# Copyright (c) 2015 Egor Tensin # This file is part of the "AES tools" project. # For details, see https://github.com/egor-tensin/aes-tools. # Distributed under the MIT License. import argparse from collections import OrderedDict from collections.abc import MutableSequence import configparser from datetime import datetime from enum import Enum import logging import os.path from subprocess import CalledProcessError import sys from tempfile import TemporaryDirectory import zipfile from toolkit import Algorithm, BlockInput, Mode, Tools class _MultiOrderedDict(OrderedDict): def __setitem__(self, key, value): if isinstance(value, MutableSequence) and key in self: self[key].extend(value) else: super(OrderedDict, self).__setitem__(key, value) def verify_test_output(actual, expected): if len(actual) != len(expected): logging.error('Unexpected output length!') logging.error('\tExpected: %d', len(expected)) logging.error('\tActual: %d', len(actual)) return False if actual != expected: logging.error('Expected output:\n%s', '\n'.join(expected)) return False return True class TestExitCode(Enum): SUCCESS, FAILURE, ERROR, SKIPPED = range(1, 5) class TestFile: def __init__(self, path): self._path = path self._algorithm = None self._mode = None self._recognized = False self._parse_path() if not self.recognized(): return self._parse_data() def recognized(self): return self._recognized def algorithm(self): return self._algorithm def mode(self): return self._mode def _parse_data_section(self, parser, section): keys = parser.get(section, 'key') plaintexts = parser.get(section, 'plaintext') ciphertexts = parser.get(section, 'ciphertext') init_vectors = None if self.mode().requires_init_vector(): init_vectors = parser.get(section, 'iv') return keys, plaintexts, ciphertexts, init_vectors def _parse_data(self): parser = configparser.ConfigParser( dict_type=_MultiOrderedDict, strict=False, interpolation=None, empty_lines_in_values=False) with open(self._path) as fd: parser.read_string(fd.read()) self._encryption_data = self._parse_data_section(parser, 'ENCRYPT') self._decryption_data = self._parse_data_section(parser, 'DECRYPT') @staticmethod def _gen_inputs(keys, plaintexts, init_vectors): if init_vectors is None: init_vectors = [None for key in keys] for key, plaintext, iv in zip(keys, plaintexts, init_vectors): yield BlockInput(key, [plaintext], iv) @staticmethod def _split_into_chunks(expected_output, inputs, max_len=100): for i in range(0, len(inputs), max_len): yield expected_output[i:i+max_len], inputs[i:i+max_len] def _run_tests(self, tool, inputs, expected_output, use_boxes=False): for expected_output_chunk, input_chunk in self._split_into_chunks(expected_output, list(inputs)): actual_output = tool(self.algorithm(), self.mode(), input_chunk, use_boxes=use_boxes) if not verify_test_output(actual_output, expected_output_chunk): return TestExitCode.FAILURE return TestExitCode.SUCCESS def run_encryption_tests(self, tools, use_boxes=False): logging.debug('Running encryption tests...') if not self.recognized(): return TestExitCode.SKIPPED try: keys, plaintexts, ciphertexts, init_vectors = self._encryption_data inputs = self._gen_inputs(keys, plaintexts, init_vectors) return self._run_tests(tools.run_encrypt_block, inputs, ciphertexts, use_boxes) except CalledProcessError as e: logging.error('Encountered an exception!') logging.exception(e) return TestExitCode.ERROR def run_decryption_tests(self, tools, use_boxes=False): logging.debug('Running decryption tests...') if not self.recognized(): return TestExitCode.SKIPPED try: keys, plaintexts, ciphertexts, init_vectors = self._decryption_data inputs = self._gen_inputs(keys, ciphertexts, init_vectors) return self._run_tests(tools.run_decrypt_block, inputs, plaintexts, use_boxes) except CalledProcessError as e: logging.error('Encountered an exception!') logging.exception(e) return TestExitCode.ERROR def _parse_path(self): logging.debug('Trying to parse test file path \'%s\'...', self._path) stub = self._strip_extension(os.path.basename(self._path)) if not stub: return stub = self._strip_algorithm(stub) if not stub: return stub = self._strip_method(stub) if not stub: return stub = self._strip_mode(stub) if not stub: return self._recognized = True _RECOGNIZED_EXT = '.rsp' def _strip_extension(self, path): stub, ext = os.path.splitext(path) if ext != self._RECOGNIZED_EXT: logging.warning('Unknown test vectors file extension \'%s\'!', self._path) return None return stub def _strip_algorithm(self, stub): key_size = stub[-3:] maybe_algorithm = 'aes{}'.format(key_size) self._algorithm = Algorithm.try_parse(maybe_algorithm) if self._algorithm is None: logging.warning('Unknown or unsupported algorithm: %s', self._path) return None logging.debug('\tAlgorithm: %s', self._algorithm) return stub[0:-3] _RECOGNIZED_METHODS = ('GFSbox', 'KeySbox', 'VarKey', 'VarTxt') def _strip_method(self, stub): for method in self._RECOGNIZED_METHODS: if stub.endswith(method): logging.debug('\tMethod: %s', method) return stub[0:len(stub) - len(method)] logging.warning('Unknown or unsupported method: %s', self._path) return None def _strip_mode(self, stub): self._mode = Mode.try_parse(stub) if self._mode is None: logging.warning('Unknown or unsupported mode: %s', self._path) return None logging.debug('\tMode: %s', self._mode) return self._mode class TestArchive(zipfile.ZipFile): def __init__(self, path): super().__init__(path) def enum_test_files(self): with TemporaryDirectory() as tmp_dir: for path in self.namelist(): yield TestFile(self.extract(path, tmp_dir)) _script_dir = os.path.dirname(__file__) def _setup_logging(verbose=False): level = logging.DEBUG if verbose else logging.INFO logging.basicConfig( format='%(asctime)s | %(module)s | %(levelname)s | %(message)s', level=level) def run_tests(archive_path, tools_path=(), use_sde=False, use_boxes=False, verbose=False): _setup_logging(verbose) tools = Tools(tools_path, use_sde=use_sde) archive = TestArchive(archive_path) exit_codes = [] for test_file in archive.enum_test_files(): exit_codes.append(test_file.run_encryption_tests(tools, use_boxes)) exit_codes.append(test_file.run_decryption_tests(tools, use_boxes)) logging.info('Test exit codes:') logging.info('\tSkipped: %d', exit_codes.count(TestExitCode.SKIPPED)) logging.info('\tError(s): %d', exit_codes.count(TestExitCode.ERROR)) logging.info('\tSucceeded: %d', exit_codes.count(TestExitCode.SUCCESS)) logging.info('\tFailed: %d', exit_codes.count(TestExitCode.FAILURE)) if (exit_codes.count(TestExitCode.ERROR) == 0 and exit_codes.count(TestExitCode.FAILURE) == 0): return 0 else: return 1 def _parse_args(args=None): if args is None: args = sys.argv[1:] parser = argparse.ArgumentParser() parser.add_argument('--path', '-p', dest='tools_path', metavar='PATH', nargs='*', help='set block encryption utilities directory path') parser.add_argument('--sde', '-e', action='store_true', dest='use_sde', help='use Intel SDE to run the utilities') parser.add_argument('--boxes', '-b', action='store_true', dest='use_boxes', help='use the "boxes" interface') parser.add_argument('--archive', '-a', dest='archive_path', metavar='PATH', default=os.path.join(_script_dir, 'data/KAT_AES.zip'), help='set test vectors archive file path') parser.add_argument('--verbose', '-v', action='store_true', help='verbose log output') return parser.parse_args(args) def main(args=None): return run_tests(**vars(_parse_args(args))) if __name__ == '__main__': sys.exit(main())