aboutsummaryrefslogtreecommitdiffstats
path: root/tests/primitives
Commit message (Collapse)AuthorAgeFilesLines
* Camellia block cipher supportPaul Kehrer2013-10-063-1/+182
| | | | | | | | * Tests for CBC, OFB, CFB, and ECB * Tests will be automatically skipped if camellia support is not present in your OpenSSL library (e.g. OS X 10.8 with default OpenSSL) * Test for unsupported cipher in create_block_cipher_context * Docs for the cipher
* Use a None default so composition is easierAlex Gaynor2013-10-031-0/+7
|
* Explicitly pass around the API, and run all tests under all available APIsAlex Gaynor2013-10-032-22/+34
|
* Camellia test vectorsPaul Kehrer2013-09-146-0/+11687
| | | | | | * ECB tests come from the NTT Camellia pages (as linked to by the latest [CRYPTREC](http://www.cryptrec.go.jp/english/method.html)). * CFB, OFB, CBC tests from OpenSSL evptests
* CFB supportPaul Kehrer2013-09-111-0/+47
| | | | | | | | | | This requires a bit of explanation. OpenSSL has methods that implement standard CFB, 1-bit CFB (cfb1), and 8-bit CFB (cfb8). Unfortunately, while old (read: 0.9.7) versions of OpenSSL appear to test these variants, newer versions have a comment stating that cfb{1,8} are unsupported. Accordingly, I've backed out any support for the variants for now. We can add it back into the CFB class if and when we gain a backend that supports arbitrary s for 1 <= s <= block_size
* add output feedback mode support + test vectors (aes)Paul Kehrer2013-09-101-0/+47
|
* Add ECB class + docs + testsPaul Kehrer2013-09-101-0/+47
| | | | | * Slightly refactors test_nist to allow fetching of data that has no IV * Does not modify create_block_cipher_context (next commit)
* Merge pull request #55 from reaperhulk/parameterize-encrypt-changesAlex Gaynor2013-09-101-22/+30
|\ | | | | Changes to parameterize_encrypt_test to support other NIST vectors
| * changes to parameterize_encrypt_test to support other NIST vectorsPaul Kehrer2013-09-101-22/+30
| | | | | | | | | | * ECB has no IV so we need to be able to pass params rather than have them hardcoded in the method
* | Aded the 3DES vectors. Refs #51.Alex Gaynor2013-09-0988-0/+48004
|/
* Simplified the NIST tests and reduced duplicationAlex Gaynor2013-09-091-150/+31
|
* Add mandatory headers to files touched by this branchHynek Schlawack2013-08-113-0/+7
|
* Fixed wrong testAlex Gaynor2013-08-101-1/+1
|
* Ensure that AES gets a proper key sizeDonald Stufft2013-08-101-0/+4
|
* Use an enum for determining BlockCipher operationDonald Stufft2013-08-101-2/+4
|
* Be consistentAlex Gaynor2013-08-101-1/+1
|
* Remove the padding from the BlockCipher APIDonald Stufft2013-08-102-21/+21
|
* BlockCiphers should know their own nameDonald Stufft2013-08-101-0/+7
| | | | We normalize on CIPHER-KEYSIZE-MODE for the block cipher name.
* Ciphers should know what size their keys areDonald Stufft2013-08-101-0/+29
|
* Ensure that a BlockCipher can only be used for one operationDonald Stufft2013-08-101-0/+20
| | | | | | This prevents trying to call encrypt() and then decrypt() on a block cipher. It also enables finalize() to know what type of finalization to call.
* Some apache license headers (we need a pyflkaes check for thsi)Alex Gaynor2013-08-102-0/+26
|
* Removed duplicate tests, added tests + fix for use after finalizeAlex Gaynor2013-08-091-15/+9
|
* Get stuff working on py3k for realAlex Gaynor2013-08-091-4/+8
|
* Steps to get this running on py32 and py33 againAlex Gaynor2013-08-091-2/+2
|
* Properly decode plaintext before encrypting itDonald Stufft2013-08-092-16/+32
|
* Use the NIST MMT vectors to test AES-CBC w/ no paddingDonald Stufft2013-08-0919-13/+2348
|
* Reduce code duplicationAlex Gaynor2013-08-081-80/+19
|
* StyleAlex Gaynor2013-08-081-2/+1
|
* Use the NIST KAT vectors to test AES-CBC w/ no paddingDonald Stufft2013-08-0972-0/+73644
|
* Tests now running against the NIST vectorsAlex Gaynor2013-08-082-8/+5
|
* Merge branch 'master' into simple-symmetric-encryptionAlex Gaynor2013-08-081-0/+71
|\
| * Add a test utility functions to read & process NIST vector filesDonald Stufft2013-08-091-0/+71
|
* Started stubbing stuff out, including a simple test, now is the part where weAlex Gaynor2013-08-081-0/+23
write some actual cryptographic software. So yeah.