diff options
author | lloyd <[email protected]> | 2014-01-07 11:03:55 +0000 |
---|---|---|
committer | lloyd <[email protected]> | 2014-01-07 11:03:55 +0000 |
commit | c109c7f84fcef6ba895c6293508b2deae0e803c1 (patch) | |
tree | 35ba7b55914023a77ecfbcf5dee2befcc4e275d1 /src/tests/test_ocb.cpp | |
parent | a7e3abf95fd1bc3df45be6fc9cb82e28e0a727ea (diff) |
Rename test sources
Diffstat (limited to 'src/tests/test_ocb.cpp')
-rw-r--r-- | src/tests/test_ocb.cpp | 142 |
1 files changed, 0 insertions, 142 deletions
diff --git a/src/tests/test_ocb.cpp b/src/tests/test_ocb.cpp deleted file mode 100644 index b2bd296e0..000000000 --- a/src/tests/test_ocb.cpp +++ /dev/null @@ -1,142 +0,0 @@ - -#include "tests.h" - -#include <botan/ocb.h> -#include <botan/hex.h> -#include <botan/sha2_32.h> -#include <botan/aes.h> -#include <iostream> -//#include <botan/selftest.h> - -using namespace Botan; - -// something like this should be in the library -namespace { - -std::vector<byte> ocb_decrypt(const SymmetricKey& key, - const std::vector<byte>& nonce, - const byte ct[], size_t ct_len, - const byte ad[], size_t ad_len) - { - OCB_Decryption ocb(new AES_128); - - ocb.set_key(key); - ocb.set_associated_data(ad, ad_len); - - ocb.start(&nonce[0], nonce.size()); - - secure_vector<byte> buf(ct, ct+ct_len); - ocb.finish(buf, 0); - - return unlock(buf); - } - -std::vector<byte> ocb_encrypt(const SymmetricKey& key, - const std::vector<byte>& nonce, - const byte pt[], size_t pt_len, - const byte ad[], size_t ad_len) - { - OCB_Encryption ocb(new AES_128); - - ocb.set_key(key); - ocb.set_associated_data(ad, ad_len); - - ocb.start(&nonce[0], nonce.size()); - - secure_vector<byte> buf(pt, pt+pt_len); - ocb.finish(buf, 0); - - try - { - std::vector<byte> pt2 = ocb_decrypt(key, nonce, &buf[0], buf.size(), ad, ad_len); - if(pt_len != pt2.size() || !same_mem(pt, &pt2[0], pt_len)) - std::cout << "OCB failed to decrypt correctly\n"; - } - catch(std::exception& e) - { - std::cout << "OCB round trip error - " << e.what() << "\n"; - } - - return unlock(buf); - } - -template<typename Alloc, typename Alloc2> -std::vector<byte> ocb_encrypt(const SymmetricKey& key, - const std::vector<byte>& nonce, - const std::vector<byte, Alloc>& pt, - const std::vector<byte, Alloc2>& ad) - { - return ocb_encrypt(key, nonce, &pt[0], pt.size(), &ad[0], ad.size()); - } - -template<typename Alloc, typename Alloc2> -std::vector<byte> ocb_decrypt(const SymmetricKey& key, - const std::vector<byte>& nonce, - const std::vector<byte, Alloc>& pt, - const std::vector<byte, Alloc2>& ad) - { - return ocb_decrypt(key, nonce, &pt[0], pt.size(), &ad[0], ad.size()); - } - -std::vector<byte> ocb_encrypt(OCB_Encryption& ocb, - const std::vector<byte>& nonce, - const std::vector<byte>& pt, - const std::vector<byte>& ad) - { - ocb.set_associated_data(&ad[0], ad.size()); - - ocb.start(&nonce[0], nonce.size()); - - secure_vector<byte> buf(pt.begin(), pt.end()); - ocb.finish(buf, 0); - - return unlock(buf); - } - -size_t test_ocb_long(size_t taglen, const std::string &expected) - { - OCB_Encryption ocb(new AES_128, taglen/8); - - ocb.set_key(SymmetricKey("00000000000000000000000000000000")); - - const std::vector<byte> empty; - std::vector<byte> N(12); - std::vector<byte> C; - - for(size_t i = 0; i != 128; ++i) - { - const std::vector<byte> S(i); - N[11] = i; - - C += ocb_encrypt(ocb, N, S, S); - C += ocb_encrypt(ocb, N, S, empty); - C += ocb_encrypt(ocb, N, empty, S); - } - - N[11] = 0; - const std::vector<byte> cipher = ocb_encrypt(ocb, N, empty, C); - - const std::string cipher_hex = hex_encode(cipher); - - if(cipher_hex != expected) - { - std::cout << "OCB AES-128 long test mistmatch " << cipher_hex << " != " << expected << "\n"; - return 1; - } - - return 0; - } - -} - -size_t test_ocb() - { - size_t fails = 0; - fails += test_ocb_long(128, "B2B41CBF9B05037DA7F16C24A35C1C94"); - fails += test_ocb_long(96, "1A4F0654277709A5BDA0D380"); - fails += test_ocb_long(64, "B7ECE9D381FE437F"); - test_report("OCB long", 3, fails); - return fails; - } - - |