blob: 064011c3bc6e5cfcb84843a11777e93c2468eb5d [file] [log] [blame]
Alex Gaynorf312a5c2013-08-10 15:23:38 -04001# Licensed under the Apache License, Version 2.0 (the "License");
2# you may not use this file except in compliance with the License.
3# You may obtain a copy of the License at
4#
5# http://www.apache.org/licenses/LICENSE-2.0
6#
7# Unless required by applicable law or agreed to in writing, software
8# distributed under the License is distributed on an "AS IS" BASIS,
9# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
10# implied.
11# See the License for the specific language governing permissions and
12# limitations under the License.
13
Alex Gaynorc37feed2014-03-08 08:32:56 -080014from __future__ import absolute_import, division, print_function
15
Alex Gaynorab53bc52013-11-12 09:37:59 -080016import os
Donald Stufft9e1a48b2013-08-09 00:32:30 -040017import textwrap
18
Mohammed Attia98afd762014-03-12 16:28:57 +020019import six
20
Alex Gaynor2b3f9422013-12-24 21:55:24 -080021import pretend
22
Paul Kehrer79c16e92013-10-18 17:44:36 -050023import pytest
24
Alex Gaynorafdddca2013-10-21 21:00:20 -070025from .utils import (
Paul Kehrerf7f6a9f2013-11-11 20:43:52 -060026 load_nist_vectors, load_vectors_from_file, load_cryptrec_vectors,
Paul Kehrerd5c9f5a2014-02-15 22:17:14 -060027 load_hash_vectors, check_for_iface, check_backend_support,
Mohammed Attia987cc702014-03-12 16:07:21 +020028 select_backends, load_pkcs1_vectors, load_rsa_nist_vectors,
29 load_fips_dsa_key_pair_vectors
Alex Gaynorafdddca2013-10-21 21:00:20 -070030)
Donald Stufft9e1a48b2013-08-09 00:32:30 -040031
32
Alex Gaynor2b3f9422013-12-24 21:55:24 -080033class FakeInterface(object):
34 pass
35
36
Paul Kehrerc421e632014-01-18 09:22:21 -060037def test_select_one_backend():
Paul Kehrer34c075e2014-01-13 21:52:08 -050038 b1 = pretend.stub(name="b1")
39 b2 = pretend.stub(name="b2")
40 b3 = pretend.stub(name="b3")
41 backends = [b1, b2, b3]
42 name = "b2"
Paul Kehreraed9e172014-01-19 12:09:27 -060043 selected_backends = select_backends(name, backends)
44 assert len(selected_backends) == 1
45 assert selected_backends[0] == b2
Paul Kehrer34c075e2014-01-13 21:52:08 -050046
47
Paul Kehrerc421e632014-01-18 09:22:21 -060048def test_select_no_backend():
Paul Kehrer34c075e2014-01-13 21:52:08 -050049 b1 = pretend.stub(name="b1")
50 b2 = pretend.stub(name="b2")
51 b3 = pretend.stub(name="b3")
52 backends = [b1, b2, b3]
53 name = "back!"
54 with pytest.raises(ValueError):
Paul Kehrerc421e632014-01-18 09:22:21 -060055 select_backends(name, backends)
56
57
58def test_select_backends_none():
59 b1 = pretend.stub(name="b1")
60 b2 = pretend.stub(name="b2")
61 b3 = pretend.stub(name="b3")
62 backends = [b1, b2, b3]
63 name = None
Paul Kehreraed9e172014-01-19 12:09:27 -060064 selected_backends = select_backends(name, backends)
65 assert len(selected_backends) == 3
Paul Kehrerc421e632014-01-18 09:22:21 -060066
67
68def test_select_two_backends():
69 b1 = pretend.stub(name="b1")
70 b2 = pretend.stub(name="b2")
71 b3 = pretend.stub(name="b3")
72 backends = [b1, b2, b3]
73 name = "b2 ,b1 "
Paul Kehreraed9e172014-01-19 12:09:27 -060074 selected_backends = select_backends(name, backends)
75 assert len(selected_backends) == 2
76 assert selected_backends == [b1, b2]
Paul Kehrer34c075e2014-01-13 21:52:08 -050077
78
Alex Gaynor2b3f9422013-12-24 21:55:24 -080079def test_check_for_iface():
80 item = pretend.stub(keywords=["fake_name"], funcargs={"backend": True})
81 with pytest.raises(pytest.skip.Exception) as exc_info:
82 check_for_iface("fake_name", FakeInterface, item)
83 assert exc_info.value.args[0] == "True backend does not support fake_name"
84
85 item = pretend.stub(
86 keywords=["fake_name"],
87 funcargs={"backend": FakeInterface()}
88 )
89 check_for_iface("fake_name", FakeInterface, item)
90
91
Paul Kehrer60fc8da2013-12-26 20:19:34 -060092def test_check_backend_support_skip():
Paul Kehrer5a8fdf82013-12-26 20:13:45 -060093 supported = pretend.stub(
94 kwargs={"only_if": lambda backend: False, "skip_message": "Nope"}
95 )
96 item = pretend.stub(keywords={"supported": supported},
97 funcargs={"backend": True})
98 with pytest.raises(pytest.skip.Exception) as exc_info:
Paul Kehrer60fc8da2013-12-26 20:19:34 -060099 check_backend_support(item)
Paul Kehrerf03334e2014-01-02 23:16:14 -0600100 assert exc_info.value.args[0] == "Nope (True)"
Paul Kehrer5a8fdf82013-12-26 20:13:45 -0600101
102
Paul Kehrer60fc8da2013-12-26 20:19:34 -0600103def test_check_backend_support_no_skip():
Paul Kehrer5a8fdf82013-12-26 20:13:45 -0600104 supported = pretend.stub(
105 kwargs={"only_if": lambda backend: True, "skip_message": "Nope"}
106 )
107 item = pretend.stub(keywords={"supported": supported},
108 funcargs={"backend": True})
Paul Kehrer60fc8da2013-12-26 20:19:34 -0600109 assert check_backend_support(item) is None
Paul Kehrer5a8fdf82013-12-26 20:13:45 -0600110
111
Paul Kehrer60fc8da2013-12-26 20:19:34 -0600112def test_check_backend_support_no_backend():
Paul Kehrer5a8fdf82013-12-26 20:13:45 -0600113 supported = pretend.stub(
114 kwargs={"only_if": "notalambda", "skip_message": "Nope"}
115 )
116 item = pretend.stub(keywords={"supported": supported},
117 funcargs={})
Paul Kehrerec495502013-12-27 15:51:40 -0600118 with pytest.raises(ValueError):
Paul Kehrer60fc8da2013-12-26 20:19:34 -0600119 check_backend_support(item)
Paul Kehrer5a8fdf82013-12-26 20:13:45 -0600120
121
Alex Gaynorcf5fb332013-11-11 15:39:52 -0800122def test_load_nist_vectors():
Donald Stufft9e1a48b2013-08-09 00:32:30 -0400123 vector_data = textwrap.dedent("""
124 # CAVS 11.1
125 # Config info for aes_values
126 # AESVS GFSbox test data for CBC
127 # State : Encrypt and Decrypt
128 # Key Length : 128
129 # Generated on Fri Apr 22 15:11:33 2011
130
131 [ENCRYPT]
132
133 COUNT = 0
134 KEY = 00000000000000000000000000000000
135 IV = 00000000000000000000000000000000
136 PLAINTEXT = f34481ec3cc627bacd5dc3fb08f273e6
137 CIPHERTEXT = 0336763e966d92595a567cc9ce537f5e
138
139 COUNT = 1
140 KEY = 00000000000000000000000000000000
141 IV = 00000000000000000000000000000000
142 PLAINTEXT = 9798c4640bad75c7c3227db910174e72
143 CIPHERTEXT = a9a1631bf4996954ebc093957b234589
144
145 [DECRYPT]
146
147 COUNT = 0
148 KEY = 00000000000000000000000000000000
149 IV = 00000000000000000000000000000000
150 CIPHERTEXT = 0336763e966d92595a567cc9ce537f5e
151 PLAINTEXT = f34481ec3cc627bacd5dc3fb08f273e6
152
153 COUNT = 1
154 KEY = 00000000000000000000000000000000
155 IV = 00000000000000000000000000000000
156 CIPHERTEXT = a9a1631bf4996954ebc093957b234589
157 PLAINTEXT = 9798c4640bad75c7c3227db910174e72
158 """).splitlines()
159
Alex Gaynord3ce7032013-11-11 14:46:20 -0800160 assert load_nist_vectors(vector_data) == [
161 {
162 "key": b"00000000000000000000000000000000",
163 "iv": b"00000000000000000000000000000000",
164 "plaintext": b"f34481ec3cc627bacd5dc3fb08f273e6",
165 "ciphertext": b"0336763e966d92595a567cc9ce537f5e",
166 },
167 {
168 "key": b"00000000000000000000000000000000",
169 "iv": b"00000000000000000000000000000000",
170 "plaintext": b"9798c4640bad75c7c3227db910174e72",
171 "ciphertext": b"a9a1631bf4996954ebc093957b234589",
172 },
Alex Gaynor1fe70b12013-10-16 11:59:17 -0700173 {
174 "key": b"00000000000000000000000000000000",
175 "iv": b"00000000000000000000000000000000",
176 "plaintext": b"f34481ec3cc627bacd5dc3fb08f273e6",
177 "ciphertext": b"0336763e966d92595a567cc9ce537f5e",
178 },
179 {
180 "key": b"00000000000000000000000000000000",
181 "iv": b"00000000000000000000000000000000",
182 "plaintext": b"9798c4640bad75c7c3227db910174e72",
183 "ciphertext": b"a9a1631bf4996954ebc093957b234589",
184 },
Donald Stufft9e1a48b2013-08-09 00:32:30 -0400185 ]
186
187
Paul Kehrer6fb1a5a2014-01-29 13:44:07 -0600188def test_load_nist_vectors_with_null_chars():
189 vector_data = textwrap.dedent("""
190 COUNT = 0
191 KEY = thing\\0withnulls
192
193 COUNT = 1
194 KEY = 00000000000000000000000000000000
195 """).splitlines()
196
197 assert load_nist_vectors(vector_data) == [
198 {
199 "key": b"thing\x00withnulls",
200 },
201 {
202 "key": b"00000000000000000000000000000000",
203 },
204 ]
205
206
Paul Kehrer1951bf62013-09-15 12:05:43 -0500207def test_load_cryptrec_vectors():
208 vector_data = textwrap.dedent("""
209 # Vectors taken from http://info.isl.ntt.co.jp/crypt/eng/camellia/
210 # Download is t_camelia.txt
211
212 # Camellia with 128-bit key
213
214 K No.001 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
215
216 P No.001 : 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
217 C No.001 : 07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C
218
219 P No.002 : 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
220 C No.002 : 48 CD 64 19 80 96 72 D2 34 92 60 D8 9A 08 D3 D3
221
222 K No.002 : 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
223
224 P No.001 : 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
225 C No.001 : 07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C
226 """).splitlines()
227
228 assert load_cryptrec_vectors(vector_data) == [
Alex Gaynor1fe70b12013-10-16 11:59:17 -0700229 {
230 "key": b"00000000000000000000000000000000",
231 "plaintext": b"80000000000000000000000000000000",
232 "ciphertext": b"07923A39EB0A817D1C4D87BDB82D1F1C",
233 },
234 {
235 "key": b"00000000000000000000000000000000",
236 "plaintext": b"40000000000000000000000000000000",
237 "ciphertext": b"48CD6419809672D2349260D89A08D3D3",
238 },
239 {
240 "key": b"10000000000000000000000000000000",
241 "plaintext": b"80000000000000000000000000000000",
242 "ciphertext": b"07923A39EB0A817D1C4D87BDB82D1F1C",
243 },
Paul Kehrer1951bf62013-09-15 12:05:43 -0500244 ]
245
246
Donald Stufft3359d7e2013-10-19 19:33:06 -0400247def test_load_cryptrec_vectors_invalid():
248 vector_data = textwrap.dedent("""
249 # Vectors taken from http://info.isl.ntt.co.jp/crypt/eng/camellia/
250 # Download is t_camelia.txt
251
252 # Camellia with 128-bit key
253
254 E No.001 : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
255 """).splitlines()
256
257 with pytest.raises(ValueError):
258 load_cryptrec_vectors(vector_data)
259
260
Paul Kehrer69e06522013-10-18 17:28:39 -0500261def test_load_hash_vectors():
262 vector_data = textwrap.dedent("""
263
264 # http://tools.ietf.org/html/rfc1321
Paul Kehrer87cd0db2013-10-18 18:01:26 -0500265 [irrelevant]
Paul Kehrer69e06522013-10-18 17:28:39 -0500266
267 Len = 0
268 Msg = 00
269 MD = d41d8cd98f00b204e9800998ecf8427e
270
271 Len = 8
272 Msg = 61
273 MD = 0cc175b9c0f1b6a831c399e269772661
274
275 Len = 24
276 Msg = 616263
277 MD = 900150983cd24fb0d6963f7d28e17f72
278
279 Len = 112
280 Msg = 6d65737361676520646967657374
281 MD = f96b697d7cb7938d525a2f31aaf161d0
282 """).splitlines()
283 assert load_hash_vectors(vector_data) == [
Paul Kehrer79c16e92013-10-18 17:44:36 -0500284 (b"", "d41d8cd98f00b204e9800998ecf8427e"),
285 (b"61", "0cc175b9c0f1b6a831c399e269772661"),
286 (b"616263", "900150983cd24fb0d6963f7d28e17f72"),
287 (b"6d65737361676520646967657374", "f96b697d7cb7938d525a2f31aaf161d0"),
Paul Kehrer69e06522013-10-18 17:28:39 -0500288 ]
289
290
Paul Kehrer0317b042013-10-28 17:34:27 -0500291def test_load_hmac_vectors():
292 vector_data = textwrap.dedent("""
293Len = 224
294# "Jefe"
295Key = 4a656665
296# "what do ya want for nothing?"
297Msg = 7768617420646f2079612077616e7420666f72206e6f7468696e673f
298MD = 750c783e6ab0b503eaa86e310a5db738
299 """).splitlines()
300 assert load_hash_vectors(vector_data) == [
301 (b"7768617420646f2079612077616e7420666f72206e6f7468696e673f",
302 "750c783e6ab0b503eaa86e310a5db738",
303 b"4a656665"),
304 ]
305
306
Paul Kehrer69e06522013-10-18 17:28:39 -0500307def test_load_hash_vectors_bad_data():
308 vector_data = textwrap.dedent("""
309 # http://tools.ietf.org/html/rfc1321
310
311 Len = 0
312 Msg = 00
313 UNKNOWN=Hello World
314 """).splitlines()
315 with pytest.raises(ValueError):
316 load_hash_vectors(vector_data)
317
Alex Gaynor41172ab2013-11-12 10:00:42 -0800318
Alex Gaynorab53bc52013-11-12 09:37:59 -0800319def test_load_vectors_from_file():
320 vectors = load_vectors_from_file(
321 os.path.join("ciphers", "Blowfish", "bf-cfb.txt"),
322 load_nist_vectors,
Paul Kehrer2b758672013-10-30 09:01:38 -0500323 )
Alex Gaynorab53bc52013-11-12 09:37:59 -0800324 assert vectors == [
325 {
Alex Gaynorc2f45d52013-11-12 09:50:25 -0800326 "key": b"0123456789ABCDEFF0E1D2C3B4A59687",
327 "iv": b"FEDCBA9876543210",
Alex Gaynorab53bc52013-11-12 09:37:59 -0800328 "plaintext": (
Alex Gaynorc2f45d52013-11-12 09:50:25 -0800329 b"37363534333231204E6F77206973207468652074696D6520666F722000"
Alex Gaynorab53bc52013-11-12 09:37:59 -0800330 ),
331 "ciphertext": (
Alex Gaynorc2f45d52013-11-12 09:50:25 -0800332 b"E73214A2822139CAF26ECF6D2EB9E76E3DA3DE04D1517200519D57A6C3"
Alex Gaynorab53bc52013-11-12 09:37:59 -0800333 ),
334 }
335 ]
Paul Kehrera43b6692013-11-12 15:35:49 -0600336
337
338def test_load_nist_gcm_vectors():
339 vector_data = textwrap.dedent("""
340 [Keylen = 128]
341 [IVlen = 96]
342 [PTlen = 0]
343 [AADlen = 0]
344 [Taglen = 128]
345
346 Count = 0
347 Key = 11754cd72aec309bf52f7687212e8957
348 IV = 3c819d9a9bed087615030b65
349 PT =
350 AAD =
351 CT =
352 Tag = 250327c674aaf477aef2675748cf6971
353
354 Count = 1
355 Key = 272f16edb81a7abbea887357a58c1917
356 IV = 794ec588176c703d3d2a7a07
357 PT =
358 AAD =
359 CT =
360 Tag = b6e6f197168f5049aeda32dafbdaeb
361
362 Count = 2
363 Key = a49a5e26a2f8cb63d05546c2a62f5343
364 IV = 907763b19b9b4ab6bd4f0281
365 CT =
366 AAD =
367 Tag = a2be08210d8c470a8df6e8fbd79ec5cf
368 FAIL
369
370 Count = 3
371 Key = 5c1155084cc0ede76b3bc22e9f7574ef
372 IV = 9549e4ba69a61cad7856efc1
373 PT = d1448fa852b84408e2dad8381f363de7
374 AAD = e98e9d9c618e46fef32660976f854ee3
375 CT = f78b60ca125218493bea1c50a2e12ef4
376 Tag = d72da7f5c6cf0bca7242c71835809449
377
378 [Keylen = 128]
379 [IVlen = 96]
380 [PTlen = 0]
381 [AADlen = 0]
382 [Taglen = 120]
383
384 Count = 0
385 Key = eac258e99c55e6ae8ef1da26640613d7
386 IV = 4e8df20faaf2c8eebe922902
387 CT =
388 AAD =
389 Tag = e39aeaebe86aa309a4d062d6274339
390 PT =
391
392 Count = 1
393 Key = 3726cf02fcc6b8639a5497652c94350d
394 IV = 55fef82cde693ce76efcc193
395 CT =
396 AAD =
397 Tag = 3d68111a81ed22d2ef5bccac4fc27f
398 FAIL
399
400 Count = 2
401 Key = f202299d5fd74f03b12d2119a6c4c038
402 IV = eec51e7958c3f20a1bb71815
403 CT =
404 AAD =
405 Tag = a81886b3fb26e51fca87b267e1e157
406 FAIL
407
408 Count = 3
409 Key = fd52925f39546b4c55ffb6b20c59898c
410 IV = f5cf3227444afd905a5f6dba
411 CT =
412 AAD =
413 Tag = 1665b0f1a0b456e1664cfd3de08ccd
414 PT =
Paul Kehrerc985dbb2013-11-18 14:11:55 -0600415
416 [Keylen = 128]
417 [IVlen = 8]
418 [PTlen = 104]
419 [AADlen = 0]
420 [Taglen = 128]
421
422 Count = 0
423 Key = 58fab7632bcf10d2bcee58520bf37414
424 IV = 3c
425 CT = 15c4db4cbb451211179d57017f
426 AAD =
427 Tag = eae841d4355feeb3f786bc86625f1e5b
428 FAIL
Paul Kehrera43b6692013-11-12 15:35:49 -0600429 """).splitlines()
430 assert load_nist_vectors(vector_data) == [
431 {'aad': b'',
Paul Kehrer749ac5b2013-11-18 18:12:41 -0600432 'pt': b'',
433 'iv': b'3c819d9a9bed087615030b65',
434 'tag': b'250327c674aaf477aef2675748cf6971',
435 'key': b'11754cd72aec309bf52f7687212e8957',
436 'ct': b''},
437 {'aad': b'',
438 'pt': b'',
439 'iv': b'794ec588176c703d3d2a7a07',
440 'tag': b'b6e6f197168f5049aeda32dafbdaeb',
441 'key': b'272f16edb81a7abbea887357a58c1917',
442 'ct': b''},
443 {'aad': b'',
444 'iv': b'907763b19b9b4ab6bd4f0281',
445 'tag': b'a2be08210d8c470a8df6e8fbd79ec5cf',
446 'key': b'a49a5e26a2f8cb63d05546c2a62f5343',
447 'ct': b'',
Paul Kehrerc985dbb2013-11-18 14:11:55 -0600448 'fail': True},
Paul Kehrer749ac5b2013-11-18 18:12:41 -0600449 {'aad': b'e98e9d9c618e46fef32660976f854ee3',
450 'pt': b'd1448fa852b84408e2dad8381f363de7',
451 'iv': b'9549e4ba69a61cad7856efc1',
452 'tag': b'd72da7f5c6cf0bca7242c71835809449',
453 'key': b'5c1155084cc0ede76b3bc22e9f7574ef',
454 'ct': b'f78b60ca125218493bea1c50a2e12ef4'},
Paul Kehrerc985dbb2013-11-18 14:11:55 -0600455 {'aad': b'',
Paul Kehrera43b6692013-11-12 15:35:49 -0600456 'pt': b'',
457 'iv': b'4e8df20faaf2c8eebe922902',
458 'tag': b'e39aeaebe86aa309a4d062d6274339',
459 'key': b'eac258e99c55e6ae8ef1da26640613d7',
460 'ct': b''},
461 {'aad': b'',
462 'iv': b'55fef82cde693ce76efcc193',
463 'tag': b'3d68111a81ed22d2ef5bccac4fc27f',
464 'key': b'3726cf02fcc6b8639a5497652c94350d',
465 'ct': b'',
466 'fail': True},
467 {'aad': b'',
468 'iv': b'eec51e7958c3f20a1bb71815',
469 'tag': b'a81886b3fb26e51fca87b267e1e157',
470 'key': b'f202299d5fd74f03b12d2119a6c4c038',
471 'ct': b'',
472 'fail': True},
473 {'aad': b'',
474 'pt': b'',
475 'iv': b'f5cf3227444afd905a5f6dba',
476 'tag': b'1665b0f1a0b456e1664cfd3de08ccd',
477 'key': b'fd52925f39546b4c55ffb6b20c59898c',
478 'ct': b''},
479 {'aad': b'',
Paul Kehrer749ac5b2013-11-18 18:12:41 -0600480 'iv': b'3c',
481 'tag': b'eae841d4355feeb3f786bc86625f1e5b',
482 'key': b'58fab7632bcf10d2bcee58520bf37414',
483 'ct': b'15c4db4cbb451211179d57017f',
Paul Kehrera43b6692013-11-12 15:35:49 -0600484 'fail': True},
Paul Kehrera43b6692013-11-12 15:35:49 -0600485 ]
Alex Stapleton58f27ac2014-02-02 19:30:03 +0000486
487
488def test_load_pkcs1_vectors():
489 vector_data = textwrap.dedent("""
490 Test vectors for RSA-PSS
491 ========================
492
493 This file contains an extract of the original pss-vect.txt
494
495 Key lengths:
496
497 Key 8: 1031 bits
498 Key 9: 1536 bits
499 ===========================================================================
500
501 <snip>
502
503 # Example 8: A 1031-bit RSA key pair
504 # -----------------------------------
505
506
507 # Public key
508 # ----------
509
510 # Modulus:
511 49 53 70 a1 fb 18 54 3c 16 d3 63 1e 31 63 25 5d
512 f6 2b e6 ee e8 90 d5 f2 55 09 e4 f7 78 a8 ea 6f
513 bb bc df 85 df f6 4e 0d 97 20 03 ab 36 81 fb ba
514 6d d4 1f d5 41 82 9b 2e 58 2d e9 f2 a4 a4 e0 a2
515 d0 90 0b ef 47 53 db 3c ee 0e e0 6c 7d fa e8 b1
516 d5 3b 59 53 21 8f 9c ce ea 69 5b 08 66 8e de aa
517 dc ed 94 63 b1 d7 90 d5 eb f2 7e 91 15 b4 6c ad
518 4d 9a 2b 8e fa b0 56 1b 08 10 34 47 39 ad a0 73
519 3f
520
521 # Exponent:
522 01 00 01
523
524 # Private key
525 # -----------
526
527 # Modulus:
528 49 53 70 a1 fb 18 54 3c 16 d3 63 1e 31 63 25 5d
529 f6 2b e6 ee e8 90 d5 f2 55 09 e4 f7 78 a8 ea 6f
530 bb bc df 85 df f6 4e 0d 97 20 03 ab 36 81 fb ba
531 6d d4 1f d5 41 82 9b 2e 58 2d e9 f2 a4 a4 e0 a2
532 d0 90 0b ef 47 53 db 3c ee 0e e0 6c 7d fa e8 b1
533 d5 3b 59 53 21 8f 9c ce ea 69 5b 08 66 8e de aa
534 dc ed 94 63 b1 d7 90 d5 eb f2 7e 91 15 b4 6c ad
535 4d 9a 2b 8e fa b0 56 1b 08 10 34 47 39 ad a0 73
536 3f
537
538 # Public exponent:
539 01 00 01
540
541 # Exponent:
542 6c 66 ff e9 89 80 c3 8f cd ea b5 15 98 98 83 61
543 65 f4 b4 b8 17 c4 f6 a8 d4 86 ee 4e a9 13 0f e9
544 b9 09 2b d1 36 d1 84 f9 5f 50 4a 60 7e ac 56 58
545 46 d2 fd d6 59 7a 89 67 c7 39 6e f9 5a 6e ee bb
546 45 78 a6 43 96 6d ca 4d 8e e3 de 84 2d e6 32 79
547 c6 18 15 9c 1a b5 4a 89 43 7b 6a 61 20 e4 93 0a
548 fb 52 a4 ba 6c ed 8a 49 47 ac 64 b3 0a 34 97 cb
549 e7 01 c2 d6 26 6d 51 72 19 ad 0e c6 d3 47 db e9
550
551 # Prime 1:
552 08 da d7 f1 13 63 fa a6 23 d5 d6 d5 e8 a3 19 32
553 8d 82 19 0d 71 27 d2 84 6c 43 9b 0a b7 26 19 b0
554 a4 3a 95 32 0e 4e c3 4f c3 a9 ce a8 76 42 23 05
555 bd 76 c5 ba 7b e9 e2 f4 10 c8 06 06 45 a1 d2 9e
556 db
557
558 # Prime 2:
559 08 47 e7 32 37 6f c7 90 0f 89 8e a8 2e b2 b0 fc
560 41 85 65 fd ae 62 f7 d9 ec 4c e2 21 7b 97 99 0d
561 d2 72 db 15 7f 99 f6 3c 0d cb b9 fb ac db d4 c4
562 da db 6d f6 77 56 35 8c a4 17 48 25 b4 8f 49 70
563 6d
564
565 # Prime exponent 1:
566 05 c2 a8 3c 12 4b 36 21 a2 aa 57 ea 2c 3e fe 03
567 5e ff 45 60 f3 3d de bb 7a da b8 1f ce 69 a0 c8
568 c2 ed c1 65 20 dd a8 3d 59 a2 3b e8 67 96 3a c6
569 5f 2c c7 10 bb cf b9 6e e1 03 de b7 71 d1 05 fd
570 85
571
572 # Prime exponent 2:
573 04 ca e8 aa 0d 9f aa 16 5c 87 b6 82 ec 14 0b 8e
574 d3 b5 0b 24 59 4b 7a 3b 2c 22 0b 36 69 bb 81 9f
575 98 4f 55 31 0a 1a e7 82 36 51 d4 a0 2e 99 44 79
576 72 59 51 39 36 34 34 e5 e3 0a 7e 7d 24 15 51 e1
577 b9
578
579 # Coefficient:
580 07 d3 e4 7b f6 86 60 0b 11 ac 28 3c e8 8d bb 3f
581 60 51 e8 ef d0 46 80 e4 4c 17 1e f5 31 b8 0b 2b
582 7c 39 fc 76 63 20 e2 cf 15 d8 d9 98 20 e9 6f f3
583 0d c6 96 91 83 9c 4b 40 d7 b0 6e 45 30 7d c9 1f
584 3f
585
586 # RSA-PSS signing of 6 random messages with random salts
587 # -------------------------------------------------------
Paul Kehrerefca2802014-02-17 20:55:13 -0600588 # PSS Example 8.1
Alex Stapleton58f27ac2014-02-02 19:30:03 +0000589
Paul Kehrerefca2802014-02-17 20:55:13 -0600590 # -----------------
591
592 # Message to be signed:
593 81 33 2f 4b e6 29 48 41 5e a1 d8 99 79 2e ea cf
594 6c 6e 1d b1 da 8b e1 3b 5c ea 41 db 2f ed 46 70
595 92 e1 ff 39 89 14 c7 14 25 97 75 f5 95 f8 54 7f
596 73 56 92 a5 75 e6 92 3a f7 8f 22 c6 99 7d db 90
597 fb 6f 72 d7 bb 0d d5 74 4a 31 de cd 3d c3 68 58
598 49 83 6e d3 4a ec 59 63 04 ad 11 84 3c 4f 88 48
599 9f 20 97 35 f5 fb 7f da f7 ce c8 ad dc 58 18 16
600 8f 88 0a cb f4 90 d5 10 05 b7 a8 e8 4e 43 e5 42
601 87 97 75 71 dd 99 ee a4 b1 61 eb 2d f1 f5 10 8f
602 12 a4 14 2a 83 32 2e db 05 a7 54 87 a3 43 5c 9a
603 78 ce 53 ed 93 bc 55 08 57 d7 a9 fb
604
605 # Salt:
606 1d 65 49 1d 79 c8 64 b3 73 00 9b e6 f6 f2 46 7b
607 ac 4c 78 fa
608
609 # Signature:
610 02 62 ac 25 4b fa 77 f3 c1 ac a2 2c 51 79 f8 f0
611 40 42 2b 3c 5b af d4 0a 8f 21 cf 0f a5 a6 67 cc
612 d5 99 3d 42 db af b4 09 c5 20 e2 5f ce 2b 1e e1
613 e7 16 57 7f 1e fa 17 f3 da 28 05 2f 40 f0 41 9b
614 23 10 6d 78 45 aa f0 11 25 b6 98 e7 a4 df e9 2d
615 39 67 bb 00 c4 d0 d3 5b a3 55 2a b9 a8 b3 ee f0
616 7c 7f ec db c5 42 4a c4 db 1e 20 cb 37 d0 b2 74
617 47 69 94 0e a9 07 e1 7f bb ca 67 3b 20 52 23 80
618 c5
619
620 # PSS Example 8.2
621
622 # -----------------
623
624 # Message to be signed:
625 e2 f9 6e af 0e 05 e7 ba 32 6e cc a0 ba 7f d2 f7
626 c0 23 56 f3 ce de 9d 0f aa bf 4f cc 8e 60 a9 73
627 e5 59 5f d9 ea 08
628
629 # Salt:
630 43 5c 09 8a a9 90 9e b2 37 7f 12 48 b0 91 b6 89
631 87 ff 18 38
632
633 # Signature:
634 27 07 b9 ad 51 15 c5 8c 94 e9 32 e8 ec 0a 28 0f
635 56 33 9e 44 a1 b5 8d 4d dc ff 2f 31 2e 5f 34 dc
636 fe 39 e8 9c 6a 94 dc ee 86 db bd ae 5b 79 ba 4e
637 08 19 a9 e7 bf d9 d9 82 e7 ee 6c 86 ee 68 39 6e
638 8b 3a 14 c9 c8 f3 4b 17 8e b7 41 f9 d3 f1 21 10
639 9b f5 c8 17 2f ad a2 e7 68 f9 ea 14 33 03 2c 00
640 4a 8a a0 7e b9 90 00 0a 48 dc 94 c8 ba c8 aa be
641 2b 09 b1 aa 46 c0 a2 aa 0e 12 f6 3f bb a7 75 ba
642 7e
643
644 # <snip>
Alex Stapleton58f27ac2014-02-02 19:30:03 +0000645
646 # =============================================
647
648 # Example 9: A 1536-bit RSA key pair
649 # -----------------------------------
650
651
652 # Public key
653 # ----------
654
655 # Modulus:
656 e6 bd 69 2a c9 66 45 79 04 03 fd d0 f5 be b8 b9
657 bf 92 ed 10 00 7f c3 65 04 64 19 dd 06 c0 5c 5b
658 5b 2f 48 ec f9 89 e4 ce 26 91 09 97 9c bb 40 b4
659 a0 ad 24 d2 24 83 d1 ee 31 5a d4 cc b1 53 42 68
660 35 26 91 c5 24 f6 dd 8e 6c 29 d2 24 cf 24 69 73
661 ae c8 6c 5b f6 b1 40 1a 85 0d 1b 9a d1 bb 8c bc
662 ec 47 b0 6f 0f 8c 7f 45 d3 fc 8f 31 92 99 c5 43
663 3d db c2 b3 05 3b 47 de d2 ec d4 a4 ca ef d6 14
664 83 3d c8 bb 62 2f 31 7e d0 76 b8 05 7f e8 de 3f
665 84 48 0a d5 e8 3e 4a 61 90 4a 4f 24 8f b3 97 02
666 73 57 e1 d3 0e 46 31 39 81 5c 6f d4 fd 5a c5 b8
667 17 2a 45 23 0e cb 63 18 a0 4f 14 55 d8 4e 5a 8b
668
669 # Exponent:
670 01 00 01
671
672 # Private key
673 # -----------
674
675 # Modulus:
676 e6 bd 69 2a c9 66 45 79 04 03 fd d0 f5 be b8 b9
677 bf 92 ed 10 00 7f c3 65 04 64 19 dd 06 c0 5c 5b
678 5b 2f 48 ec f9 89 e4 ce 26 91 09 97 9c bb 40 b4
679 a0 ad 24 d2 24 83 d1 ee 31 5a d4 cc b1 53 42 68
680 35 26 91 c5 24 f6 dd 8e 6c 29 d2 24 cf 24 69 73
681 ae c8 6c 5b f6 b1 40 1a 85 0d 1b 9a d1 bb 8c bc
682 ec 47 b0 6f 0f 8c 7f 45 d3 fc 8f 31 92 99 c5 43
683 3d db c2 b3 05 3b 47 de d2 ec d4 a4 ca ef d6 14
684 83 3d c8 bb 62 2f 31 7e d0 76 b8 05 7f e8 de 3f
685 84 48 0a d5 e8 3e 4a 61 90 4a 4f 24 8f b3 97 02
686 73 57 e1 d3 0e 46 31 39 81 5c 6f d4 fd 5a c5 b8
687 17 2a 45 23 0e cb 63 18 a0 4f 14 55 d8 4e 5a 8b
688
689 # Public exponent:
690 01 00 01
691
692 # Exponent:
693 6a 7f d8 4f b8 5f ad 07 3b 34 40 6d b7 4f 8d 61
694 a6 ab c1 21 96 a9 61 dd 79 56 5e 9d a6 e5 18 7b
695 ce 2d 98 02 50 f7 35 95 75 35 92 70 d9 15 90 bb
696 0e 42 7c 71 46 0b 55 d5 14 10 b1 91 bc f3 09 fe
697 a1 31 a9 2c 8e 70 27 38 fa 71 9f 1e 00 41 f5 2e
698 40 e9 1f 22 9f 4d 96 a1 e6 f1 72 e1 55 96 b4 51
699 0a 6d ae c2 61 05 f2 be bc 53 31 6b 87 bd f2 13
700 11 66 60 70 e8 df ee 69 d5 2c 71 a9 76 ca ae 79
701 c7 2b 68 d2 85 80 dc 68 6d 9f 51 29 d2 25 f8 2b
702 3d 61 55 13 a8 82 b3 db 91 41 6b 48 ce 08 88 82
703 13 e3 7e eb 9a f8 00 d8 1c ab 32 8c e4 20 68 99
704 03 c0 0c 7b 5f d3 1b 75 50 3a 6d 41 96 84 d6 29
705
706 # Prime 1:
707 f8 eb 97 e9 8d f1 26 64 ee fd b7 61 59 6a 69 dd
708 cd 0e 76 da ec e6 ed 4b f5 a1 b5 0a c0 86 f7 92
709 8a 4d 2f 87 26 a7 7e 51 5b 74 da 41 98 8f 22 0b
710 1c c8 7a a1 fc 81 0c e9 9a 82 f2 d1 ce 82 1e dc
711 ed 79 4c 69 41 f4 2c 7a 1a 0b 8c 4d 28 c7 5e c6
712 0b 65 22 79 f6 15 4a 76 2a ed 16 5d 47 de e3 67
713
714 # Prime 2:
715 ed 4d 71 d0 a6 e2 4b 93 c2 e5 f6 b4 bb e0 5f 5f
716 b0 af a0 42 d2 04 fe 33 78 d3 65 c2 f2 88 b6 a8
717 da d7 ef e4 5d 15 3e ef 40 ca cc 7b 81 ff 93 40
718 02 d1 08 99 4b 94 a5 e4 72 8c d9 c9 63 37 5a e4
719 99 65 bd a5 5c bf 0e fe d8 d6 55 3b 40 27 f2 d8
720 62 08 a6 e6 b4 89 c1 76 12 80 92 d6 29 e4 9d 3d
721
722 # Prime exponent 1:
723 2b b6 8b dd fb 0c 4f 56 c8 55 8b ff af 89 2d 80
724 43 03 78 41 e7 fa 81 cf a6 1a 38 c5 e3 9b 90 1c
725 8e e7 11 22 a5 da 22 27 bd 6c de eb 48 14 52 c1
726 2a d3 d6 1d 5e 4f 77 6a 0a b5 56 59 1b ef e3 e5
727 9e 5a 7f dd b8 34 5e 1f 2f 35 b9 f4 ce e5 7c 32
728 41 4c 08 6a ec 99 3e 93 53 e4 80 d9 ee c6 28 9f
729
730 # Prime exponent 2:
731 4f f8 97 70 9f ad 07 97 46 49 45 78 e7 0f d8 54
732 61 30 ee ab 56 27 c4 9b 08 0f 05 ee 4a d9 f3 e4
733 b7 cb a9 d6 a5 df f1 13 a4 1c 34 09 33 68 33 f1
734 90 81 6d 8a 6b c4 2e 9b ec 56 b7 56 7d 0f 3c 9c
735 69 6d b6 19 b2 45 d9 01 dd 85 6d b7 c8 09 2e 77
736 e9 a1 cc cd 56 ee 4d ba 42 c5 fd b6 1a ec 26 69
737
738 # Coefficient:
739 77 b9 d1 13 7b 50 40 4a 98 27 29 31 6e fa fc 7d
740 fe 66 d3 4e 5a 18 26 00 d5 f3 0a 0a 85 12 05 1c
741 56 0d 08 1d 4d 0a 18 35 ec 3d 25 a6 0f 4e 4d 6a
742 a9 48 b2 bf 3d bb 5b 12 4c bb c3 48 92 55 a3 a9
743 48 37 2f 69 78 49 67 45 f9 43 e1 db 4f 18 38 2c
744 ea a5 05 df c6 57 57 bb 3f 85 7a 58 dc e5 21 56
745
Paul Kehrerefca2802014-02-17 20:55:13 -0600746 # PKCS#1 v1.5 Signature Example 2.17
Alex Stapleton58f27ac2014-02-02 19:30:03 +0000747
Paul Kehrerefca2802014-02-17 20:55:13 -0600748 # -----------------
749
750 # Message to be signed:
751 06 ad d7 5a b6 89 de 06 77 44 e6 9a 2e bd 4b 90
752 fa 93 83 00 3c d0 5f f5 36 cb f2 94 cd 21 5f 09
753 23 b7 fc 90 04 f0 aa 18 52 71 a1 d0 06 1f d0 e9
754 77 7a d1 ec 0c 71 59 1f 57 8b f7 b8 e5 a1
755
756 # Signature:
757 45 14 21 0e 54 1d 5b ad 7d d6 0a e5 49 b9 43 ac
758 c4 4f 21 39 0d f5 b6 13 18 45 5a 17 61 0d f5 b7
759 4d 84 ae d2 32 f1 7e 59 d9 1d d2 65 99 22 f8 12
760 db d4 96 81 69 03 84 b9 54 e9 ad fb 9b 1a 96 8c
761 0c bf f7 63 ec ee d6 27 50 c5 91 64 b5 e0 80 a8
762 fe f3 d5 5b fe 2a cf ad 27 52 a6 a8 45 9f a1 fa
763 b4 9a d3 78 c6 96 4b 23 ee 97 fd 10 34 61 0c 5c
764 c1 4c 61 e0 eb fb 17 11 f8 ad e9 6f e6 55 7b 38
765
766 # <snip>
Alex Stapleton58f27ac2014-02-02 19:30:03 +0000767
768 # =============================================
769
Paul Kehrerefca2802014-02-17 20:55:13 -0600770 # <snip>
Alex Stapleton58f27ac2014-02-02 19:30:03 +0000771 """).splitlines()
772
773 vectors = tuple(load_pkcs1_vectors(vector_data))
774 expected = (
775 (
776 {
777 'modulus': int(
778 '495370a1fb18543c16d3631e3163255df62be6eee890d5f25509e4f77'
779 '8a8ea6fbbbcdf85dff64e0d972003ab3681fbba6dd41fd541829b2e58'
780 '2de9f2a4a4e0a2d0900bef4753db3cee0ee06c7dfae8b1d53b5953218'
781 'f9cceea695b08668edeaadced9463b1d790d5ebf27e9115b46cad4d9a'
782 '2b8efab0561b0810344739ada0733f', 16),
783 'public_exponent': int('10001', 16),
784 'private_exponent': int(
785 '6c66ffe98980c38fcdeab5159898836165f4b4b817c4f6a8d486ee4ea'
786 '9130fe9b9092bd136d184f95f504a607eac565846d2fdd6597a8967c7'
787 '396ef95a6eeebb4578a643966dca4d8ee3de842de63279c618159c1ab'
788 '54a89437b6a6120e4930afb52a4ba6ced8a4947ac64b30a3497cbe701'
789 'c2d6266d517219ad0ec6d347dbe9', 16),
790 'p': int(
791 '8dad7f11363faa623d5d6d5e8a319328d82190d7127d2846c439b0ab7'
792 '2619b0a43a95320e4ec34fc3a9cea876422305bd76c5ba7be9e2f410c'
793 '8060645a1d29edb', 16),
794 'q': int(
795 '847e732376fc7900f898ea82eb2b0fc418565fdae62f7d9ec4ce2217b'
796 '97990dd272db157f99f63c0dcbb9fbacdbd4c4dadb6df67756358ca41'
Paul Kehrer09328bb2014-02-12 23:57:27 -0600797 '74825b48f49706d', 16),
798 'dmp1': int(
799 '05c2a83c124b3621a2aa57ea2c3efe035eff4560f33ddebb7adab81fc'
800 'e69a0c8c2edc16520dda83d59a23be867963ac65f2cc710bbcfb96ee1'
801 '03deb771d105fd85', 16),
802 'dmq1': int(
803 '04cae8aa0d9faa165c87b682ec140b8ed3b50b24594b7a3b2c220b366'
804 '9bb819f984f55310a1ae7823651d4a02e99447972595139363434e5e3'
805 '0a7e7d241551e1b9', 16),
806 'iqmp': int(
807 '07d3e47bf686600b11ac283ce88dbb3f6051e8efd04680e44c171ef53'
808 '1b80b2b7c39fc766320e2cf15d8d99820e96ff30dc69691839c4b40d7'
Paul Kehrerefca2802014-02-17 20:55:13 -0600809 'b06e45307dc91f3f', 16),
810 'examples': [
811 {
Paul Kehrer26811802014-02-19 16:32:11 -0600812 'message': b'81332f4be62948415ea1d899792eeacf6c6e1db1d'
813 b'a8be13b5cea41db2fed467092e1ff398914c71425'
814 b'9775f595f8547f735692a575e6923af78f22c6997'
815 b'ddb90fb6f72d7bb0dd5744a31decd3dc368584983'
816 b'6ed34aec596304ad11843c4f88489f209735f5fb7'
817 b'fdaf7cec8addc5818168f880acbf490d51005b7a8'
818 b'e84e43e54287977571dd99eea4b161eb2df1f5108'
819 b'f12a4142a83322edb05a75487a3435c9a78ce53ed'
820 b'93bc550857d7a9fb',
821 'salt': b'1d65491d79c864b373009be6f6f2467bac4c78fa',
822 'signature': b'0262ac254bfa77f3c1aca22c5179f8f040422b3'
823 b'c5bafd40a8f21cf0fa5a667ccd5993d42dbafb4'
824 b'09c520e25fce2b1ee1e716577f1efa17f3da280'
825 b'52f40f0419b23106d7845aaf01125b698e7a4df'
826 b'e92d3967bb00c4d0d35ba3552ab9a8b3eef07c7'
827 b'fecdbc5424ac4db1e20cb37d0b2744769940ea9'
828 b'07e17fbbca673b20522380c5'
Paul Kehrerefca2802014-02-17 20:55:13 -0600829 }, {
Paul Kehrer26811802014-02-19 16:32:11 -0600830 'message': b'e2f96eaf0e05e7ba326ecca0ba7fd2f7c02356f3c'
831 b'ede9d0faabf4fcc8e60a973e5595fd9ea08',
832 'salt': b'435c098aa9909eb2377f1248b091b68987ff1838',
833 'signature': b'2707b9ad5115c58c94e932e8ec0a280f56339e4'
834 b'4a1b58d4ddcff2f312e5f34dcfe39e89c6a94dc'
835 b'ee86dbbdae5b79ba4e0819a9e7bfd9d982e7ee6'
836 b'c86ee68396e8b3a14c9c8f34b178eb741f9d3f1'
837 b'21109bf5c8172fada2e768f9ea1433032c004a8'
838 b'aa07eb990000a48dc94c8bac8aabe2b09b1aa46'
839 b'c0a2aa0e12f63fbba775ba7e'
Paul Kehrerefca2802014-02-17 20:55:13 -0600840 }
841 ]
Alex Stapleton58f27ac2014-02-02 19:30:03 +0000842 },
843
844 {
845 'modulus': int(
846 '495370a1fb18543c16d3631e3163255df62be6eee890d5f25509e4f77'
847 '8a8ea6fbbbcdf85dff64e0d972003ab3681fbba6dd41fd541829b2e58'
848 '2de9f2a4a4e0a2d0900bef4753db3cee0ee06c7dfae8b1d53b5953218'
849 'f9cceea695b08668edeaadced9463b1d790d5ebf27e9115b46cad4d9a'
850 '2b8efab0561b0810344739ada0733f', 16),
851 'public_exponent': int('10001', 16)
852 }
853 ),
854 (
855 {
856 'modulus': int(
857 'e6bd692ac96645790403fdd0f5beb8b9bf92ed10007fc365046419dd0'
858 '6c05c5b5b2f48ecf989e4ce269109979cbb40b4a0ad24d22483d1ee31'
859 '5ad4ccb1534268352691c524f6dd8e6c29d224cf246973aec86c5bf6b'
860 '1401a850d1b9ad1bb8cbcec47b06f0f8c7f45d3fc8f319299c5433ddb'
861 'c2b3053b47ded2ecd4a4caefd614833dc8bb622f317ed076b8057fe8d'
862 'e3f84480ad5e83e4a61904a4f248fb397027357e1d30e463139815c6f'
863 'd4fd5ac5b8172a45230ecb6318a04f1455d84e5a8b', 16),
864 'public_exponent': int('10001', 16),
865 'private_exponent': int(
866 '6a7fd84fb85fad073b34406db74f8d61a6abc12196a961dd79565e9da'
867 '6e5187bce2d980250f7359575359270d91590bb0e427c71460b55d514'
868 '10b191bcf309fea131a92c8e702738fa719f1e0041f52e40e91f229f4'
869 'd96a1e6f172e15596b4510a6daec26105f2bebc53316b87bdf2131166'
870 '6070e8dfee69d52c71a976caae79c72b68d28580dc686d9f5129d225f'
871 '82b3d615513a882b3db91416b48ce08888213e37eeb9af800d81cab32'
872 '8ce420689903c00c7b5fd31b75503a6d419684d629', 16),
873 'p': int(
874 'f8eb97e98df12664eefdb761596a69ddcd0e76daece6ed4bf5a1b50ac'
875 '086f7928a4d2f8726a77e515b74da41988f220b1cc87aa1fc810ce99a'
876 '82f2d1ce821edced794c6941f42c7a1a0b8c4d28c75ec60b652279f61'
877 '54a762aed165d47dee367', 16),
878 'q': int(
879 'ed4d71d0a6e24b93c2e5f6b4bbe05f5fb0afa042d204fe3378d365c2f'
880 '288b6a8dad7efe45d153eef40cacc7b81ff934002d108994b94a5e472'
881 '8cd9c963375ae49965bda55cbf0efed8d6553b4027f2d86208a6e6b48'
Paul Kehrer09328bb2014-02-12 23:57:27 -0600882 '9c176128092d629e49d3d', 16),
883 'dmp1': int(
884 '2bb68bddfb0c4f56c8558bffaf892d8043037841e7fa81cfa61a38c5e'
885 '39b901c8ee71122a5da2227bd6cdeeb481452c12ad3d61d5e4f776a0a'
886 'b556591befe3e59e5a7fddb8345e1f2f35b9f4cee57c32414c086aec9'
887 '93e9353e480d9eec6289f', 16),
888 'dmq1': int(
889 '4ff897709fad079746494578e70fd8546130eeab5627c49b080f05ee4'
890 'ad9f3e4b7cba9d6a5dff113a41c3409336833f190816d8a6bc42e9bec'
891 '56b7567d0f3c9c696db619b245d901dd856db7c8092e77e9a1cccd56e'
892 'e4dba42c5fdb61aec2669', 16),
893 'iqmp': int(
894 '77b9d1137b50404a982729316efafc7dfe66d34e5a182600d5f30a0a8'
895 '512051c560d081d4d0a1835ec3d25a60f4e4d6aa948b2bf3dbb5b124c'
896 'bbc3489255a3a948372f6978496745f943e1db4f18382ceaa505dfc65'
Paul Kehrerefca2802014-02-17 20:55:13 -0600897 '757bb3f857a58dce52156', 16),
898 'examples': [
899 {
Paul Kehrer26811802014-02-19 16:32:11 -0600900 'message': b'06add75ab689de067744e69a2ebd4b90fa9383003'
901 b'cd05ff536cbf294cd215f0923b7fc9004f0aa1852'
902 b'71a1d0061fd0e9777ad1ec0c71591f578bf7b8e5a'
903 b'1',
904 'signature': b'4514210e541d5bad7dd60ae549b943acc44f213'
905 b'90df5b61318455a17610df5b74d84aed232f17e'
906 b'59d91dd2659922f812dbd49681690384b954e9a'
907 b'dfb9b1a968c0cbff763eceed62750c59164b5e0'
908 b'80a8fef3d55bfe2acfad2752a6a8459fa1fab49'
909 b'ad378c6964b23ee97fd1034610c5cc14c61e0eb'
910 b'fb1711f8ade96fe6557b38'
Paul Kehrerefca2802014-02-17 20:55:13 -0600911 }
912 ]
Alex Stapleton58f27ac2014-02-02 19:30:03 +0000913 },
914
915 {
916 'modulus': int(
917 'e6bd692ac96645790403fdd0f5beb8b9bf92ed10007fc365046419dd0'
918 '6c05c5b5b2f48ecf989e4ce269109979cbb40b4a0ad24d22483d1ee31'
919 '5ad4ccb1534268352691c524f6dd8e6c29d224cf246973aec86c5bf6b'
920 '1401a850d1b9ad1bb8cbcec47b06f0f8c7f45d3fc8f319299c5433ddb'
921 'c2b3053b47ded2ecd4a4caefd614833dc8bb622f317ed076b8057fe8d'
922 'e3f84480ad5e83e4a61904a4f248fb397027357e1d30e463139815c6f'
923 'd4fd5ac5b8172a45230ecb6318a04f1455d84e5a8b', 16),
924 'public_exponent': int('10001', 16)
925 }
926 )
927 )
928 assert vectors == expected
Ayrx4300f6c2014-02-09 15:15:13 +0800929
930
931def test_load_hotp_vectors():
932 vector_data = textwrap.dedent("""
933 # HOTP Test Vectors
934 # RFC 4226 Appendix D
935
936 COUNT = 0
937 COUNTER = 0
938 INTERMEDIATE = cc93cf18508d94934c64b65d8ba7667fb7cde4b0
939 TRUNCATED = 4c93cf18
940 HOTP = 755224
Ayrxefc68382014-02-10 00:01:05 +0800941 SECRET = 12345678901234567890
Ayrx4300f6c2014-02-09 15:15:13 +0800942
943 COUNT = 1
944 COUNTER = 1
945 INTERMEDIATE = 75a48a19d4cbe100644e8ac1397eea747a2d33ab
946 TRUNCATED = 41397eea
947 HOTP = 287082
Ayrxefc68382014-02-10 00:01:05 +0800948 SECRET = 12345678901234567890
949
Ayrx4300f6c2014-02-09 15:15:13 +0800950
951 COUNT = 2
952 COUNTER = 2
953 INTERMEDIATE = 0bacb7fa082fef30782211938bc1c5e70416ff44
954 TRUNCATED = 82fef30
955 HOTP = 359152
Ayrxefc68382014-02-10 00:01:05 +0800956 SECRET = 12345678901234567890
957
Ayrx4300f6c2014-02-09 15:15:13 +0800958
959 COUNT = 3
960 COUNTER = 3
961 INTERMEDIATE = 66c28227d03a2d5529262ff016a1e6ef76557ece
962 TRUNCATED = 66ef7655
963 HOTP = 969429
Ayrxefc68382014-02-10 00:01:05 +0800964 SECRET = 12345678901234567890
Ayrx4300f6c2014-02-09 15:15:13 +0800965 """).splitlines()
966
967 assert load_nist_vectors(vector_data) == [
968 {
969 "counter": b"0",
970 "intermediate": b"cc93cf18508d94934c64b65d8ba7667fb7cde4b0",
971 "truncated": b"4c93cf18",
972 "hotp": b"755224",
Ayrxefc68382014-02-10 00:01:05 +0800973 "secret": b"12345678901234567890",
Ayrx4300f6c2014-02-09 15:15:13 +0800974 },
975 {
976 "counter": b"1",
977 "intermediate": b"75a48a19d4cbe100644e8ac1397eea747a2d33ab",
978 "truncated": b"41397eea",
979 "hotp": b"287082",
Ayrxefc68382014-02-10 00:01:05 +0800980 "secret": b"12345678901234567890",
Ayrx4300f6c2014-02-09 15:15:13 +0800981 },
982 {
983 "counter": b"2",
984 "intermediate": b"0bacb7fa082fef30782211938bc1c5e70416ff44",
985 "truncated": b"82fef30",
986 "hotp": b"359152",
Ayrxefc68382014-02-10 00:01:05 +0800987 "secret": b"12345678901234567890",
Ayrx4300f6c2014-02-09 15:15:13 +0800988 },
989 {
990 "counter": b"3",
991 "intermediate": b"66c28227d03a2d5529262ff016a1e6ef76557ece",
992 "truncated": b"66ef7655",
993 "hotp": b"969429",
Ayrxefc68382014-02-10 00:01:05 +0800994 "secret": b"12345678901234567890",
Ayrx4300f6c2014-02-09 15:15:13 +0800995 },
996 ]
997
998
999def test_load_totp_vectors():
1000 vector_data = textwrap.dedent("""
1001 # TOTP Test Vectors
1002 # RFC 6238 Appendix B
1003
1004 COUNT = 0
1005 TIME = 59
1006 TOTP = 94287082
1007 MODE = SHA1
Ayrxefc68382014-02-10 00:01:05 +08001008 SECRET = 12345678901234567890
Ayrx4300f6c2014-02-09 15:15:13 +08001009
1010 COUNT = 1
1011 TIME = 59
1012 TOTP = 46119246
1013 MODE = SHA256
Ayrxefc68382014-02-10 00:01:05 +08001014 SECRET = 12345678901234567890
Ayrx4300f6c2014-02-09 15:15:13 +08001015
1016 COUNT = 2
1017 TIME = 59
1018 TOTP = 90693936
1019 MODE = SHA512
Ayrxefc68382014-02-10 00:01:05 +08001020 SECRET = 12345678901234567890
Ayrx4300f6c2014-02-09 15:15:13 +08001021 """).splitlines()
1022
1023 assert load_nist_vectors(vector_data) == [
1024 {
1025 "time": b"59",
1026 "totp": b"94287082",
1027 "mode": b"SHA1",
Ayrxefc68382014-02-10 00:01:05 +08001028 "secret": b"12345678901234567890",
Ayrx4300f6c2014-02-09 15:15:13 +08001029 },
1030 {
1031 "time": b"59",
1032 "totp": b"46119246",
1033 "mode": b"SHA256",
Ayrxefc68382014-02-10 00:01:05 +08001034 "secret": b"12345678901234567890",
Ayrx4300f6c2014-02-09 15:15:13 +08001035 },
1036 {
1037 "time": b"59",
1038 "totp": b"90693936",
1039 "mode": b"SHA512",
Ayrxefc68382014-02-10 00:01:05 +08001040 "secret": b"12345678901234567890",
Ayrx4300f6c2014-02-09 15:15:13 +08001041 },
1042 ]
Paul Kehrer2f2a2062014-03-10 23:30:28 -04001043
1044
1045def test_load_rsa_nist_vectors():
1046 vector_data = textwrap.dedent("""
1047 # SHA Algorithm selected:SHA1 SHA224 SHA256 SHA384 SHA512
1048 # Salt len: 20
1049
1050 [mod = 1024]
1051
1052 n = bcb47b2e0dafcba81ff2a2b5cb115ca7e757184c9d72bcdcda707a146b3b4e29989d
1053
1054 e = 00000000000000000000000000000000000000000000000000000000000000000010001
1055 SHAAlg = SHA1
1056 Msg = 1248f62a4389f42f7b4bb131053d6c88a994db2075b912ccbe3ea7dc611714f14e
1057 S = 682cf53c1145d22a50caa9eb1a9ba70670c5915e0fdfde6457a765de2a8fe12de97
1058
1059 SHAAlg = SHA384
1060 Msg = e511903c2f1bfba245467295ac95413ac4746c984c3750a728c388aa628b0ebf
1061 S = 9c748702bbcc1f9468864cd360c8c39d007b2d8aaee833606c70f7593cf0d1519
1062
1063 [mod = 1024]
1064
1065 n = 1234567890
1066
1067 e = 0010001
1068
1069 SHAAlg = SHA512
1070 Msg = 3456781293fab829
1071 S = deadbeef0000
1072 """).splitlines()
1073
1074 vectors = load_rsa_nist_vectors(vector_data)
1075 assert vectors == [
1076 {
1077 "modulus": int("bcb47b2e0dafcba81ff2a2b5cb115ca7e757184c9d72bcdcda"
1078 "707a146b3b4e29989d", 16),
1079 "public_exponent": 65537,
1080 "algorithm": b"SHA1",
1081 "salt_length": 20,
1082 "msg": b"1248f62a4389f42f7b4bb131053d6c88a994db2075b912ccbe3ea7dc6"
1083 b"11714f14e",
1084 "s": b"682cf53c1145d22a50caa9eb1a9ba70670c5915e0fdfde6457a765de2a8"
1085 b"fe12de97"
1086 },
1087 {
1088 "modulus": int("bcb47b2e0dafcba81ff2a2b5cb115ca7e757184c9d72bcdcda"
1089 "707a146b3b4e29989d", 16),
1090 "public_exponent": 65537,
1091 "algorithm": b"SHA384",
1092 "salt_length": 20,
1093 "msg": b"e511903c2f1bfba245467295ac95413ac4746c984c3750a728c388aa6"
1094 b"28b0ebf",
1095 "s": b"9c748702bbcc1f9468864cd360c8c39d007b2d8aaee833606c70f7593cf"
1096 b"0d1519"
1097 },
1098 {
1099 "modulus": 78187493520,
1100 "public_exponent": 65537,
1101 "algorithm": b"SHA512",
1102 "salt_length": 20,
1103 "msg": b"3456781293fab829",
1104 "s": b"deadbeef0000"
1105 },
1106 ]
Mohammed Attia987cc702014-03-12 16:07:21 +02001107
1108
1109def test_load_fips_dsa_key_pair_vectors():
1110 vector_data = textwrap.dedent("""
1111 # CAVS 11.1
1112 # "KeyPair" information
1113 # Mod sizes selected: L=1024, N=160:: L=2048, N=224 :: L=2048, N=256 :: L
1114=3072, N=256
1115 # Generated on Wed May 04 08:50:52 2011
1116
1117
1118 [mod = L=1024, N=160]
1119
1120 P = d38311e2cd388c3ed698e82fdf88eb92b5a9a483dc88005d4b725ef341eabb47cf8a7a\
11218a41e792a156b7ce97206c4f9c5ce6fc5ae7912102b6b502e59050b5b21ce263dddb2044b65223\
11226f4d42ab4b5d6aa73189cef1ace778d7845a5c1c1c7147123188f8dc551054ee162b634d60f097\
1123f719076640e20980a0093113a8bd73
1124 Q = 96c5390a8b612c0e422bb2b0ea194a3ec935a281
1125 G = 06b7861abbd35cc89e79c52f68d20875389b127361ca66822138ce4991d2b862259d6b\
11264548a6495b195aa0e0b6137ca37eb23b94074d3c3d300042bdf15762812b6333ef7b07ceba7860\
11277610fcc9ee68491dbc1e34cd12615474e52b18bc934fb00c61d39e7da8902291c4434a4e2224c3\
1128f4fd9f93cd6f4f17fc076341a7e7d9
1129
1130 X = 8185fee9cc7c0e91fd85503274f1cd5a3fd15a49
1131 Y = 6f26d98d41de7d871b6381851c9d91fa03942092ab6097e76422070edb71db44ff5682\
113280fdb1709f8fc3feab39f1f824adaeb2a298088156ac31af1aa04bf54f475bdcfdcf2f8a2dd973\
1133e922d83e76f016558617603129b21c70bf7d0e5dc9e68fe332e295b65876eb9a12fe6fca9f1a1c\
1134e80204646bf99b5771d249a6fea627
1135
1136 X = 85322d6ea73083064376099ca2f65f56e8522d9b
1137 Y = 21f8690f717c9f4dcb8f4b6971de2f15b9231fcf41b7eeb997d781f240bfdddfd2090d\
113822083c26cca39bf37c9caf1ec89518ea64845a50d747b49131ffff6a2fd11ea7bacbb93c7d0513\
11397383a06365af82225dd3713ca5a45006316f53bd12b0e260d5f79795e5a4c9f353f12867a1d320\
11402394673ada8563b71555e53f415254
1141
Mohammed Attia987cc702014-03-12 16:07:21 +02001142 [mod = L=2048, N=224]
1143
1144 P = 904ef8e31e14721910fa0969e77c99b79f190071a86026e37a887a6053960dbfb74390\
1145a6641319fe0af32c4e982934b0f1f4c5bc57534e8e56d77c36f0a99080c0d5bc9022fa34f58922\
114681d7b1009571cb5b35699303f912b276d86b1b0722fc0b1500f0ffb2e4d90867a3bdca181a9734\
1147617a8a9f991aa7c14dec1cf45ceba00600f8425440ed0c3b52c82e3aa831932a98b477da220867\
1148eb2d5e0ca34580b33b1b65e558411ed09c369f4717bf03b551787e13d9e47c267c91c697225265\
1149da157945cd8b32e84fc45b80533265239aa00a2dd3d05f5cb231b7daf724b7ecdce170360a8397\
11502e5be94626273d449f441be300a7345db387bebadad67d8060a7
1151 Q = d7d0a83e84d13032b830ed74a6a88592ec9a4cf42bf37080c6600aad
1152 G = 2050b18d3c9f39fac396c009310d6616f9309b67b59aef9aee813d6b4f12ee29ba8a6b\
1153350b11d4336d44b4641230002d870f1e6b1d8728bdd40262df0d2440999185ae077f7034c61679\
1154f4360fbb5d181569e7cb8acb04371c11ba55f1bbd777b74304b99b66d4405303e7120dc8bc4785\
1155f56e9533e65b63a0c77cce7bba0d5d6069df5edffa927c5a255a09405a008258ed93506a843366\
11562154f6f67e922d7c9788f04d4ec09581063950d9cde8e373ea59a58b2a6df6ba8663345574fabb\
1157a9ca981696d83aeac1f34f14f1a813ba900b3f0341dea23f7d3297f919a97e1ae00ac0728c93fe\
11580a88b66591baf4eb0bc6900f39ba5feb41cbbeea7eb7919aa4d3
1159
1160 X = 3f19424da3b4f0cafca3fc5019fcd225dd7e496ffdf6b77e364f45be
1161 Y = 7681ed0ac257ab7ff17c52de4638c0614749792707a0c0d23883697e34963df15c806f\
1162a6206f7fafb3269018e7703bd1e6f518d13544331a017713dbbe0cee8da6c095271fbf24edb74a\
116344e18b1d3b835622f68d31921c67c83e8479d1972ed0cb106c68188fe22c044254251ebf880b90\
116449dc3b7958ef61e1e67d2f677d2a7d2ab6b7c42b70cc5dedc3e5de7459a2dbc70c69008553d7ff\
1165b6bf81c012c8bd67bdddeaab9a4a4373027912a7c7d9cd9cfc6c81dffe0cc7a6d40c3b2065aee7\
1166be80e3c35497d64c8045bc511edaf7314c84c56bd9f0fecf62262ea5b45b49a0cffb223713bdbd\
11673ad03a25a0bb2211eba41ffcd08ab0e1ad485c29a3fc25ee8359
1168
1169 X = 241396352dd26efe0e2e184da52fe2b61d9d51b91b5009674c447854
1170 Y = 2f07a3aa9884c65288e5fef56c7b7f4445632273290bae6fcaab87c90058b2bef81ad3\
117134958657cf649ffb976d618b34ce69ef6d68c0d8bfe275cf097a301e8dd5595958e0c668c15f67\
1172b5c0b0d01983057ce61593635aab5e0564ed720b0336f055a86755c76be22df3b8487f16e2ba0b\
11735136fd30d7e3b1d30c3bd298d3acc0a1988a11756c94e9a53184d0d3edfbb649caf03eace3083d\
1174e9933921e627f4b2e011d1c79e45d8ea1eb7e4e59a1cbd8382b3238474eb949749c985200fbb25\
117541e2dce080aa881945d4d935076e48a0846dc5513bb4da8563b946af54f546455931e79c065ce7\
1176ca223a98f8fde40091d38eb2c3eb8e3b81d88374f3146b0afc42
1177
Mohammed Attia22ccb872014-03-12 18:27:59 +02001178 [mod = L=2048, N=256]
Mohammed Attia987cc702014-03-12 16:07:21 +02001179
1180 P = ea1fb1af22881558ef93be8a5f8653c5a559434c49c8c2c12ace5e9c41434c9cf0a8e9\
1181498acb0f4663c08b4484eace845f6fb17dac62c98e706af0fc74e4da1c6c2b3fbf5a1d58ff82fc\
11821a66f3e8b12252c40278fff9dd7f102eed2cb5b7323ebf1908c234d935414dded7f8d244e54561\
1183b0dca39b301de8c49da9fb23df33c6182e3f983208c560fb5119fbf78ebe3e6564ee235c6a15cb\
1184b9ac247baba5a423bc6582a1a9d8a2b4f0e9e3d9dbac122f750dd754325135257488b1f6ecabf2\
11851bff2947fe0d3b2cb7ffe67f4e7fcdf1214f6053e72a5bb0dd20a0e9fe6db2df0a908c36e95e60\
1186bf49ca4368b8b892b9c79f61ef91c47567c40e1f80ac5aa66ef7
1187 Q = 8ec73f3761caf5fdfe6e4e82098bf10f898740dcb808204bf6b18f507192c19d
1188 G = e4c4eca88415b23ecf811c96e48cd24200fe916631a68a684e6ccb6b1913413d344d1d\
11898d84a333839d88eee431521f6e357c16e6a93be111a98076739cd401bab3b9d565bf4fb99e9d18\
11905b1e14d61c93700133f908bae03e28764d107dcd2ea7674217622074bb19efff482f5f5c1a86d5\
1191551b2fc68d1c6e9d8011958ef4b9c2a3a55d0d3c882e6ad7f9f0f3c61568f78d0706b10a26f23b\
11924f197c322b825002284a0aca91807bba98ece912b80e10cdf180cf99a35f210c1655fbfdd74f13\
1193b1b5046591f8403873d12239834dd6c4eceb42bf7482e1794a1601357b629ddfa971f2ed273b14\
11946ec1ca06d0adf55dd91d65c37297bda78c6d210c0bc26e558302
1195
1196 X = 405772da6e90d809e77d5de796562a2dd4dfd10ef00a83a3aba6bd818a0348a1
1197 Y = 6b32e31ab9031dc4dd0b5039a78d07826687ab087ae6de4736f5b0434e1253092e8a0b\
1198231f9c87f3fc8a4cb5634eb194bf1b638b7a7889620ce6711567e36aa36cda4604cfaa601a4591\
11998371d4ccf68d8b10a50a0460eb1dc0fff62ef5e6ee4d473e18ea4a66c196fb7e677a49b48241a0\
1200b4a97128eff30fa437050501a584f8771e7280d26d5af30784039159c11ebfea10b692fd0a5821\
12015eeb18bff117e13f08db792ed4151a218e4bed8dddfb0793225bd1e9773505166f4bd8cedbb286\
1202ea28232972da7bae836ba97329ba6b0a36508e50a52a7675e476d4d4137eae13f22a9d2fefde70\
12038ba8f34bf336c6e76331761e4b0617633fe7ec3f23672fb19d27
1204
1205 X = 0e0b95e31fda3f888059c46c3002ef8f2d6be112d0209aeb9e9545da67aeea80
1206 Y = 778082b77ddba6f56597cc74c3a612abf2ddbd85cc81430c99ab843c1f630b9db01399\
120765f563978164f9bf3a8397256be714625cd41cd7fa0067d94ea66d7e073f7125af692ad01371d4\
1208a17f4550590378f2b074030c20e36911598a1018772f61be3b24de4be5a388ccc09e15a92819c3\
12091dec50de9fde105b49eaa097b9d13d9219eeb33b628facfd1c78a7159c8430d0647c506e7e3de7\
12104763cb351eada72c00bef3c9641881e6254870c1e6599f8ca2f1bbb74f39a905e3a34e4544168e\
12116e50c9e3305fd09cab6ed4aff6fda6e0d5bf375c81ac9054406d9193b003c89272f1bd83d48250\
1212134b65c77c2b6332d38d34d9016f0e8975536ad6c348a1faedb0
1213
Mohammed Attia987cc702014-03-12 16:07:21 +02001214 """).splitlines()
1215
1216 expected_vectors = [
1217 {'g': '06b7861abbd35cc89e79c52f68d20875389b127361ca66\
1218822138ce4991d2b862259d6b4548a6495b195aa0e0b6137ca37eb23b94074d3c3\
1219d300042bdf15762812b6333ef7b07ceba78607610fcc9ee68491dbc1e34cd1261\
12205474e52b18bc934fb00c61d39e7da8902291c4434a4e2224c3f4fd9f93cd6f4f1\
12217fc076341a7e7d9',
1222 'p': 'd38311e2cd388c3ed698e82fdf88eb92b5a9a483dc8800\
12235d4b725ef341eabb47cf8a7a8a41e792a156b7ce97206c4f9c5ce6fc5ae791210\
12242b6b502e59050b5b21ce263dddb2044b652236f4d42ab4b5d6aa73189cef1ace7\
122578d7845a5c1c1c7147123188f8dc551054ee162b634d60f097f719076640e2098\
12260a0093113a8bd73',
1227 'q': '96c5390a8b612c0e422bb2b0ea194a3ec935a281',
1228 'x': '8185fee9cc7c0e91fd85503274f1cd5a3fd15a49',
1229 'y': '6f26d98d41de7d871b6381851c9d91fa03942092ab6097\
1230e76422070edb71db44ff568280fdb1709f8fc3feab39f1f824adaeb2a29808815\
12316ac31af1aa04bf54f475bdcfdcf2f8a2dd973e922d83e76f016558617603129b2\
12321c70bf7d0e5dc9e68fe332e295b65876eb9a12fe6fca9f1a1ce80204646bf99b5\
1233771d249a6fea627'},
1234 {'g': '06b7861abbd35cc89e79c52f68d20875389b127361ca66822138\
1235 ce4991d2b862259d6b4548a6495b195aa0e0b6137ca37eb23b94074d3c3d30004\
1236 2bdf15762812b6333ef7b07ceba78607610fcc9ee68491dbc1e34cd12615474e5\
1237 2b18bc934fb00c61d39e7da8902291c4434a4e2224c3f4fd9f93cd6f4f17fc076\
1238 341a7e7d9',
1239 'p': 'd38311e2cd388c3ed698e82fdf88eb92b5a9a483dc88005d4b72\
1240 5ef341eabb47cf8a7a8a41e792a156b7ce97206c4f9c5ce6fc5ae7912102b6b50\
1241 2e59050b5b21ce263dddb2044b652236f4d42ab4b5d6aa73189cef1ace778d784\
1242 5a5c1c1c7147123188f8dc551054ee162b634d60f097f719076640e20980a0093\
1243 113a8bd73',
1244 'q': '96c5390a8b612c0e422bb2b0ea194a3ec935a281',
1245 'x': '85322d6ea73083064376099ca2f65f56e8522d9b',
1246 'y': '21f8690f717c9f4dcb8f4b6971de2f15b9231fcf41b7eeb997d7\
1247 81f240bfdddfd2090d22083c26cca39bf37c9caf1ec89518ea64845a50d747b49\
1248 131ffff6a2fd11ea7bacbb93c7d05137383a06365af82225dd3713ca5a4500631\
1249 6f53bd12b0e260d5f79795e5a4c9f353f12867a1d3202394673ada8563b71555e\
1250 53f415254'},
Mohammed Attia987cc702014-03-12 16:07:21 +02001251 {'g': 'e4c4eca88415b23ecf811c96e48cd24200fe916631a68a684e6c\
1252 cb6b1913413d344d1d8d84a333839d88eee431521f6e357c16e6a93be111a9807\
1253 6739cd401bab3b9d565bf4fb99e9d185b1e14d61c93700133f908bae03e28764d\
1254 107dcd2ea7674217622074bb19efff482f5f5c1a86d5551b2fc68d1c6e9d80119\
1255 58ef4b9c2a3a55d0d3c882e6ad7f9f0f3c61568f78d0706b10a26f23b4f197c32\
1256 2b825002284a0aca91807bba98ece912b80e10cdf180cf99a35f210c1655fbfdd\
1257 74f13b1b5046591f8403873d12239834dd6c4eceb42bf7482e1794a1601357b62\
1258 9ddfa971f2ed273b146ec1ca06d0adf55dd91d65c37297bda78c6d210c0bc26e5\
1259 58302',
1260 'p': 'ea1fb1af22881558ef93be8a5f8653c5a559434c49c8c2c12ace\
1261 5e9c41434c9cf0a8e9498acb0f4663c08b4484eace845f6fb17dac62c98e706af\
1262 0fc74e4da1c6c2b3fbf5a1d58ff82fc1a66f3e8b12252c40278fff9dd7f102eed\
1263 2cb5b7323ebf1908c234d935414dded7f8d244e54561b0dca39b301de8c49da9f\
1264 b23df33c6182e3f983208c560fb5119fbf78ebe3e6564ee235c6a15cbb9ac247b\
1265 aba5a423bc6582a1a9d8a2b4f0e9e3d9dbac122f750dd754325135257488b1f6e\
1266 cabf21bff2947fe0d3b2cb7ffe67f4e7fcdf1214f6053e72a5bb0dd20a0e9fe6d\
1267 b2df0a908c36e95e60bf49ca4368b8b892b9c79f61ef91c47567c40e1f80ac5aa\
1268 66ef7',
1269 'q': '8ec73f3761caf5fdfe6e4e82098bf10f898740dcb808204bf6b1\
1270 8f507192c19d',
1271 'x': '405772da6e90d809e77d5de796562a2dd4dfd10ef00a83a3aba6\
1272 bd818a0348a1',
1273 'y': '6b32e31ab9031dc4dd0b5039a78d07826687ab087ae6de4736f5\
1274 b0434e1253092e8a0b231f9c87f3fc8a4cb5634eb194bf1b638b7a7889620ce67\
1275 11567e36aa36cda4604cfaa601a45918371d4ccf68d8b10a50a0460eb1dc0fff6\
1276 2ef5e6ee4d473e18ea4a66c196fb7e677a49b48241a0b4a97128eff30fa437050\
1277 501a584f8771e7280d26d5af30784039159c11ebfea10b692fd0a58215eeb18bf\
1278 f117e13f08db792ed4151a218e4bed8dddfb0793225bd1e9773505166f4bd8ced\
1279 bb286ea28232972da7bae836ba97329ba6b0a36508e50a52a7675e476d4d4137e\
1280 ae13f22a9d2fefde708ba8f34bf336c6e76331761e4b0617633fe7ec3f23672fb\
1281 19d27'},
1282 {'g': 'e4c4eca88415b23ecf811c96e48cd24200fe916631a68a684e6c\
1283 cb6b1913413d344d1d8d84a333839d88eee431521f6e357c16e6a93be111a9807\
1284 6739cd401bab3b9d565bf4fb99e9d185b1e14d61c93700133f908bae03e28764d\
1285 107dcd2ea7674217622074bb19efff482f5f5c1a86d5551b2fc68d1c6e9d80119\
1286 58ef4b9c2a3a55d0d3c882e6ad7f9f0f3c61568f78d0706b10a26f23b4f197c32\
1287 2b825002284a0aca91807bba98ece912b80e10cdf180cf99a35f210c1655fbfdd\
1288 74f13b1b5046591f8403873d12239834dd6c4eceb42bf7482e1794a1601357b62\
1289 9ddfa971f2ed273b146ec1ca06d0adf55dd91d65c37297bda78c6d210c0bc26e5\
1290 58302',
1291 'p': 'ea1fb1af22881558ef93be8a5f8653c5a559434c49c8c2c12ace\
1292 5e9c41434c9cf0a8e9498acb0f4663c08b4484eace845f6fb17dac62c98e706af\
1293 0fc74e4da1c6c2b3fbf5a1d58ff82fc1a66f3e8b12252c40278fff9dd7f102eed\
1294 2cb5b7323ebf1908c234d935414dded7f8d244e54561b0dca39b301de8c49da9f\
1295 b23df33c6182e3f983208c560fb5119fbf78ebe3e6564ee235c6a15cbb9ac247b\
1296 aba5a423bc6582a1a9d8a2b4f0e9e3d9dbac122f750dd754325135257488b1f6e\
1297 cabf21bff2947fe0d3b2cb7ffe67f4e7fcdf1214f6053e72a5bb0dd20a0e9fe6d\
1298 b2df0a908c36e95e60bf49ca4368b8b892b9c79f61ef91c47567c40e1f80ac5aa\
1299 66ef7',
1300 'q': '8ec73f3761caf5fdfe6e4e82098bf10f898740dcb808204bf6b1\
1301 8f507192c19d',
1302 'x': '0e0b95e31fda3f888059c46c3002ef8f2d6be112d0209aeb9e95\
1303 45da67aeea80',
1304 'y': '778082b77ddba6f56597cc74c3a612abf2ddbd85cc81430c99ab\
1305 843c1f630b9db0139965f563978164f9bf3a8397256be714625cd41cd7fa0067d\
1306 94ea66d7e073f7125af692ad01371d4a17f4550590378f2b074030c20e3691159\
1307 8a1018772f61be3b24de4be5a388ccc09e15a92819c31dec50de9fde105b49eaa\
1308 097b9d13d9219eeb33b628facfd1c78a7159c8430d0647c506e7e3de74763cb35\
1309 1eada72c00bef3c9641881e6254870c1e6599f8ca2f1bbb74f39a905e3a34e454\
1310 4168e6e50c9e3305fd09cab6ed4aff6fda6e0d5bf375c81ac9054406d9193b003\
1311 c89272f1bd83d48250134b65c77c2b6332d38d34d9016f0e8975536ad6c348a1f\
Mohammed Attia22ccb872014-03-12 18:27:59 +02001312 aedb0'}
Mohammed Attia987cc702014-03-12 16:07:21 +02001313 ]
1314
1315 expected = []
1316 for dictionary in expected_vectors:
1317 new_dict = {}
Mohammed Attia98afd762014-03-12 16:28:57 +02001318 for k, v in six.iteritems(dictionary):
Mohammed Attia987cc702014-03-12 16:07:21 +02001319 v = v.strip()
1320 v = v.replace(" ", "")
1321 v = int(v, 16)
1322 new_dict[k] = v
1323 expected.append(new_dict)
1324
1325 assert expected == load_fips_dsa_key_pair_vectors(vector_data)