96e93d7e117393172a",
+ "ae2d8a571e03ac9c9eb76fac45af8e51",
+ "30c81c46a35ce411e5fbc1191a0a52ef",
+ "f69f2445df4f9b17ad2b417be66c3710"
+ ],
+ "ciphers": [
+ "1abc932417521ca24f2b0459fe7e6e0b",
+ "090339ec0aa6faefd5ccc2c6f4ce8e94",
+ "1e36b26bd1ebc670d1bd1d665620abf7",
+ "4f78a7f6d29809585a97daec58c6b050"
+ ]
+ },
+ "aes256ecb": {
+ "key": "603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4",
+ "plaintexts": [
+ "6bc1bee22e409f96e93d7e117393172a",
+ "ae2d8a571e03ac9c9eb76fac45af8e51",
+ "30c81c46a35ce411e5fbc1191a0a52ef",
+ "f69f2445df4f9b17ad2b417be66c3710"
+ ],
+ "ciphers": [
+ "f3eed1bdb5d2a03c064b5a7e3db181f8",
+ "591ccb10d410ed26dc5ba74a31362870",
+ "b6ed21b99ca6f4f9f153e7b1beafed1d",
+ "23304b7a39f9f3ff067d8d8f9e24ecc7"
+ ]
+ },
+ "aes256cbc": {
+ "key": "603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4",
+ "iv": "000102030405060708090a0b0c0d0e0f",
+ "plaintexts": [
+ "6bc1bee22e409f96e93d7e117393172a",
+ "ae2d8a571e03ac9c9eb76fac45af8e51",
+ "30c81c46a35ce411e5fbc1191a0a52ef",
+ "f69f2445df4f9b17ad2b417be66c3710"
+ ],
+ "ciphers": [
+ "f58c4c04d6e5f1ba779eabfb5f7bfbd6",
+ "9cfc4e967edb808d679f777bc6702c7d",
+ "39f23369a9d9bacfa530e26304231461",
+ "b2eb05e2c39be9fcda6c19078c6a9d1b"
+ ]
+ },
+ "aes256cfb": {
+ "key": "603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4",
+ "iv": "000102030405060708090a0b0c0d0e0f",
+ "plaintexts": [
+ "6bc1bee22e409f96e93d7e117393172a",
+ "ae2d8a571e03ac9c9eb76fac45af8e51",
+ "30c81c46a35ce411e5fbc1191a0a52ef",
+ "f69f2445df4f9b17ad2b417be66c3710"
+ ],
+ "ciphers": [
+ "dc7e84bfda79164b7ecd8486985d3860",
+ "39ffed143b28b1c832113c6331e5407b",
+ "df10132415e54b92a13ed0a8267ae2f9",
+ "75a385741ab9cef82031623d55b1e471"
+ ]
+ },
+ "aes256ofb": {
+ "key": "603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4",
+ "iv": "000102030405060708090a0b0c0d0e0f",
+ "plaintexts": [
+ "6bc1bee22e409f96e93d7e117393172a",
+ "ae2d8a571e03ac9c9eb76fac45af8e51",
+ "30c81c46a35ce411e5fbc1191a0a52ef",
+ "f69f2445df4f9b17ad2b417be66c3710"
+ ],
+ "ciphers": [
+ "dc7e84bfda79164b7ecd8486985d3860",
+ "4febdc6740d20b3ac88f6ad82a4fb08d",
+ "71ab47a086e86eedf39d1c5bba97c408",
+ "0126141d67f37be8538f5a8be740e484"
+ ]
+ },
+ "aes256ctr": {
+ "key": "603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4",
+ "iv": "f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
+ "plaintexts": [
+ "6bc1bee22e409f96e93d7e117393172a",
+ "ae2d8a571e03ac9c9eb76fac45af8e51",
+ "30c81c46a35ce411e5fbc1191a0a52ef",
+ "f69f2445df4f9b17ad2b417be66c3710"
+ ],
+ "ciphers": [
+ "601ec313775789a5b7a7f504bbf3d228",
+ "f443e3ca4d62b59aca84e990cacaf5c5",
+ "2b0930daa23de94ce87017ba2d84988d",
+ "dfc9c58db67aada613c2dd08457941a6"
+ ]
+ }
+}
diff --git a/test/800-38a.py b/test/800-38a.py
new file mode 100644
index 0000000..b029890
--- /dev/null
+++ b/test/800-38a.py
@@ -0,0 +1,33 @@
+# Copyright 2015 Egor Tensin <Egor.Tensin@gmail.com>
+# This file is licensed under the terms of the MIT License.
+# See LICENSE.txt for details.
+
+if __name__ == '__main__':
+ import argparse, json, toolkit, sys
+ parser = argparse.ArgumentParser()
+ parser.add_argument('--root', '-r', required=True,
+ help='set path to *.exe files')
+ parser.add_argument('--sde', '-e', action='store_true',
+ help='use Intel SDE to run *.exe files')
+ args = parser.parse_args()
+ tools = toolkit.Tools('C:\\build\\test\\Debug', use_sde=args.sde)
+ vectors = json.load(open('800-38a.json'))
+ success = True
+ for prefix in vectors:
+ if 'iv' in vectors[prefix]:
+ iv = vectors[prefix]['iv']
+ encrypt = lambda key, plaintexts: tools.encrypt_with_iv(prefix, key, iv, plaintexts)
+ decrypt = lambda key, ciphers: tools.decrypt_with_iv(prefix, key, iv, ciphers)
+ else:
+ encrypt = lambda key, plaintexts: tools.encrypt(prefix, key, plaintexts)
+ decrypt = lambda key, ciphers: tools.decrypt(prefix, key, ciphers)
+ key = vectors[prefix]['key']
+ plaintexts = vectors[prefix]['plaintexts']
+ ciphers = vectors[prefix]['ciphers']
+ success = success and tools.detect_mismatches(plaintexts, encrypt(key, plaintexts), ciphers)
+ success = success and tools.detect_mismatches(ciphers, decrypt(key, ciphers), plaintexts)
+ if success:
+ print('No mismatches detected!')
+ else:
+ print('Detected mismatches!')
+ sys.exit(1)
diff --git a/test/toolkit.py b/test/toolkit.py
new file mode 100644
index 0000000..3c5f9dd
--- /dev/null
+++ b/test/toolkit.py
@@ -0,0 +1,62 @@
+# Copyright 2015 Egor Tensin <Egor.Tensin@gmail.com>
+# This file is licensed under the terms of the MIT License.
+# See LICENSE.txt for details.
+
+import os.path
+import subprocess
+import sys
+
+class Tools:
+ def __init__(self, root_dir_path, use_sde=False):
+ self._root_dir_path = root_dir_path
+ self._use_sde = use_sde
+
+ def _get_tool_path(self, tool_name):
+ return os.path.join(self._root_dir_path, tool_name)
+
+ def _get_encrypt_tool_path(self, prefix):
+ return self._get_tool_path('{0}_encrypt.exe'.format(prefix))
+
+ def _get_decrypt_tool_path(self, prefix):
+ return self._get_tool_path('{0}_decrypt.exe'.format(prefix))
+
+ def _capture_tool_output(self, tool_path, args):
+ with_sde = ['sde', '--', tool_path] if self._use_sde else [tool_path]
+ return subprocess.check_output(with_sde + args, universal_newlines=True).split()
+
+ def encrypt(self, prefix, key, args):
+ print('Encrypting using \'{0}\'...'.format(prefix))
+ print('\tKey:', key)
+ return self._capture_tool_output(self._get_encrypt_tool_path(prefix), [key] + args)
+
+ def decrypt(self, prefix, key, args):
+ print('Decrypting using \'{0}\'...'.format(prefix))
+ print('\tKey:', key)
+ return self._capture_tool_output(self._get_decrypt_tool_path(prefix), [key] + args)
+
+ def encrypt_with_iv(self, prefix, key, iv, args):
+ print('Encrypting using \'{0}\'...'.format(prefix))
+ print('\tKey:', key)
+ print('\tInitialization vector:', iv)
+ return self._capture_tool_output(self._get_encrypt_tool_path(prefix), [key, iv] + args)
+
+ def decrypt_with_iv(self, prefix, key, iv, args):
+ print('Decrypting using \'{0}\'...'.format(prefix))
+ print('\tKey:', key)
+ print('\tInitialization vector:', iv)
+ return self._capture_tool_output(self._get_decrypt_tool_path(prefix), [key, iv] + args)
+
+ def detect_mismatches(self, input, actual_output, expected_output):
+ if len(actual_output) != len(expected_output):
+ print('Unexpected output length!', file=sys.stderr)
+ print('\tExpected length:', len(expected_output), file=sys.stderr)
+ print('\tActual length:', len(actual_output), file=sys.stderr)
+ return False
+ for i in range(len(input)):
+ if actual_output[i] != expected_output[i]:
+ print('A mismatch detected!', file=sys.stderr)
+ print('\tInput:', input[i], file=sys.stderr)
+ print('\tExpected:', expected_output[i], file=sys.stderr)
+ print('\tActual:', actual_output[i], file=sys.stderr)
+ return False
+ return True