# Copyright (c) 2015 Egor Tensin # This file is part of the "AES tools" project. # For details, see https://github.com/egor-tensin/aes-tools. # Distributed under the MIT License. import argparse from datetime import datetime from enum import Enum import logging import os.path from subprocess import CalledProcessError import sys from toolkit import Algorithm, BlockInput, Mode, Tools _TEST_PLAINTEXTS = [ '6bc1bee22e409f96e93d7e117393172a', 'ae2d8a571e03ac9c9eb76fac45af8e51', '30c81c46a35ce411e5fbc1191a0a52ef', 'f69f2445df4f9b17ad2b417be66c3710' ] _TEST_KEYS = { Algorithm.AES128: '2b7e151628aed2a6abf7158809cf4f3c', Algorithm.AES192: '8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b', Algorithm.AES256: '603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4' } _TEST_INIT_VECTOR = '000102030405060708090a0b0c0d0e0f' _TEST_INIT_VECTOR_CTR = 'f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff' _TEST_INIT_VECTORS = { Algorithm.AES128: { Mode.CBC: _TEST_INIT_VECTOR, Mode.CFB: _TEST_INIT_VECTOR, Mode.OFB: _TEST_INIT_VECTOR, Mode.CTR: _TEST_INIT_VECTOR_CTR } } _TEST_INIT_VECTORS[Algorithm.AES192] = _TEST_INIT_VECTORS[Algorithm.AES128] _TEST_INIT_VECTORS[Algorithm.AES256] = _TEST_INIT_VECTORS[Algorithm.AES128] _TEST_CIPHERTEXTS = { Algorithm.AES128: { Mode.ECB: [ '3ad77bb40d7a3660a89ecaf32466ef97', 'f5d3d58503b9699de785895a96fdbaaf', '43b1cd7f598ece23881b00e3ed030688', '7b0c785e27e8ad3f8223207104725dd4' ], Mode.CBC: [ '7649abac8119b246cee98e9b12e9197d', '5086cb9b507219ee95db113a917678b2', '73bed6b8e3c1743b7116e69e22229516', '3ff1caa1681fac09120eca307586e1a7' ], Mode.CFB: [ '3b3fd92eb72dad20333449f8e83cfb4a', 'c8a64537a0b3a93fcde3cdad9f1ce58b', '26751f67a3cbb140b1808cf187a4f4df', 'c04b05357c5d1c0eeac4c66f9ff7f2e6' ], Mode.OFB: [ '3b3fd92eb72dad20333449f8e83cfb4a', '7789508d16918f03f53c52dac54ed825', '9740051e9c5fecf64344f7a82260edcc', '304c6528f659c77866a510d9c1d6ae5e' ], Mode.CTR: [ '874d6191b620e3261bef6864990db6ce', '9806f66b7970fdff8617187bb9fffdff', '5ae4df3edbd5d35e5b4f09020db03eab', '1e031dda2fbe03d1792170a0f3009cee' ] }, Algorithm.AES192: { Mode.ECB: [ 'bd334f1d6e45f25ff712a214571fa5cc', '974104846d0ad3ad7734ecb3ecee4eef', 'ef7afd2270e2e60adce0ba2face6444e', '9a4b41ba738d6c72fb16691603c18e0e' ], Mode.CBC: [ '4f021db243bc633d7178183a9fa071e8', 'b4d9ada9ad7dedf4e5e738763f69145a', '571b242012fb7ae07fa9baac3df102e0', '08b0e27988598881d920a9e64f5615cd' ], Mode.CFB: [ 'cdc80d6fddf18cab34c25909c99a4174', '67ce7f7f81173621961a2b70171d3d7a', '2e1e8a1dd59b88b1c8e60fed1efac4c9', 'c05f9f9ca9834fa042ae8fba584b09ff' ], Mode.OFB: [ 'cdc80d6fddf18cab34c25909c99a4174', 'fcc28b8d4c63837c09e81700c1100401', '8d9a9aeac0f6596f559c6d4daf59a5f2', '6d9f200857ca6c3e9cac524bd9acc92a' ], Mode.CTR: [ '1abc932417521ca24f2b0459fe7e6e0b', '090339ec0aa6faefd5ccc2c6f4ce8e94', '1e36b26bd1ebc670d1bd1d665620abf7', '4f78a7f6d29809585a97daec58c6b050' ] }, Algorithm.AES256: { Mode.ECB: [ 'f3eed1bdb5d2a03c064b5a7e3db181f8', '591ccb10d410ed26dc5ba74a31362870', 'b6ed21b99ca6f4f9f153e7b1beafed1d', '23304b7a39f9f3ff067d8d8f9e24ecc7' ], Mode.CBC: [ 'f58c4c04d6e5f1ba779eabfb5f7bfbd6', '9cfc4e967edb808d679f777bc6702c7d', '39f23369a9d9bacfa530e26304231461', 'b2eb05e2c39be9fcda6c19078c6a9d1b' ], Mode.CFB: [ 'dc7e84bfda79164b7ecd8486985d3860', '39ffed143b28b1c832113c6331e5407b', 'df10132415e54b92a13ed0a8267ae2f9', '75a385741ab9cef82031623d55b1e471' ], Mode.OFB: [ 'dc7e84bfda79164b7ecd8486985d3860', '4febdc6740d20b3ac88f6ad82a4fb08d', '71ab47a086e86eedf39d1c5bba97c408', '0126141d67f37be8538f5a8be740e484' ], Mode.CTR: [ '601ec313775789a5b7a7f504bbf3d228', 'f443e3ca4d62b59aca84e990cacaf5c5', '2b0930daa23de94ce87017ba2d84988d', 'dfc9c58db67aada613c2dd08457941a6' ] } } def get_test_plaintexts(*_): return _TEST_PLAINTEXTS def get_test_key(algorithm, *_): return _TEST_KEYS[algorithm] def get_test_iv(algorithm, mode): if not mode.requires_init_vector(): return None return _TEST_INIT_VECTORS[algorithm][mode] def get_test_ciphertexts(algorithm, mode): return _TEST_CIPHERTEXTS[algorithm][mode] def get_tested_algorithms_and_modes(): for algorithm in _TEST_CIPHERTEXTS: for mode in _TEST_CIPHERTEXTS[algorithm]: yield algorithm, mode def verify_test_output(actual, expected): if len(actual) != len(expected): logging.error('Unexpected output length!') logging.error('\tExpected: %d', len(expected)) logging.error('\tActual: %d', len(actual)) return False if actual != expected: logging.error('Expected output:\n' + '\n'.join(expected)) return False return True class TestExitCode(Enum): SUCCESS, FAILURE, ERROR, SKIPPED = range(1, 5) def run_encryption_test(tools, algorithm, mode, use_boxes=False): logging.debug('Running encryption test...') logging.debug('Algorithm: %s', algorithm) logging.debug('Mode: %s', mode) try: plaintexts = get_test_plaintexts(algorithm, mode) key = get_test_key(algorithm, mode) iv = get_test_iv(algorithm, mode) expected_ciphertexts = get_test_ciphertexts(algorithm, mode) input_ = BlockInput(key, plaintexts, iv=iv) actual_ciphertexts = tools.run_encrypt_block( algorithm, mode, input_, use_boxes) if verify_test_output(actual_ciphertexts, expected_ciphertexts): return TestExitCode.SUCCESS return TestExitCode.FAILURE except CalledProcessError as e: logging.error('Encountered an exception!') logging.exception(e) return TestExitCode.ERROR def run_decryption_test(tools, algorithm, mode, use_boxes=False): logging.debug('Running decryption test...') logging.debug('Algorithm: %s', algorithm) logging.debug('Mode: %s', mode) try: ciphertexts = get_test_ciphertexts(algorithm, mode) key = get_test_key(algorithm, mode) iv = get_test_iv(algorithm, mode) expected_plaintexts = get_test_plaintexts(algorithm, mode) input_ = BlockInput(key, ciphertexts, iv=iv) actual_plaintexts = tools.run_decrypt_block( algorithm, mode, input_, use_boxes) if verify_test_output(actual_plaintexts, expected_plaintexts): return TestExitCode.SUCCESS return TestExitCode.FAILURE except CalledProcessError as e: logging.error('Encountered an exception!') logging.exception(e) return TestExitCode.ERROR def _setup_logging(verbose=False): level = logging.DEBUG if verbose else logging.INFO logging.basicConfig( format='%(asctime)s | %(module)s | %(levelname)s | %(message)s', level=level) def run_tests(tools_path=(), use_sde=False, use_boxes=False, verbose=False): _setup_logging(verbose) tools = Tools(tools_path, use_sde=use_sde) exit_codes = [] for algorithm, mode in get_tested_algorithms_and_modes(): exit_codes.append(run_encryption_test( tools, algorithm, mode, use_boxes=use_boxes)) exit_codes.append(run_decryption_test( tools, algorithm, mode, use_boxes=use_boxes)) logging.info('Test exit codes:') logging.info('\tSkipped: %d', exit_codes.count(TestExitCode.SKIPPED)) logging.info('\tError(s): %d', exit_codes.count(TestExitCode.ERROR)) logging.info('\tSucceeded: %d', exit_codes.count(TestExitCode.SUCCESS)) logging.info('\tFailed: %d', exit_codes.count(TestExitCode.FAILURE)) if (exit_codes.count(TestExitCode.ERROR) == 0 and exit_codes.count(TestExitCode.FAILURE) == 0): return 0 else: return 1 def _parse_args(args=None): if args is None: args = sys.argv[1:] parser = argparse.ArgumentParser() parser.add_argument('--path', '-p', dest='tools_path', metavar='PATH', nargs='*', help='set block encryption utilities directory path') parser.add_argument('--sde', '-e', action='store_true', dest='use_sde', help='use Intel SDE to run the utilities') parser.add_argument('--boxes', '-b', action='store_true', dest='use_boxes', help='use the "boxes" interface') parser.add_argument('--verbose', '-v', action='store_true', help='verbose log output') return parser.parse_args(args) def main(args=None): return run_tests(**vars(_parse_args(args))) if __name__ == '__main__': sys.exit(main())