2010-09-11 13:49:30 -04:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2010 Felix Geyer <debfx@fobos.de>
|
2017-06-09 17:40:36 -04:00
|
|
|
* Copyright (C) 2017 KeePassXC Team <team@keepassxc.org>
|
2010-09-11 13:49:30 -04:00
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 2 or (at your option)
|
|
|
|
* version 3 of the License.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
2010-11-21 17:06:30 -05:00
|
|
|
#include "TestSymmetricCipher.h"
|
|
|
|
|
2013-10-03 09:18:16 -04:00
|
|
|
#include <QBuffer>
|
|
|
|
#include <QTest>
|
2010-09-11 13:49:30 -04:00
|
|
|
|
|
|
|
#include "crypto/Crypto.h"
|
|
|
|
#include "crypto/SymmetricCipher.h"
|
2010-09-13 17:25:48 -04:00
|
|
|
#include "streams/SymmetricCipherStream.h"
|
2010-09-11 13:49:30 -04:00
|
|
|
|
2014-05-16 06:32:52 -04:00
|
|
|
QTEST_GUILESS_MAIN(TestSymmetricCipher)
|
|
|
|
|
2010-09-11 13:49:30 -04:00
|
|
|
void TestSymmetricCipher::initTestCase()
|
|
|
|
{
|
2014-06-15 05:17:40 -04:00
|
|
|
QVERIFY(Crypto::init());
|
2010-09-11 13:49:30 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
void TestSymmetricCipher::testAes256CbcEncryption()
|
|
|
|
{
|
|
|
|
// http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf
|
|
|
|
|
|
|
|
QByteArray key = QByteArray::fromHex("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4");
|
|
|
|
QByteArray iv = QByteArray::fromHex("000102030405060708090a0b0c0d0e0f");
|
2010-09-13 17:25:48 -04:00
|
|
|
QByteArray plainText = QByteArray::fromHex("6bc1bee22e409f96e93d7e117393172a");
|
|
|
|
plainText.append(QByteArray::fromHex("ae2d8a571e03ac9c9eb76fac45af8e51"));
|
|
|
|
QByteArray cipherText = QByteArray::fromHex("f58c4c04d6e5f1ba779eabfb5f7bfbd6");
|
|
|
|
cipherText.append(QByteArray::fromHex("9cfc4e967edb808d679f777bc6702c7d"));
|
2015-05-09 13:47:53 -04:00
|
|
|
bool ok;
|
2010-09-11 13:49:30 -04:00
|
|
|
|
2015-05-09 13:47:53 -04:00
|
|
|
SymmetricCipher cipher(SymmetricCipher::Aes256, SymmetricCipher::Cbc, SymmetricCipher::Encrypt);
|
|
|
|
QVERIFY(cipher.init(key, iv));
|
2010-09-13 17:25:48 -04:00
|
|
|
QCOMPARE(cipher.blockSize(), 16);
|
|
|
|
|
2015-05-09 13:47:53 -04:00
|
|
|
QCOMPARE(cipher.process(plainText, &ok),
|
2010-09-19 14:13:23 -04:00
|
|
|
cipherText);
|
2015-05-09 13:47:53 -04:00
|
|
|
QVERIFY(ok);
|
2010-09-16 12:20:46 -04:00
|
|
|
|
|
|
|
QBuffer buffer;
|
2012-04-18 16:08:22 -04:00
|
|
|
SymmetricCipherStream stream(&buffer, SymmetricCipher::Aes256, SymmetricCipher::Cbc,
|
2015-05-09 13:47:53 -04:00
|
|
|
SymmetricCipher::Encrypt);
|
|
|
|
QVERIFY(stream.init(key, iv));
|
2010-09-16 12:20:46 -04:00
|
|
|
buffer.open(QIODevice::WriteOnly);
|
2015-05-09 14:11:20 -04:00
|
|
|
QVERIFY(stream.open(QIODevice::WriteOnly));
|
2010-09-18 11:13:28 -04:00
|
|
|
QVERIFY(stream.reset());
|
2012-05-08 15:33:21 -04:00
|
|
|
|
2010-09-16 12:20:46 -04:00
|
|
|
buffer.reset();
|
|
|
|
buffer.buffer().clear();
|
2015-05-09 14:11:20 -04:00
|
|
|
QCOMPARE(stream.write(plainText.left(16)), qint64(16));
|
2010-09-19 14:13:23 -04:00
|
|
|
QCOMPARE(buffer.data(), cipherText.left(16));
|
2010-09-18 11:13:28 -04:00
|
|
|
QVERIFY(stream.reset());
|
2012-05-08 15:33:21 -04:00
|
|
|
// make sure padding is written
|
|
|
|
QCOMPARE(buffer.data().size(), 32);
|
|
|
|
|
2010-09-16 12:20:46 -04:00
|
|
|
buffer.reset();
|
|
|
|
buffer.buffer().clear();
|
2015-05-09 14:11:20 -04:00
|
|
|
QCOMPARE(stream.write(plainText.left(10)), qint64(10));
|
2012-05-08 15:33:21 -04:00
|
|
|
QVERIFY(buffer.data().isEmpty());
|
2010-09-16 12:20:46 -04:00
|
|
|
|
2010-09-18 11:13:28 -04:00
|
|
|
QVERIFY(stream.reset());
|
2010-09-16 12:20:46 -04:00
|
|
|
buffer.reset();
|
|
|
|
buffer.buffer().clear();
|
2015-05-09 14:11:20 -04:00
|
|
|
QCOMPARE(stream.write(plainText.left(10)), qint64(10));
|
2010-09-16 12:20:46 -04:00
|
|
|
stream.close();
|
|
|
|
QCOMPARE(buffer.data().size(), 16);
|
2010-09-13 17:25:48 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
void TestSymmetricCipher::testAes256CbcDecryption()
|
|
|
|
{
|
|
|
|
QByteArray key = QByteArray::fromHex("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4");
|
|
|
|
QByteArray iv = QByteArray::fromHex("000102030405060708090a0b0c0d0e0f");
|
|
|
|
QByteArray cipherText = QByteArray::fromHex("f58c4c04d6e5f1ba779eabfb5f7bfbd6");
|
|
|
|
cipherText.append(QByteArray::fromHex("9cfc4e967edb808d679f777bc6702c7d"));
|
|
|
|
QByteArray plainText = QByteArray::fromHex("6bc1bee22e409f96e93d7e117393172a");
|
|
|
|
plainText.append(QByteArray::fromHex("ae2d8a571e03ac9c9eb76fac45af8e51"));
|
2015-05-09 13:47:53 -04:00
|
|
|
bool ok;
|
2010-09-13 17:25:48 -04:00
|
|
|
|
2015-05-09 13:47:53 -04:00
|
|
|
SymmetricCipher cipher(SymmetricCipher::Aes256, SymmetricCipher::Cbc, SymmetricCipher::Decrypt);
|
|
|
|
QVERIFY(cipher.init(key, iv));
|
2010-09-13 17:25:48 -04:00
|
|
|
QCOMPARE(cipher.blockSize(), 16);
|
|
|
|
|
2015-05-09 13:47:53 -04:00
|
|
|
QCOMPARE(cipher.process(cipherText, &ok),
|
2010-09-19 14:13:23 -04:00
|
|
|
plainText);
|
2015-05-09 13:47:53 -04:00
|
|
|
QVERIFY(ok);
|
2010-09-13 17:25:48 -04:00
|
|
|
|
2012-05-08 15:33:21 -04:00
|
|
|
// padded with 16 0x16 bytes
|
|
|
|
QByteArray cipherTextPadded = cipherText + QByteArray::fromHex("3a3aa5e0213db1a9901f9036cf5102d2");
|
|
|
|
QBuffer buffer(&cipherTextPadded);
|
2012-04-18 16:08:22 -04:00
|
|
|
SymmetricCipherStream stream(&buffer, SymmetricCipher::Aes256, SymmetricCipher::Cbc,
|
2015-05-09 13:47:53 -04:00
|
|
|
SymmetricCipher::Decrypt);
|
|
|
|
QVERIFY(stream.init(key, iv));
|
2010-09-13 17:25:48 -04:00
|
|
|
buffer.open(QIODevice::ReadOnly);
|
2015-05-09 14:11:20 -04:00
|
|
|
QVERIFY(stream.open(QIODevice::ReadOnly));
|
2010-09-13 17:25:48 -04:00
|
|
|
|
2010-09-19 14:13:23 -04:00
|
|
|
QCOMPARE(stream.read(10),
|
|
|
|
plainText.left(10));
|
2010-09-13 17:25:48 -04:00
|
|
|
buffer.reset();
|
2015-05-09 14:11:20 -04:00
|
|
|
QVERIFY(stream.reset());
|
2010-09-19 14:13:23 -04:00
|
|
|
QCOMPARE(stream.read(20),
|
|
|
|
plainText.left(20));
|
2010-09-13 17:25:48 -04:00
|
|
|
buffer.reset();
|
2015-05-09 14:11:20 -04:00
|
|
|
QVERIFY(stream.reset());
|
2010-09-19 14:13:23 -04:00
|
|
|
QCOMPARE(stream.read(16),
|
|
|
|
plainText.left(16));
|
2010-09-13 17:25:48 -04:00
|
|
|
buffer.reset();
|
2015-05-09 14:11:20 -04:00
|
|
|
QVERIFY(stream.reset());
|
2010-09-19 14:13:23 -04:00
|
|
|
QCOMPARE(stream.read(100),
|
|
|
|
plainText);
|
2010-09-11 13:49:30 -04:00
|
|
|
}
|
|
|
|
|
2017-10-29 11:07:01 -04:00
|
|
|
void TestSymmetricCipher::testAes256CtrEncryption()
|
|
|
|
{
|
|
|
|
// http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf
|
|
|
|
|
|
|
|
QByteArray key = QByteArray::fromHex("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4");
|
|
|
|
QByteArray ctr = QByteArray::fromHex("f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff");
|
|
|
|
QByteArray plainText = QByteArray::fromHex("6bc1bee22e409f96e93d7e117393172a");
|
|
|
|
plainText.append(QByteArray::fromHex("ae2d8a571e03ac9c9eb76fac45af8e51"));
|
|
|
|
QByteArray cipherText = QByteArray::fromHex("601ec313775789a5b7a7f504bbf3d228");
|
|
|
|
cipherText.append(QByteArray::fromHex("f443e3ca4d62b59aca84e990cacaf5c5"));
|
|
|
|
bool ok;
|
|
|
|
|
|
|
|
SymmetricCipher cipher(SymmetricCipher::Aes256, SymmetricCipher::Ctr, SymmetricCipher::Encrypt);
|
|
|
|
QVERIFY(cipher.init(key, ctr));
|
|
|
|
QCOMPARE(cipher.blockSize(), 16);
|
|
|
|
|
|
|
|
QCOMPARE(cipher.process(plainText, &ok),
|
|
|
|
cipherText);
|
|
|
|
QVERIFY(ok);
|
|
|
|
}
|
|
|
|
|
|
|
|
void TestSymmetricCipher::testAes256CtrDecryption()
|
|
|
|
{
|
|
|
|
QByteArray key = QByteArray::fromHex("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4");
|
|
|
|
QByteArray ctr = QByteArray::fromHex("f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff");
|
|
|
|
QByteArray cipherText = QByteArray::fromHex("601ec313775789a5b7a7f504bbf3d228");
|
|
|
|
cipherText.append(QByteArray::fromHex("f443e3ca4d62b59aca84e990cacaf5c5"));
|
|
|
|
QByteArray plainText = QByteArray::fromHex("6bc1bee22e409f96e93d7e117393172a");
|
|
|
|
plainText.append(QByteArray::fromHex("ae2d8a571e03ac9c9eb76fac45af8e51"));
|
|
|
|
bool ok;
|
|
|
|
|
|
|
|
SymmetricCipher cipher(SymmetricCipher::Aes256, SymmetricCipher::Ctr, SymmetricCipher::Decrypt);
|
|
|
|
QVERIFY(cipher.init(key, ctr));
|
|
|
|
QCOMPARE(cipher.blockSize(), 16);
|
|
|
|
|
|
|
|
QCOMPARE(cipher.process(cipherText, &ok),
|
|
|
|
plainText);
|
|
|
|
QVERIFY(ok);
|
|
|
|
}
|
|
|
|
|
2017-01-15 13:12:23 -05:00
|
|
|
void TestSymmetricCipher::testTwofish256CbcEncryption()
|
|
|
|
{
|
|
|
|
// NIST MCT Known-Answer Tests (cbc_e_m.txt)
|
|
|
|
// https://www.schneier.com/code/twofish-kat.zip
|
|
|
|
|
|
|
|
QVector<QByteArray> keys {
|
|
|
|
QByteArray::fromHex("0000000000000000000000000000000000000000000000000000000000000000"),
|
|
|
|
QByteArray::fromHex("D0A260EB41755B19374BABF259A79DB3EA7162E65490B03B1AE4871FB35EF23B"),
|
|
|
|
QByteArray::fromHex("8D55E4849A4DED08D89881E6708EDD26BEEE942073DFB3790B2798B240ACD74A"),
|
|
|
|
QByteArray::fromHex("606EFDC2066A837AF0430EBE4CF1F21071CCB236C33B4B9D82404FDB05C74621"),
|
|
|
|
QByteArray::fromHex("B119AA9485CEEEB4CC778AF21121E54DE4BDBA3498C61C8FD9004AA0C71909C3")
|
|
|
|
};
|
|
|
|
QVector<QByteArray> ivs {
|
|
|
|
QByteArray::fromHex("00000000000000000000000000000000"),
|
|
|
|
QByteArray::fromHex("EA7162E65490B03B1AE4871FB35EF23B"),
|
|
|
|
QByteArray::fromHex("549FF6C6274F034211C31FADF3F22571"),
|
|
|
|
QByteArray::fromHex("CF222616B0E4F8E48967D769456B916B"),
|
|
|
|
QByteArray::fromHex("957108025BFD57125B40057BC2DE4FE2")
|
|
|
|
};
|
|
|
|
QVector<QByteArray> plainTexts {
|
|
|
|
QByteArray::fromHex("00000000000000000000000000000000"),
|
|
|
|
QByteArray::fromHex("D0A260EB41755B19374BABF259A79DB3"),
|
|
|
|
QByteArray::fromHex("5DF7846FDB38B611EFD32A1429294095"),
|
|
|
|
QByteArray::fromHex("ED3B19469C276E7228DB8F583C7F2F36"),
|
|
|
|
QByteArray::fromHex("D177575683A46DCE3C34844C5DD0175D")
|
|
|
|
};
|
|
|
|
QVector<QByteArray> cipherTexts {
|
|
|
|
QByteArray::fromHex("EA7162E65490B03B1AE4871FB35EF23B"),
|
|
|
|
QByteArray::fromHex("549FF6C6274F034211C31FADF3F22571"),
|
|
|
|
QByteArray::fromHex("CF222616B0E4F8E48967D769456B916B"),
|
|
|
|
QByteArray::fromHex("957108025BFD57125B40057BC2DE4FE2"),
|
|
|
|
QByteArray::fromHex("6F725C5950133F82EF021A94CADC8508")
|
|
|
|
};
|
|
|
|
|
|
|
|
SymmetricCipher cipher(SymmetricCipher::Twofish, SymmetricCipher::Cbc, SymmetricCipher::Encrypt);
|
|
|
|
bool ok;
|
|
|
|
|
|
|
|
for (int i = 0; i < keys.size(); ++i) {
|
2017-11-27 15:41:58 -05:00
|
|
|
QVERIFY(cipher.init(keys[i], ivs[i]));
|
2017-01-15 13:12:23 -05:00
|
|
|
QByteArray ptNext = plainTexts[i];
|
|
|
|
QByteArray ctPrev = ivs[i];
|
|
|
|
QByteArray ctCur;
|
|
|
|
QCOMPARE(cipher.blockSize(), 16);
|
|
|
|
for (int j = 0; j < 5000; ++j) {
|
|
|
|
ctCur = cipher.process(ptNext, &ok);
|
|
|
|
if (!ok)
|
2017-01-15 13:36:00 -05:00
|
|
|
break;
|
2017-01-15 13:12:23 -05:00
|
|
|
ptNext = ctPrev;
|
|
|
|
ctPrev = ctCur;
|
|
|
|
|
|
|
|
ctCur = cipher.process(ptNext, &ok);
|
|
|
|
if (!ok)
|
2017-01-15 13:36:00 -05:00
|
|
|
break;
|
2017-01-15 13:12:23 -05:00
|
|
|
ptNext = ctPrev;
|
|
|
|
ctPrev = ctCur;
|
|
|
|
}
|
|
|
|
|
|
|
|
QVERIFY(ok);
|
|
|
|
QCOMPARE(ctCur, cipherTexts[i]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void TestSymmetricCipher::testTwofish256CbcDecryption()
|
|
|
|
{
|
|
|
|
// NIST MCT Known-Answer Tests (cbc_d_m.txt)
|
|
|
|
// https://www.schneier.com/code/twofish-kat.zip
|
|
|
|
|
|
|
|
QVector<QByteArray> keys {
|
|
|
|
QByteArray::fromHex("0000000000000000000000000000000000000000000000000000000000000000"),
|
|
|
|
QByteArray::fromHex("1B1FE8F5A911CD4C0D800EDCE8ED0A942CBA6271A1044F90C30BA8FE91E1C163"),
|
|
|
|
QByteArray::fromHex("EBA31FF8D2A24FDD769A937353E23257294A33394E4D17A668060AD8230811A1"),
|
|
|
|
QByteArray::fromHex("1DCF1915C389AB273F80F897BF008F058ED89F58A95C1BE523C4B11295ED2D0F"),
|
|
|
|
QByteArray::fromHex("491B9A66D3ED4EF19F02180289D5B1A1C2596AE568540A95DC5244198A9B8869")
|
|
|
|
};
|
|
|
|
QVector<QByteArray> ivs {
|
|
|
|
QByteArray::fromHex("00000000000000000000000000000000"),
|
|
|
|
QByteArray::fromHex("1B1FE8F5A911CD4C0D800EDCE8ED0A94"),
|
|
|
|
QByteArray::fromHex("F0BCF70D7BB382917B1A9DAFBB0F38C3"),
|
|
|
|
QByteArray::fromHex("F66C06ED112BE4FA491A6BE4ECE2BD52"),
|
|
|
|
QByteArray::fromHex("54D483731064E5D6A082E09536D53EA4")
|
|
|
|
};
|
|
|
|
QVector<QByteArray> plainTexts {
|
|
|
|
QByteArray::fromHex("2CBA6271A1044F90C30BA8FE91E1C163"),
|
|
|
|
QByteArray::fromHex("05F05148EF495836AB0DA226B2E9D0C2"),
|
|
|
|
QByteArray::fromHex("A792AC61E7110C434BC2BBCAB6E53CAE"),
|
|
|
|
QByteArray::fromHex("4C81F5BDC1081170FF96F50B1F76A566"),
|
|
|
|
QByteArray::fromHex("BD959F5B787037631A37051EA5F369F8")
|
|
|
|
};
|
|
|
|
QVector<QByteArray> cipherTexts {
|
|
|
|
QByteArray::fromHex("00000000000000000000000000000000"),
|
|
|
|
QByteArray::fromHex("2CBA6271A1044F90C30BA8FE91E1C163"),
|
|
|
|
QByteArray::fromHex("05F05148EF495836AB0DA226B2E9D0C2"),
|
|
|
|
QByteArray::fromHex("A792AC61E7110C434BC2BBCAB6E53CAE"),
|
|
|
|
QByteArray::fromHex("4C81F5BDC1081170FF96F50B1F76A566")
|
|
|
|
};
|
|
|
|
|
|
|
|
SymmetricCipher cipher(SymmetricCipher::Twofish, SymmetricCipher::Cbc, SymmetricCipher::Decrypt);
|
|
|
|
bool ok;
|
|
|
|
|
|
|
|
for (int i = 0; i < keys.size(); ++i) {
|
|
|
|
cipher.init(keys[i], ivs[i]);
|
|
|
|
QByteArray ctNext = cipherTexts[i];
|
|
|
|
QByteArray ptCur;
|
|
|
|
QCOMPARE(cipher.blockSize(), 16);
|
|
|
|
for (int j = 0; j < 5000; ++j) {
|
|
|
|
ptCur = cipher.process(ctNext, &ok);
|
|
|
|
if (!ok)
|
2017-01-15 13:36:00 -05:00
|
|
|
break;
|
2017-01-15 13:12:23 -05:00
|
|
|
ctNext = ptCur;
|
|
|
|
|
|
|
|
ptCur = cipher.process(ctNext, &ok);
|
|
|
|
if (!ok)
|
2017-01-15 13:36:00 -05:00
|
|
|
break;
|
2017-01-15 13:12:23 -05:00
|
|
|
ctNext = ptCur;
|
|
|
|
}
|
|
|
|
|
|
|
|
QVERIFY(ok);
|
|
|
|
QCOMPARE(ptCur, plainTexts[i]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-11-21 10:19:27 -05:00
|
|
|
void TestSymmetricCipher::testSalsa20()
|
|
|
|
{
|
|
|
|
// http://www.ecrypt.eu.org/stream/svn/viewcvs.cgi/ecrypt/trunk/submissions/salsa20/full/verified.test-vectors?logsort=rev&rev=210&view=markup
|
|
|
|
|
|
|
|
QByteArray key = QByteArray::fromHex("F3F4F5F6F7F8F9FAFBFCFDFEFF000102030405060708090A0B0C0D0E0F101112");
|
|
|
|
QByteArray iv = QByteArray::fromHex("0000000000000000");
|
2015-05-09 13:47:53 -04:00
|
|
|
bool ok;
|
2010-11-21 10:19:27 -05:00
|
|
|
|
2015-05-09 13:47:53 -04:00
|
|
|
SymmetricCipher cipher(SymmetricCipher::Salsa20, SymmetricCipher::Stream, SymmetricCipher::Encrypt);
|
|
|
|
QVERIFY(cipher.init(key, iv));
|
2010-11-21 10:19:27 -05:00
|
|
|
|
|
|
|
QByteArray cipherTextA;
|
2012-04-18 16:08:22 -04:00
|
|
|
for (int i = 0; i < 8; i++) {
|
2015-05-09 13:47:53 -04:00
|
|
|
cipherTextA.append(cipher.process(QByteArray(64, '\0'), &ok));
|
|
|
|
QVERIFY(ok);
|
2010-11-21 10:19:27 -05:00
|
|
|
}
|
|
|
|
cipher.reset();
|
|
|
|
|
2015-05-09 13:47:53 -04:00
|
|
|
QByteArray cipherTextB = cipher.process(QByteArray(512, '\0'), &ok);
|
|
|
|
QVERIFY(ok);
|
2010-11-21 10:19:27 -05:00
|
|
|
cipher.reset();
|
|
|
|
|
|
|
|
QByteArray expectedCipherText1;
|
|
|
|
expectedCipherText1.append(QByteArray::fromHex("B4C0AFA503BE7FC29A62058166D56F8F"));
|
|
|
|
expectedCipherText1.append(QByteArray::fromHex("5D27DC246F75B9AD8760C8C39DFD8749"));
|
|
|
|
expectedCipherText1.append(QByteArray::fromHex("2D3B76D5D9637F009EADA14458A52DFB"));
|
|
|
|
expectedCipherText1.append(QByteArray::fromHex("09815337E72672681DDDC24633750D83"));
|
|
|
|
|
|
|
|
QByteArray expectedCipherText2;
|
|
|
|
expectedCipherText2.append(QByteArray::fromHex("DBBA0683DF48C335A9802EEF02522563"));
|
|
|
|
expectedCipherText2.append(QByteArray::fromHex("54C9F763C3FDE19131A6BB7B85040624"));
|
|
|
|
expectedCipherText2.append(QByteArray::fromHex("B1D6CD4BF66D16F7482236C8602A6D58"));
|
|
|
|
expectedCipherText2.append(QByteArray::fromHex("505EEDCCA0B77AED574AB583115124B9"));
|
|
|
|
|
|
|
|
QByteArray expectedCipherText3;
|
|
|
|
expectedCipherText3.append(QByteArray::fromHex("F0C5F98BAE05E019764EF6B65E0694A9"));
|
|
|
|
expectedCipherText3.append(QByteArray::fromHex("04CB9EC9C10C297B1AB1A6052365BB78"));
|
|
|
|
expectedCipherText3.append(QByteArray::fromHex("E55D3C6CB9F06184BA7D425A92E7E987"));
|
|
|
|
expectedCipherText3.append(QByteArray::fromHex("757FC5D9AFD7082418DD64125CA6F2B6"));
|
|
|
|
|
|
|
|
QByteArray expectedCipherText4;
|
|
|
|
expectedCipherText4.append(QByteArray::fromHex("5A5FB5C8F0AFEA471F0318A4A2792F7A"));
|
|
|
|
expectedCipherText4.append(QByteArray::fromHex("A5C67B6D6E0F0DDB79961C34E3A564BA"));
|
|
|
|
expectedCipherText4.append(QByteArray::fromHex("2EECE78D9AFF45E510FEAB1030B102D3"));
|
|
|
|
expectedCipherText4.append(QByteArray::fromHex("9DFCECB77F5798F7D2793C0AB09C7A04"));
|
|
|
|
|
|
|
|
QCOMPARE(cipherTextA.mid(0, 64), expectedCipherText1);
|
|
|
|
QCOMPARE(cipherTextA.mid(192, 64), expectedCipherText2);
|
|
|
|
QCOMPARE(cipherTextA.mid(256, 64), expectedCipherText3);
|
|
|
|
QCOMPARE(cipherTextA.mid(448, 64), expectedCipherText4);
|
|
|
|
|
|
|
|
QCOMPARE(cipherTextB.mid(0, 64), expectedCipherText1);
|
|
|
|
QCOMPARE(cipherTextB.mid(192, 64), expectedCipherText2);
|
|
|
|
QCOMPARE(cipherTextB.mid(256, 64), expectedCipherText3);
|
|
|
|
QCOMPARE(cipherTextB.mid(448, 64), expectedCipherText4);
|
|
|
|
}
|
|
|
|
|
2012-05-08 15:33:21 -04:00
|
|
|
void TestSymmetricCipher::testPadding()
|
|
|
|
{
|
|
|
|
QByteArray key = QByteArray::fromHex("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4");
|
|
|
|
QByteArray iv = QByteArray::fromHex("000102030405060708090a0b0c0d0e0f");
|
|
|
|
QByteArray plainText = QByteArray::fromHex("6bc1bee22e409f96e93d");
|
|
|
|
|
|
|
|
QBuffer buffer;
|
|
|
|
buffer.open(QIODevice::ReadWrite);
|
|
|
|
|
|
|
|
SymmetricCipherStream streamEnc(&buffer, SymmetricCipher::Aes256, SymmetricCipher::Cbc,
|
2015-05-09 13:47:53 -04:00
|
|
|
SymmetricCipher::Encrypt);
|
|
|
|
QVERIFY(streamEnc.init(key, iv));
|
2012-05-08 15:33:21 -04:00
|
|
|
streamEnc.open(QIODevice::WriteOnly);
|
|
|
|
streamEnc.write(plainText);
|
|
|
|
streamEnc.close();
|
|
|
|
buffer.reset();
|
|
|
|
// make sure padding is written
|
|
|
|
QCOMPARE(buffer.buffer().size(), 16);
|
|
|
|
|
|
|
|
SymmetricCipherStream streamDec(&buffer, SymmetricCipher::Aes256, SymmetricCipher::Cbc,
|
2015-05-09 13:47:53 -04:00
|
|
|
SymmetricCipher::Decrypt);
|
|
|
|
QVERIFY(streamDec.init(key, iv));
|
2012-05-08 15:33:21 -04:00
|
|
|
streamDec.open(QIODevice::ReadOnly);
|
|
|
|
QByteArray decrypted = streamDec.readAll();
|
|
|
|
QCOMPARE(decrypted, plainText);
|
|
|
|
}
|
2015-07-20 15:50:39 -04:00
|
|
|
|
|
|
|
void TestSymmetricCipher::testStreamReset()
|
|
|
|
{
|
|
|
|
QByteArray key = QByteArray::fromHex("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4");
|
|
|
|
QByteArray iv = QByteArray::fromHex("000102030405060708090a0b0c0d0e0f");
|
|
|
|
|
|
|
|
QBuffer buffer;
|
|
|
|
QVERIFY(buffer.open(QIODevice::WriteOnly));
|
|
|
|
SymmetricCipherStream writer(&buffer, SymmetricCipher::Aes256, SymmetricCipher::Cbc,
|
|
|
|
SymmetricCipher::Encrypt);
|
|
|
|
QVERIFY(writer.init(key, iv));
|
|
|
|
QVERIFY(writer.open(QIODevice::WriteOnly));
|
|
|
|
QCOMPARE(writer.write(QByteArray(4, 'Z')), qint64(4));
|
|
|
|
// test if reset() and close() write only one block
|
|
|
|
QVERIFY(writer.reset());
|
|
|
|
QVERIFY(writer.reset());
|
|
|
|
writer.close();
|
|
|
|
QCOMPARE(buffer.buffer().size(), 16);
|
|
|
|
}
|