1
2
3
4
5
6
7
8
9
10
11 package cipher_test
12
13 import (
14 "bytes"
15 "crypto/aes"
16 "crypto/cipher"
17 "testing"
18 )
19
20 var commonCounter = []byte{0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff}
21
22 var ctrAESTests = []struct {
23 name string
24 key []byte
25 iv []byte
26 in []byte
27 out []byte
28 }{
29
30 {
31 "CTR-AES128",
32 commonKey128,
33 commonCounter,
34 commonInput,
35 []byte{
36 0x87, 0x4d, 0x61, 0x91, 0xb6, 0x20, 0xe3, 0x26, 0x1b, 0xef, 0x68, 0x64, 0x99, 0x0d, 0xb6, 0xce,
37 0x98, 0x06, 0xf6, 0x6b, 0x79, 0x70, 0xfd, 0xff, 0x86, 0x17, 0x18, 0x7b, 0xb9, 0xff, 0xfd, 0xff,
38 0x5a, 0xe4, 0xdf, 0x3e, 0xdb, 0xd5, 0xd3, 0x5e, 0x5b, 0x4f, 0x09, 0x02, 0x0d, 0xb0, 0x3e, 0xab,
39 0x1e, 0x03, 0x1d, 0xda, 0x2f, 0xbe, 0x03, 0xd1, 0x79, 0x21, 0x70, 0xa0, 0xf3, 0x00, 0x9c, 0xee,
40 },
41 },
42 {
43 "CTR-AES192",
44 commonKey192,
45 commonCounter,
46 commonInput,
47 []byte{
48 0x1a, 0xbc, 0x93, 0x24, 0x17, 0x52, 0x1c, 0xa2, 0x4f, 0x2b, 0x04, 0x59, 0xfe, 0x7e, 0x6e, 0x0b,
49 0x09, 0x03, 0x39, 0xec, 0x0a, 0xa6, 0xfa, 0xef, 0xd5, 0xcc, 0xc2, 0xc6, 0xf4, 0xce, 0x8e, 0x94,
50 0x1e, 0x36, 0xb2, 0x6b, 0xd1, 0xeb, 0xc6, 0x70, 0xd1, 0xbd, 0x1d, 0x66, 0x56, 0x20, 0xab, 0xf7,
51 0x4f, 0x78, 0xa7, 0xf6, 0xd2, 0x98, 0x09, 0x58, 0x5a, 0x97, 0xda, 0xec, 0x58, 0xc6, 0xb0, 0x50,
52 },
53 },
54 {
55 "CTR-AES256",
56 commonKey256,
57 commonCounter,
58 commonInput,
59 []byte{
60 0x60, 0x1e, 0xc3, 0x13, 0x77, 0x57, 0x89, 0xa5, 0xb7, 0xa7, 0xf5, 0x04, 0xbb, 0xf3, 0xd2, 0x28,
61 0xf4, 0x43, 0xe3, 0xca, 0x4d, 0x62, 0xb5, 0x9a, 0xca, 0x84, 0xe9, 0x90, 0xca, 0xca, 0xf5, 0xc5,
62 0x2b, 0x09, 0x30, 0xda, 0xa2, 0x3d, 0xe9, 0x4c, 0xe8, 0x70, 0x17, 0xba, 0x2d, 0x84, 0x98, 0x8d,
63 0xdf, 0xc9, 0xc5, 0x8d, 0xb6, 0x7a, 0xad, 0xa6, 0x13, 0xc2, 0xdd, 0x08, 0x45, 0x79, 0x41, 0xa6,
64 },
65 },
66 }
67
68 func TestCTR_AES(t *testing.T) {
69 for _, tt := range ctrAESTests {
70 test := tt.name
71
72 c, err := aes.NewCipher(tt.key)
73 if err != nil {
74 t.Errorf("%s: NewCipher(%d bytes) = %s", test, len(tt.key), err)
75 continue
76 }
77
78 for j := 0; j <= 5; j += 5 {
79 in := tt.in[0 : len(tt.in)-j]
80 ctr := cipher.NewCTR(c, tt.iv)
81 encrypted := make([]byte, len(in))
82 ctr.XORKeyStream(encrypted, in)
83 if out := tt.out[:len(in)]; !bytes.Equal(out, encrypted) {
84 t.Errorf("%s/%d: CTR\ninpt %x\nhave %x\nwant %x", test, len(in), in, encrypted, out)
85 }
86 }
87
88 for j := 0; j <= 7; j += 7 {
89 in := tt.out[0 : len(tt.out)-j]
90 ctr := cipher.NewCTR(c, tt.iv)
91 plain := make([]byte, len(in))
92 ctr.XORKeyStream(plain, in)
93 if out := tt.in[:len(in)]; !bytes.Equal(out, plain) {
94 t.Errorf("%s/%d: CTRReader\nhave %x\nwant %x", test, len(out), plain, out)
95 }
96 }
97
98 if t.Failed() {
99 break
100 }
101 }
102 }
103
View as plain text