Alex Gaynor | a2e1f54 | 2013-08-10 08:59:11 -0400 | [diff] [blame] | 1 | # Licensed under the Apache License, Version 2.0 (the "License"); |
| 2 | # you may not use this file except in compliance with the License. |
| 3 | # You may obtain a copy of the License at |
| 4 | # |
| 5 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 6 | # |
| 7 | # Unless required by applicable law or agreed to in writing, software |
| 8 | # distributed under the License is distributed on an "AS IS" BASIS, |
| 9 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or |
| 10 | # implied. |
| 11 | # See the License for the specific language governing permissions and |
| 12 | # limitations under the License. |
| 13 | |
Donald Stufft | ec672e8 | 2013-08-09 01:20:03 -0400 | [diff] [blame] | 14 | """ |
| 15 | Test using the NIST Test Vectors |
| 16 | """ |
Hynek Schlawack | 425f584 | 2013-08-11 09:54:59 +0200 | [diff] [blame] | 17 | |
| 18 | from __future__ import absolute_import, division, print_function |
| 19 | |
Donald Stufft | ec672e8 | 2013-08-09 01:20:03 -0400 | [diff] [blame] | 20 | import binascii |
Alex Gaynor | aef7ee8 | 2013-08-08 22:31:11 -0700 | [diff] [blame] | 21 | import os |
Donald Stufft | ec672e8 | 2013-08-09 01:20:03 -0400 | [diff] [blame] | 22 | |
Alex Gaynor | 1fe70b1 | 2013-10-16 11:59:17 -0700 | [diff] [blame] | 23 | from cryptography.primitives.block import ciphers, modes |
Donald Stufft | ec672e8 | 2013-08-09 01:20:03 -0400 | [diff] [blame] | 24 | |
Alex Gaynor | 1fe70b1 | 2013-10-16 11:59:17 -0700 | [diff] [blame] | 25 | from .utils import generate_encrypt_test |
Donald Stufft | ec672e8 | 2013-08-09 01:20:03 -0400 | [diff] [blame] | 26 | from ..utils import load_nist_vectors_from_file |
| 27 | |
| 28 | |
Alex Gaynor | aef7ee8 | 2013-08-08 22:31:11 -0700 | [diff] [blame] | 29 | class TestAES_CBC(object): |
Alex Gaynor | 1fe70b1 | 2013-10-16 11:59:17 -0700 | [diff] [blame] | 30 | test_KAT = generate_encrypt_test( |
| 31 | lambda path: load_nist_vectors_from_file(path, "ENCRYPT"), |
Alex Gaynor | 016eed1 | 2013-10-16 14:16:04 -0700 | [diff] [blame] | 32 | os.path.join("AES", "KAT"), |
Alex Gaynor | 920e330 | 2013-09-10 16:55:52 -0700 | [diff] [blame] | 33 | [ |
| 34 | "CBCGFSbox128.rsp", |
| 35 | "CBCGFSbox192.rsp", |
| 36 | "CBCGFSbox256.rsp", |
| 37 | "CBCKeySbox128.rsp", |
| 38 | "CBCKeySbox192.rsp", |
| 39 | "CBCKeySbox256.rsp", |
| 40 | "CBCVarKey128.rsp", |
| 41 | "CBCVarKey192.rsp", |
| 42 | "CBCVarKey256.rsp", |
| 43 | "CBCVarTxt128.rsp", |
| 44 | "CBCVarTxt192.rsp", |
| 45 | "CBCVarTxt256.rsp", |
Alex Gaynor | 1fe70b1 | 2013-10-16 11:59:17 -0700 | [diff] [blame] | 46 | ], |
| 47 | lambda key, iv: ciphers.AES(binascii.unhexlify(key)), |
| 48 | lambda key, iv: modes.CBC(binascii.unhexlify(iv)), |
Alex Gaynor | 920e330 | 2013-09-10 16:55:52 -0700 | [diff] [blame] | 49 | ) |
Donald Stufft | ec672e8 | 2013-08-09 01:20:03 -0400 | [diff] [blame] | 50 | |
Alex Gaynor | 1fe70b1 | 2013-10-16 11:59:17 -0700 | [diff] [blame] | 51 | test_MMT = generate_encrypt_test( |
| 52 | lambda path: load_nist_vectors_from_file(path, "ENCRYPT"), |
Alex Gaynor | 016eed1 | 2013-10-16 14:16:04 -0700 | [diff] [blame] | 53 | os.path.join("AES", "MMT"), |
Alex Gaynor | 920e330 | 2013-09-10 16:55:52 -0700 | [diff] [blame] | 54 | [ |
| 55 | "CBCMMT128.rsp", |
| 56 | "CBCMMT192.rsp", |
| 57 | "CBCMMT256.rsp", |
Alex Gaynor | 1fe70b1 | 2013-10-16 11:59:17 -0700 | [diff] [blame] | 58 | ], |
| 59 | lambda key, iv: ciphers.AES(binascii.unhexlify(key)), |
| 60 | lambda key, iv: modes.CBC(binascii.unhexlify(iv)), |
Alex Gaynor | 920e330 | 2013-09-10 16:55:52 -0700 | [diff] [blame] | 61 | ) |
Paul Kehrer | 13f108f | 2013-09-09 21:41:03 -0500 | [diff] [blame] | 62 | |
| 63 | |
| 64 | class TestAES_ECB(object): |
Alex Gaynor | 1fe70b1 | 2013-10-16 11:59:17 -0700 | [diff] [blame] | 65 | test_KAT = generate_encrypt_test( |
| 66 | lambda path: load_nist_vectors_from_file(path, "ENCRYPT"), |
Alex Gaynor | 016eed1 | 2013-10-16 14:16:04 -0700 | [diff] [blame] | 67 | os.path.join("AES", "KAT"), |
Paul Kehrer | 13f108f | 2013-09-09 21:41:03 -0500 | [diff] [blame] | 68 | [ |
| 69 | "ECBGFSbox128.rsp", |
| 70 | "ECBGFSbox192.rsp", |
| 71 | "ECBGFSbox256.rsp", |
| 72 | "ECBKeySbox128.rsp", |
| 73 | "ECBKeySbox192.rsp", |
| 74 | "ECBKeySbox256.rsp", |
| 75 | "ECBVarKey128.rsp", |
| 76 | "ECBVarKey192.rsp", |
| 77 | "ECBVarKey256.rsp", |
| 78 | "ECBVarTxt128.rsp", |
| 79 | "ECBVarTxt192.rsp", |
| 80 | "ECBVarTxt256.rsp", |
Alex Gaynor | 1fe70b1 | 2013-10-16 11:59:17 -0700 | [diff] [blame] | 81 | ], |
| 82 | lambda key: ciphers.AES(binascii.unhexlify(key)), |
| 83 | lambda key: modes.ECB(), |
Paul Kehrer | 13f108f | 2013-09-09 21:41:03 -0500 | [diff] [blame] | 84 | ) |
Paul Kehrer | 13f108f | 2013-09-09 21:41:03 -0500 | [diff] [blame] | 85 | |
Alex Gaynor | 1fe70b1 | 2013-10-16 11:59:17 -0700 | [diff] [blame] | 86 | test_MMT = generate_encrypt_test( |
| 87 | lambda path: load_nist_vectors_from_file(path, "ENCRYPT"), |
Alex Gaynor | 016eed1 | 2013-10-16 14:16:04 -0700 | [diff] [blame] | 88 | os.path.join("AES", "MMT"), |
Paul Kehrer | 13f108f | 2013-09-09 21:41:03 -0500 | [diff] [blame] | 89 | [ |
| 90 | "ECBMMT128.rsp", |
| 91 | "ECBMMT192.rsp", |
| 92 | "ECBMMT256.rsp", |
Alex Gaynor | 1fe70b1 | 2013-10-16 11:59:17 -0700 | [diff] [blame] | 93 | ], |
| 94 | lambda key: ciphers.AES(binascii.unhexlify(key)), |
| 95 | lambda key: modes.ECB(), |
Paul Kehrer | 13f108f | 2013-09-09 21:41:03 -0500 | [diff] [blame] | 96 | ) |
Paul Kehrer | 6f412a0 | 2013-09-10 21:30:50 -0500 | [diff] [blame] | 97 | |
| 98 | |
| 99 | class TestAES_OFB(object): |
Alex Gaynor | 1fe70b1 | 2013-10-16 11:59:17 -0700 | [diff] [blame] | 100 | test_KAT = generate_encrypt_test( |
| 101 | lambda path: load_nist_vectors_from_file(path, "ENCRYPT"), |
Alex Gaynor | 016eed1 | 2013-10-16 14:16:04 -0700 | [diff] [blame] | 102 | os.path.join("AES", "KAT"), |
Paul Kehrer | 6f412a0 | 2013-09-10 21:30:50 -0500 | [diff] [blame] | 103 | [ |
| 104 | "OFBGFSbox128.rsp", |
| 105 | "OFBGFSbox192.rsp", |
| 106 | "OFBGFSbox256.rsp", |
| 107 | "OFBKeySbox128.rsp", |
| 108 | "OFBKeySbox192.rsp", |
| 109 | "OFBKeySbox256.rsp", |
| 110 | "OFBVarKey128.rsp", |
| 111 | "OFBVarKey192.rsp", |
| 112 | "OFBVarKey256.rsp", |
| 113 | "OFBVarTxt128.rsp", |
| 114 | "OFBVarTxt192.rsp", |
| 115 | "OFBVarTxt256.rsp", |
Alex Gaynor | 1fe70b1 | 2013-10-16 11:59:17 -0700 | [diff] [blame] | 116 | ], |
| 117 | lambda key, iv: ciphers.AES(binascii.unhexlify(key)), |
| 118 | lambda key, iv: modes.OFB(binascii.unhexlify(iv)), |
Paul Kehrer | 6f412a0 | 2013-09-10 21:30:50 -0500 | [diff] [blame] | 119 | ) |
Paul Kehrer | 6f412a0 | 2013-09-10 21:30:50 -0500 | [diff] [blame] | 120 | |
Alex Gaynor | 1fe70b1 | 2013-10-16 11:59:17 -0700 | [diff] [blame] | 121 | test_MMT = generate_encrypt_test( |
| 122 | lambda path: load_nist_vectors_from_file(path, "ENCRYPT"), |
Alex Gaynor | 016eed1 | 2013-10-16 14:16:04 -0700 | [diff] [blame] | 123 | os.path.join("AES", "MMT"), |
Paul Kehrer | 6f412a0 | 2013-09-10 21:30:50 -0500 | [diff] [blame] | 124 | [ |
| 125 | "OFBMMT128.rsp", |
| 126 | "OFBMMT192.rsp", |
| 127 | "OFBMMT256.rsp", |
Alex Gaynor | 1fe70b1 | 2013-10-16 11:59:17 -0700 | [diff] [blame] | 128 | ], |
| 129 | lambda key, iv: ciphers.AES(binascii.unhexlify(key)), |
| 130 | lambda key, iv: modes.OFB(binascii.unhexlify(iv)), |
Paul Kehrer | 6f412a0 | 2013-09-10 21:30:50 -0500 | [diff] [blame] | 131 | ) |
Paul Kehrer | a1ec262 | 2013-09-11 09:38:45 -0500 | [diff] [blame] | 132 | |
| 133 | |
| 134 | class TestAES_CFB(object): |
Alex Gaynor | 1fe70b1 | 2013-10-16 11:59:17 -0700 | [diff] [blame] | 135 | test_KAT = generate_encrypt_test( |
| 136 | lambda path: load_nist_vectors_from_file(path, "ENCRYPT"), |
Alex Gaynor | 016eed1 | 2013-10-16 14:16:04 -0700 | [diff] [blame] | 137 | os.path.join("AES", "KAT"), |
Paul Kehrer | a1ec262 | 2013-09-11 09:38:45 -0500 | [diff] [blame] | 138 | [ |
| 139 | "CFB128GFSbox128.rsp", |
| 140 | "CFB128GFSbox192.rsp", |
| 141 | "CFB128GFSbox256.rsp", |
| 142 | "CFB128KeySbox128.rsp", |
| 143 | "CFB128KeySbox192.rsp", |
| 144 | "CFB128KeySbox256.rsp", |
| 145 | "CFB128VarKey128.rsp", |
| 146 | "CFB128VarKey192.rsp", |
| 147 | "CFB128VarKey256.rsp", |
| 148 | "CFB128VarTxt128.rsp", |
| 149 | "CFB128VarTxt192.rsp", |
| 150 | "CFB128VarTxt256.rsp", |
Alex Gaynor | 1fe70b1 | 2013-10-16 11:59:17 -0700 | [diff] [blame] | 151 | ], |
| 152 | lambda key, iv: ciphers.AES(binascii.unhexlify(key)), |
| 153 | lambda key, iv: modes.CFB(binascii.unhexlify(iv)), |
Paul Kehrer | a1ec262 | 2013-09-11 09:38:45 -0500 | [diff] [blame] | 154 | ) |
Paul Kehrer | a1ec262 | 2013-09-11 09:38:45 -0500 | [diff] [blame] | 155 | |
Alex Gaynor | 1fe70b1 | 2013-10-16 11:59:17 -0700 | [diff] [blame] | 156 | test_MMT = generate_encrypt_test( |
| 157 | lambda path: load_nist_vectors_from_file(path, "ENCRYPT"), |
Alex Gaynor | 016eed1 | 2013-10-16 14:16:04 -0700 | [diff] [blame] | 158 | os.path.join("AES", "MMT"), |
Paul Kehrer | a1ec262 | 2013-09-11 09:38:45 -0500 | [diff] [blame] | 159 | [ |
| 160 | "CFB128MMT128.rsp", |
| 161 | "CFB128MMT192.rsp", |
| 162 | "CFB128MMT256.rsp", |
Alex Gaynor | 1fe70b1 | 2013-10-16 11:59:17 -0700 | [diff] [blame] | 163 | ], |
| 164 | lambda key, iv: ciphers.AES(binascii.unhexlify(key)), |
| 165 | lambda key, iv: modes.CFB(binascii.unhexlify(iv)), |
Paul Kehrer | a1ec262 | 2013-09-11 09:38:45 -0500 | [diff] [blame] | 166 | ) |
Alex Gaynor | 9f44cab | 2013-09-09 19:04:16 -0700 | [diff] [blame] | 167 | |
| 168 | |
| 169 | class TestTripleDES_CBC(object): |
Alex Gaynor | a4ce161 | 2013-10-21 19:27:11 -0700 | [diff] [blame] | 170 | test_KAT = generate_encrypt_test( |
Alex Gaynor | e761f8b | 2013-10-16 16:55:40 -0700 | [diff] [blame] | 171 | lambda path: load_nist_vectors_from_file(path, "ENCRYPT"), |
| 172 | os.path.join("3DES", "KAT"), |
Alex Gaynor | 920e330 | 2013-09-10 16:55:52 -0700 | [diff] [blame] | 173 | [ |
| 174 | "TCBCinvperm.rsp", |
| 175 | "TCBCpermop.rsp", |
| 176 | "TCBCsubtab.rsp", |
| 177 | "TCBCvarkey.rsp", |
| 178 | "TCBCvartext.rsp", |
Alex Gaynor | e761f8b | 2013-10-16 16:55:40 -0700 | [diff] [blame] | 179 | ], |
| 180 | lambda keys, iv: ciphers.TripleDES(binascii.unhexlify(keys)), |
Alex Gaynor | 5e04ba6 | 2013-10-21 16:16:29 -0700 | [diff] [blame] | 181 | lambda keys, iv: modes.CBC(binascii.unhexlify(iv)), |
Alex Gaynor | 920e330 | 2013-09-10 16:55:52 -0700 | [diff] [blame] | 182 | ) |
Alex Gaynor | 9f44cab | 2013-09-09 19:04:16 -0700 | [diff] [blame] | 183 | |
Alex Gaynor | a4ce161 | 2013-10-21 19:27:11 -0700 | [diff] [blame] | 184 | test_MMT = generate_encrypt_test( |
Alex Gaynor | e761f8b | 2013-10-16 16:55:40 -0700 | [diff] [blame] | 185 | lambda path: load_nist_vectors_from_file(path, "ENCRYPT"), |
| 186 | os.path.join("3DES", "MMT"), |
Alex Gaynor | 920e330 | 2013-09-10 16:55:52 -0700 | [diff] [blame] | 187 | [ |
Alex Gaynor | dc42400 | 2013-10-21 16:51:31 -0700 | [diff] [blame] | 188 | "TCBCMMT1.rsp", |
| 189 | "TCBCMMT2.rsp", |
| 190 | "TCBCMMT3.rsp", |
| 191 | ], |
| 192 | lambda key1, key2, key3, iv: ( |
| 193 | ciphers.TripleDES(binascii.unhexlify(key1 + key2 + key3)) |
| 194 | ), |
| 195 | lambda key1, key2, key3, iv: modes.CBC(binascii.unhexlify(iv)), |
| 196 | ) |
| 197 | |
Alex Gaynor | dc42400 | 2013-10-21 16:51:31 -0700 | [diff] [blame] | 198 | |
| 199 | class TestTripleDES_OFB(object): |
Alex Gaynor | a4ce161 | 2013-10-21 19:27:11 -0700 | [diff] [blame] | 200 | test_KAT = generate_encrypt_test( |
Alex Gaynor | 804e981 | 2013-10-21 17:04:40 -0700 | [diff] [blame] | 201 | lambda path: load_nist_vectors_from_file(path, "ENCRYPT"), |
| 202 | os.path.join("3DES", "KAT"), |
| 203 | [ |
Alex Gaynor | d472862 | 2013-10-21 17:10:12 -0700 | [diff] [blame] | 204 | "TOFBpermop.rsp", |
| 205 | "TOFBsubtab.rsp", |
| 206 | "TOFBvarkey.rsp", |
| 207 | "TOFBvartext.rsp", |
| 208 | "TOFBinvperm.rsp", |
Alex Gaynor | 804e981 | 2013-10-21 17:04:40 -0700 | [diff] [blame] | 209 | ], |
Alex Gaynor | d472862 | 2013-10-21 17:10:12 -0700 | [diff] [blame] | 210 | lambda keys, iv: ciphers.TripleDES(binascii.unhexlify(keys)), |
Alex Gaynor | 1db9319 | 2013-10-21 19:13:48 -0700 | [diff] [blame] | 211 | lambda keys, iv: modes.OFB(binascii.unhexlify(iv)), |
Alex Gaynor | 804e981 | 2013-10-21 17:04:40 -0700 | [diff] [blame] | 212 | ) |
| 213 | |
Alex Gaynor | a4ce161 | 2013-10-21 19:27:11 -0700 | [diff] [blame] | 214 | test_MMT = generate_encrypt_test( |
Alex Gaynor | e761f8b | 2013-10-16 16:55:40 -0700 | [diff] [blame] | 215 | lambda path: load_nist_vectors_from_file(path, "ENCRYPT"), |
| 216 | os.path.join("3DES", "MMT"), |
Alex Gaynor | 920e330 | 2013-09-10 16:55:52 -0700 | [diff] [blame] | 217 | [ |
Alex Gaynor | dc42400 | 2013-10-21 16:51:31 -0700 | [diff] [blame] | 218 | "TOFBMMT1.rsp", |
| 219 | "TOFBMMT2.rsp", |
| 220 | "TOFBMMT3.rsp", |
Alex Gaynor | e761f8b | 2013-10-16 16:55:40 -0700 | [diff] [blame] | 221 | ], |
Alex Gaynor | 19642a1 | 2013-10-21 16:36:29 -0700 | [diff] [blame] | 222 | lambda key1, key2, key3, iv: ( |
| 223 | ciphers.TripleDES(binascii.unhexlify(key1 + key2 + key3)) |
| 224 | ), |
Alex Gaynor | 1db9319 | 2013-10-21 19:13:48 -0700 | [diff] [blame] | 225 | lambda key1, key2, key3, iv: modes.OFB(binascii.unhexlify(iv)), |
Alex Gaynor | 920e330 | 2013-09-10 16:55:52 -0700 | [diff] [blame] | 226 | ) |
Alex Gaynor | 19642a1 | 2013-10-21 16:36:29 -0700 | [diff] [blame] | 227 | |
Alex Gaynor | 19642a1 | 2013-10-21 16:36:29 -0700 | [diff] [blame] | 228 | |
| 229 | class TestTripleDES_CFB(object): |
Alex Gaynor | 8e251e7 | 2013-10-21 19:25:54 -0700 | [diff] [blame] | 230 | test_KAT = generate_encrypt_test( |
| 231 | lambda path: load_nist_vectors_from_file(path, "ENCRYPT"), |
| 232 | os.path.join("3DES", "KAT"), |
| 233 | [ |
| 234 | "TCFB64invperm.rsp", |
| 235 | "TCFB64permop.rsp", |
| 236 | "TCFB64subtab.rsp", |
| 237 | "TCFB64varkey.rsp", |
| 238 | "TCFB64vartext.rsp", |
| 239 | ], |
| 240 | lambda keys, iv: ciphers.TripleDES(binascii.unhexlify(keys)), |
| 241 | lambda keys, iv: modes.CFB(binascii.unhexlify(iv)), |
| 242 | ) |
| 243 | |
| 244 | test_MMT = generate_encrypt_test( |
| 245 | lambda path: load_nist_vectors_from_file(path, "ENCRYPT"), |
| 246 | os.path.join("3DES", "MMT"), |
| 247 | [ |
| 248 | "TCFB64MMT1.rsp", |
| 249 | "TCFB64MMT2.rsp", |
| 250 | "TCFB64MMT3.rsp", |
| 251 | ], |
| 252 | lambda key1, key2, key3, iv: ( |
| 253 | ciphers.TripleDES(binascii.unhexlify(key1 + key2 + key3)) |
| 254 | ), |
| 255 | lambda key1, key2, key3, iv: modes.CFB(binascii.unhexlify(iv)), |
| 256 | ) |