summaryrefslogtreecommitdiff
path: root/pycryptopp/test/test_aes.py
diff options
context:
space:
mode:
Diffstat (limited to 'pycryptopp/test/test_aes.py')
-rw-r--r--pycryptopp/test/test_aes.py107
1 files changed, 0 insertions, 107 deletions
diff --git a/pycryptopp/test/test_aes.py b/pycryptopp/test/test_aes.py
deleted file mode 100644
index d4e2c44..0000000
--- a/pycryptopp/test/test_aes.py
+++ /dev/null
@@ -1,107 +0,0 @@
-#!/usr/bin/env python
-
-import random, re
-
-import unittest
-
-from binascii import a2b_hex, b2a_hex
-
-global VERBOSE
-VERBOSE=False
-
-from pycryptopp.cipher import aes
-
-from pkg_resources import resource_string, resource_listdir
-
-from base64 import b32encode
-def ab(x): # debuggery
- if len(x) >= 3:
- return "%s:%s" % (len(x), b32encode(x[-3:]),)
- elif len(x) == 2:
- return "%s:%s" % (len(x), b32encode(x[-2:]),)
- elif len(x) == 1:
- return "%s:%s" % (len(x), b32encode(x[-1:]),)
- elif len(x) == 0:
- return "%s:%s" % (len(x), "--empty--",)
-
-def randstr(n):
- return ''.join(map(chr, map(random.randrange, [0]*n, [256]*n)))
-
-class AES256(unittest.TestCase):
- enc0 = "dc95c078a2408989ad48a21492842087530f8afbc74536b9a963b4f1c4cb738b"
-
- def test_encrypt_zeroes(self):
- cryptor = aes.AES(key="\x00"*32)
- ct = cryptor.process("\x00"*32)
- self.failUnlessEqual(self.enc0, b2a_hex(ct))
-
- def test_init_type_check(self):
- self.failUnlessRaises(TypeError, aes.AES, None)
- self.failUnlessRaises(aes.Error, aes.AES, "a"*1) # too short
- self.failUnlessRaises(aes.Error, aes.AES, "a"*17) # not one of the valid key sizes for AES (16, 24, 32)
-
- def test_encrypt_zeroes_in_two_parts(self):
- cryptor = aes.AES(key="\x00"*32)
- ct1 = cryptor.process("\x00"*15)
- ct2 = cryptor.process("\x00"*17)
- self.failUnlessEqual(self.enc0, b2a_hex(ct1+ct2))
-
-class AES128(unittest.TestCase):
- enc0 = "66e94bd4ef8a2c3b884cfa59ca342b2e"
-
- def test_encrypt_zeroes(self):
- cryptor = aes.AES(key="\x00"*16)
- ct = cryptor.process("\x00"*16)
- self.failUnlessEqual(self.enc0, b2a_hex(ct))
-
- def test_init_type_check(self):
- self.failUnlessRaises(TypeError, aes.AES, None)
- self.failUnlessRaises(aes.Error, aes.AES, "a") # too short
-
- def test_encrypt_zeroes_in_two_parts(self):
- cryptor = aes.AES(key="\x00"*16)
- ct1 = cryptor.process("\x00"*8)
- ct2 = cryptor.process("\x00"*8)
- self.failUnlessEqual(self.enc0, b2a_hex(ct1+ct2))
-
-def fake_ecb_using_ctr(k, p):
- return aes.AES(key=k, iv=p).process('\x00'*16)
-
-NIST_KAT_VECTS_RE=re.compile("\nCOUNT = ([0-9]+)\nKEY = ([0-9a-f]+)\nPLAINTEXT = ([0-9a-f]+)\nCIPHERTEXT = ([0-9a-f]+)")
-
-class AES_from_NIST_KAT(unittest.TestCase):
- def test_NIST_KAT(self):
- for vectname in resource_listdir('pycryptopp', 'testvectors/KAT_AES'):
- self._test_KAT_file(resource_string('pycryptopp', '/'.join(['testvectors/KAT_AES', vectname])))
-
- def _test_KAT_file(self, vects_str):
- for mo in NIST_KAT_VECTS_RE.finditer(vects_str):
- key = a2b_hex(mo.group(2))
- plaintext = a2b_hex(mo.group(3))
- ciphertext = a2b_hex(mo.group(4))
-
- computedciphertext = fake_ecb_using_ctr(key, plaintext)
- self.failUnlessEqual(computedciphertext, ciphertext, "computedciphertext: %s, ciphertext: %s, key: %s, plaintext: %s" % (b2a_hex(computedciphertext), b2a_hex(ciphertext), b2a_hex(key), b2a_hex(plaintext)))
-
-class AES_from_Niels_Ferguson(unittest.TestCase):
- # http://blogs.msdn.com/si_team/archive/2006/05/19/aes-test-vectors.aspx
- def _test_from_Niels_AES(self, keysize, result):
- E = fake_ecb_using_ctr
- b = 16
- k = keysize
- S = '\x00' * (k+b)
- for i in range(1000):
- K = S[-k:]
- P = S[-k-b:-k]
- S += E(K, E(K, P))
-
- self.failUnlessEqual(S[-b:], a2b_hex(result))
-
- def test_from_Niels_AES128(self):
- return self._test_from_Niels_AES(16, 'bd883f01035e58f42f9d812f2dacbcd8')
-
- def test_from_Niels_AES256(self):
- return self._test_from_Niels_AES(32, 'c84b0f3a2c76dd9871900b07f09bdd3e')
-
-if __name__ == "__main__":
- unittest.main()