Last active
September 17, 2018 09:20
-
-
Save littlecxm/8adf4cdfd44d72ee844fd947411d2b80 to your computer and use it in GitHub Desktop.
ecb_aes_test.go
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// Copyright 2013 The Go Authors. All rights reserved. | |
// Use of this source code is governed by a BSD-style | |
// license that can be found in the LICENSE file. | |
// ECB AES test vectors. | |
// See U.S. National Institute of Standards and Technology (NIST) | |
// Special Publication 800-38A, ``Recommendation for Block Cipher | |
// Modes of Operation,'' 2001 Edition, pp. 24-29. | |
package cipher_test | |
import ( | |
"bytes" | |
"crypto/aes" | |
"crypto/cipher" | |
"testing" | |
) | |
var ecbAESTests = []struct { | |
name string | |
key []byte | |
in []byte | |
out []byte | |
}{ | |
// NIST SP 800-38A pp 24-27 | |
{ | |
"ECB-AES128", | |
commonKey128, | |
commonInput, | |
[]byte{ | |
0x3a, 0xd7, 0x7b, 0xb4, 0x0d, 0x7a, 0x36, 0x60, 0xa8, 0x9e, 0xca, 0xf3, 0x24, 0x66, 0xef, 0x97, | |
0xf5, 0xd3, 0xd5, 0x85, 0x03, 0xb9, 0x69, 0x9d, 0xe7, 0x85, 0x89, 0x5a, 0x96, 0xfd, 0xba, 0xaf, | |
0x43, 0xb1, 0xcd, 0x7f, 0x59, 0x8e, 0xce, 0x23, 0x88, 0x1b, 0x00, 0xe3, 0xed, 0x03, 0x06, 0x88, | |
0x7b, 0x0c, 0x78, 0x5e, 0x27, 0xe8, 0xad, 0x3f, 0x82, 0x23, 0x20, 0x71, 0x04, 0x72, 0x5d, 0xd4, | |
}, | |
}, | |
{ | |
"ECB-AES192", | |
commonKey192, | |
commonInput, | |
[]byte{ | |
0xbd, 0x33, 0x4f, 0x1d, 0x6e, 0x45, 0xf2, 0x5f, 0xf7, 0x12, 0xa2, 0x14, 0x57, 0x1f, 0xa5, 0xcc, | |
0x97, 0x41, 0x04, 0x84, 0x6d, 0x0a, 0xd3, 0xad, 0x77, 0x34, 0xec, 0xb3, 0xec, 0xee, 0x4e, 0xef, | |
0xef, 0x7a, 0xfd, 0x22, 0x70, 0xe2, 0xe6, 0x0a, 0xdc, 0xe0, 0xba, 0x2f, 0xac, 0xe6, 0x44, 0x4e, | |
0x9a, 0x4b, 0x41, 0xba, 0x73, 0x8d, 0x6c, 0x72, 0xfb, 0x16, 0x69, 0x16, 0x03, 0xc1, 0x8e, 0x0e, | |
}, | |
}, | |
{ | |
"ECB-AES256", | |
commonKey256, | |
commonInput, | |
[]byte{ | |
0xf3, 0xee, 0xd1, 0xbd, 0xb5, 0xd2, 0xa0, 0x3c, 0x06, 0x4b, 0x5a, 0x7e, 0x3d, 0xb1, 0x81, 0xf8, | |
0x59, 0x1c, 0xcb, 0x10, 0xd4, 0x10, 0xed, 0x26, 0xdc, 0x5b, 0xa7, 0x4a, 0x31, 0x36, 0x28, 0x70, | |
0xb6, 0xed, 0x21, 0xb9, 0x9c, 0xa6, 0xf4, 0xf9, 0xf1, 0x53, 0xe7, 0xb1, 0xbe, 0xaf, 0xed, 0x1d, | |
0x23, 0x30, 0x4b, 0x7a, 0x39, 0xf9, 0xf3, 0xff, 0x06, 0x7d, 0x8d, 0x8f, 0x9e, 0x24, 0xec, 0xc7, | |
}, | |
}, | |
} | |
func TestECB_AES(t *testing.T) { | |
for _, tt := range ecbAESTests { | |
test := tt.name | |
c, err := aes.NewCipher(tt.key) | |
if err != nil { | |
t.Errorf("%s: NewCipher(%d bytes) = %s", test, len(tt.key), err) | |
continue | |
} | |
encrypter := cipher.NewECBEncrypter(c) | |
d := make([]byte, len(tt.in)) | |
encrypter.CryptBlocks(d, tt.in) | |
if !bytes.Equal(tt.out, d) { | |
t.Errorf("%s: ECBEncrypter\nhave %x\nwant %x", test, d, tt.out) | |
} | |
decrypter := cipher.NewECBDecrypter(c) | |
p := make([]byte, len(d)) | |
decrypter.CryptBlocks(p, d) | |
if !bytes.Equal(tt.in, p) { | |
t.Errorf("%s: ECBDecrypter\nhave %x\nwant %x", test, d, tt.in) | |
} | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment