192 lines
7.4 KiB
Python
192 lines
7.4 KiB
Python
# test_ciphers.py
|
|
#
|
|
# Copyright (C) 2006-2016 wolfSSL Inc.
|
|
#
|
|
# This file is part of wolfSSL. (formerly known as CyaSSL)
|
|
#
|
|
# wolfSSL is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation; either version 2 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# wolfSSL is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
|
|
import unittest
|
|
from wolfcrypt.ciphers import *
|
|
from wolfcrypt.utils import t2b, h2b
|
|
|
|
|
|
class TestAes(unittest.TestCase):
|
|
key = "0123456789abcdef"
|
|
IV = "1234567890abcdef"
|
|
plain = t2b("now is the time ")
|
|
cipher = h2b("959492575f4281532ccc9d4677a233cb")
|
|
|
|
|
|
def setUp(self):
|
|
self.aes = Aes.new(self.key, MODE_CBC, self.IV)
|
|
|
|
|
|
def test_raises(self):
|
|
# invalid key length
|
|
self.assertRaises(ValueError, Aes.new, "key", MODE_CBC, self.IV)
|
|
|
|
# invalid mode
|
|
self.assertRaises(ValueError, Aes.new, self.key, MODE_ECB, self.IV)
|
|
|
|
# invalid iv length
|
|
self.assertRaises(ValueError, Aes.new, self.key, MODE_CBC, "IV")
|
|
|
|
# invalid data length
|
|
self.assertRaises(ValueError, self.aes.encrypt, "foo")
|
|
self.assertRaises(ValueError, self.aes.decrypt, "bar")
|
|
|
|
|
|
def test_single_encryption(self):
|
|
assert self.aes.encrypt(self.plain) == self.cipher
|
|
|
|
|
|
def test_multi_encryption(self):
|
|
result = t2b("")
|
|
segments = tuple(self.plain[i:i + self.aes.block_size] \
|
|
for i in range(0, len(self.plain), self.aes.block_size))
|
|
|
|
for segment in segments:
|
|
result += self.aes.encrypt(segment)
|
|
|
|
assert result == self.cipher
|
|
|
|
|
|
def test_single_decryption(self):
|
|
assert self.aes.decrypt(self.cipher) == self.plain
|
|
|
|
|
|
def test_multi_decryption(self):
|
|
result = t2b("")
|
|
segments = tuple(self.cipher[i:i + self.aes.block_size] \
|
|
for i in range(0, len(self.cipher), self.aes.block_size))
|
|
|
|
for segment in segments:
|
|
result += self.aes.decrypt(segment)
|
|
|
|
assert result == self.plain
|
|
|
|
|
|
class TestRsaPrivate(unittest.TestCase):
|
|
key = "3082025C02010002818100BC730EA849F374A2A9EF18A5DA559921F9C8ECB36D" \
|
|
+ "48E53535757737ECD161905F3ED9E4D5DF94CAC1A9D719DA86C9E84DC4613682" \
|
|
+ "FEABAD7E7725BB8D11A5BC623AA838CC39A20466B4F7F7F3AADA4D020EBB5E8D" \
|
|
+ "6948DC77C9280E22E96BA426BA4CE8C1FD4A6F2B1FEF8AAEF69062E5641EEB2B" \
|
|
+ "3C67C8DC2700F6916865A902030100010281801397EAE8387825A25C04CE0D40" \
|
|
+ "7C31E5C470CD9B823B5809863B665FDC3190F14FD5DB15DDDED73B9593311831" \
|
|
+ "0E5EA3D6A21A716E81481C4BCFDB8E7A866132DCFB55C1166D279224458BF1B8" \
|
|
+ "48B14B1DACDEDADD8E2FC291FBA5A96EF83A6AF1FD5018EF9FE7C3CA78EA56D3" \
|
|
+ "D3725B96DD4E064E3AC3D9BE72B66507074C01024100FA47D47A7C923C55EF81" \
|
|
+ "F041302DA3CF8F1CE6872705700DDF9835D6F18B382F24B5D084B6794F712994" \
|
|
+ "5AF0646AACE772C6ED4D59983E673AF3742CF9611769024100C0C1820D0CEBC6" \
|
|
+ "2FDC92F99D821A31E9E9F74BF282871CEE166AD11D188270F3C0B62FF6F3F71D" \
|
|
+ "F18623C84EEB8F568E8FF5BFF1F72BB5CC3DC657390C1B54410241009D7E05DE" \
|
|
+ "EDF4B7B2FBFC304B551DE32F0147966905CD0E2E2CBD8363B6AB7CB76DCA5B64" \
|
|
+ "A7CEBE86DF3B53DE61D21EEBA5F637EDACAB78D94CE755FBD71199C102401898" \
|
|
+ "1829E61E2739702168AC0A2FA172C121869538C65890A0579CBAE3A7B115C8DE" \
|
|
+ "F61BC2612376EFB09D1C44BE1343396717C89DCAFBF545648B38822CF2810240" \
|
|
+ "3989E59C195530BAB7488C48140EF49F7E779743E1B419353123759C3B44AD69" \
|
|
+ "1256EE0061641666D37C742B15B4A2FEBF086B1A5D3F9012B105863129DBD9E2"
|
|
|
|
plain = t2b("Everyone gets Friday off.")
|
|
|
|
|
|
def setUp(self):
|
|
self.rsa = RsaPrivate(h2b(self.key))
|
|
|
|
|
|
def test_raises(self):
|
|
# invalid key
|
|
self.assertRaises(WolfCryptError, RsaPrivate, 'key')
|
|
|
|
|
|
def test_output_size(self):
|
|
assert self.rsa.output_size == 1024 / 8
|
|
|
|
|
|
def test_encrypt_decrypt(self):
|
|
cipher = self.rsa.encrypt(self.plain)
|
|
result = self.rsa.decrypt(cipher)
|
|
|
|
assert len(cipher) == self.rsa.output_size == 1024 / 8
|
|
assert self.plain == result
|
|
|
|
|
|
def test_sign_verify(self):
|
|
signature = self.rsa.sign(self.plain)
|
|
result = self.rsa.verify(signature)
|
|
|
|
assert len(signature) == self.rsa.output_size == 1024 / 8
|
|
assert self.plain == result
|
|
|
|
|
|
class TestRsaPublic(unittest.TestCase):
|
|
prv = "3082025C02010002818100BC730EA849F374A2A9EF18A5DA559921F9C8ECB36D" \
|
|
+ "48E53535757737ECD161905F3ED9E4D5DF94CAC1A9D719DA86C9E84DC4613682" \
|
|
+ "FEABAD7E7725BB8D11A5BC623AA838CC39A20466B4F7F7F3AADA4D020EBB5E8D" \
|
|
+ "6948DC77C9280E22E96BA426BA4CE8C1FD4A6F2B1FEF8AAEF69062E5641EEB2B" \
|
|
+ "3C67C8DC2700F6916865A902030100010281801397EAE8387825A25C04CE0D40" \
|
|
+ "7C31E5C470CD9B823B5809863B665FDC3190F14FD5DB15DDDED73B9593311831" \
|
|
+ "0E5EA3D6A21A716E81481C4BCFDB8E7A866132DCFB55C1166D279224458BF1B8" \
|
|
+ "48B14B1DACDEDADD8E2FC291FBA5A96EF83A6AF1FD5018EF9FE7C3CA78EA56D3" \
|
|
+ "D3725B96DD4E064E3AC3D9BE72B66507074C01024100FA47D47A7C923C55EF81" \
|
|
+ "F041302DA3CF8F1CE6872705700DDF9835D6F18B382F24B5D084B6794F712994" \
|
|
+ "5AF0646AACE772C6ED4D59983E673AF3742CF9611769024100C0C1820D0CEBC6" \
|
|
+ "2FDC92F99D821A31E9E9F74BF282871CEE166AD11D188270F3C0B62FF6F3F71D" \
|
|
+ "F18623C84EEB8F568E8FF5BFF1F72BB5CC3DC657390C1B54410241009D7E05DE" \
|
|
+ "EDF4B7B2FBFC304B551DE32F0147966905CD0E2E2CBD8363B6AB7CB76DCA5B64" \
|
|
+ "A7CEBE86DF3B53DE61D21EEBA5F637EDACAB78D94CE755FBD71199C102401898" \
|
|
+ "1829E61E2739702168AC0A2FA172C121869538C65890A0579CBAE3A7B115C8DE" \
|
|
+ "F61BC2612376EFB09D1C44BE1343396717C89DCAFBF545648B38822CF2810240" \
|
|
+ "3989E59C195530BAB7488C48140EF49F7E779743E1B419353123759C3B44AD69" \
|
|
+ "1256EE0061641666D37C742B15B4A2FEBF086B1A5D3F9012B105863129DBD9E2"
|
|
|
|
pub = "30819F300D06092A864886F70D010101050003818D0030818902818100BC730E" \
|
|
+ "A849F374A2A9EF18A5DA559921F9C8ECB36D48E53535757737ECD161905F3ED9" \
|
|
+ "E4D5DF94CAC1A9D719DA86C9E84DC4613682FEABAD7E7725BB8D11A5BC623AA8" \
|
|
+ "38CC39A20466B4F7F7F3AADA4D020EBB5E8D6948DC77C9280E22E96BA426BA4C" \
|
|
+ "E8C1FD4A6F2B1FEF8AAEF69062E5641EEB2B3C67C8DC2700F6916865A90203010001"
|
|
|
|
plain = t2b("Everyone gets Friday off.")
|
|
|
|
|
|
def setUp(self):
|
|
self.private = RsaPrivate(h2b(self.prv))
|
|
self.public = RsaPublic(h2b(self.pub))
|
|
|
|
|
|
def test_raises(self):
|
|
# invalid key
|
|
self.assertRaises(WolfCryptError, RsaPublic, 'key')
|
|
|
|
|
|
def test_output_size(self):
|
|
assert self.public.output_size == 1024 / 8
|
|
|
|
|
|
def test_encrypt_decrypt(self):
|
|
cipher = self.public.encrypt(self.plain)
|
|
result = self.private.decrypt(cipher)
|
|
|
|
assert len(cipher) == self.public.output_size == 1024 / 8
|
|
assert self.plain == result
|
|
|
|
|
|
def test_sign_verify(self):
|
|
signature = self.private.sign(self.plain)
|
|
result = self.public.verify(signature)
|
|
|
|
assert len(signature) == self.public.output_size == 1024 / 8
|
|
assert self.plain == result
|