aboutsummaryrefslogtreecommitdiffstats
path: root/tests
Commit message (Collapse)AuthorAgeFilesLines
...
| * | Camellia block cipher supportPaul Kehrer2013-10-064-1/+200
| | | | | | | | | | | | | | | | | | | | | | | | * Tests for CBC, OFB, CFB, and ECB * Tests will be automatically skipped if camellia support is not present in your OpenSSL library (e.g. OS X 10.8 with default OpenSSL) * Test for unsupported cipher in create_block_cipher_context * Docs for the cipher
| * | Use a None default so composition is easierAlex Gaynor2013-10-031-0/+7
| | |
| * | Explicitly pass around the API, and run all tests under all available APIsAlex Gaynor2013-10-033-22/+39
| |/
| * simplify cryptrec loader, improve commentsPaul Kehrer2013-09-271-27/+17
| |
| * remove distinction between encrypt/decrypt in the openssl loaderPaul Kehrer2013-09-242-124/+13
| | | | | | | | | | | | | | * This was done because all the OpenSSL test vectors we're currently using are identical between encrypt/decrypt. * Removed a bunch of unneeded unit tests that checked the encrypt/decrypt vectors
| * simplify and annotate loaders based on review feedbackPaul Kehrer2013-09-231-14/+17
| |
| * crazy pep8 contortionsPaul Kehrer2013-09-151-25/+42
| |
| * sort the cryptrec loader dict's items to test reliablyPaul Kehrer2013-09-151-1/+1
| |
| * add cryptrec and openssl test vector loaders + testsPaul Kehrer2013-09-152-2/+304
| |
| * Camellia test vectorsPaul Kehrer2013-09-146-0/+11687
| | | | | | | | | | | | * ECB tests come from the NTT Camellia pages (as linked to by the latest [CRYPTREC](http://www.cryptrec.go.jp/english/method.html)). * CFB, OFB, CBC tests from OpenSSL evptests
| * CFB supportPaul Kehrer2013-09-111-0/+47
| | | | | | | | | | | | | | | | | | | | This requires a bit of explanation. OpenSSL has methods that implement standard CFB, 1-bit CFB (cfb1), and 8-bit CFB (cfb8). Unfortunately, while old (read: 0.9.7) versions of OpenSSL appear to test these variants, newer versions have a comment stating that cfb{1,8} are unsupported. Accordingly, I've backed out any support for the variants for now. We can add it back into the CFB class if and when we gain a backend that supports arbitrary s for 1 <= s <= block_size
| * add output feedback mode support + test vectors (aes)Paul Kehrer2013-09-101-0/+47
| |
| * modify modes to use abc so api can determine what attribute to callPaul Kehrer2013-09-101-4/+1
| | | | | | | | | | | | | | * Due to a circular dependency issue I had to put the abcs in cryptography.primitives.abc.block.modes * The ABCs look like they do because that is the form that is compatible with 2.x and 3.x
| * rename get_null_for_ecb to get_iv_for_ecb per alex's commentsPaul Kehrer2013-09-101-2/+2
| |
| * add get_iv_or_nonce() methods to replace _get_iv() on apiPaul Kehrer2013-09-101-5/+2
| |
| * add ECB support to create_block_cipher_contextPaul Kehrer2013-09-101-0/+6
| | | | | | | | | | * This is a basic refactor to support ECB and CBC mode in this method. We can use this as a starting point to discuss a better solution.
| * Add ECB class + docs + testsPaul Kehrer2013-09-101-0/+47
| | | | | | | | | | * Slightly refactors test_nist to allow fetching of data that has no IV * Does not modify create_block_cipher_context (next commit)
* | consistencyAlex Gaynor2013-09-101-5/+5
| |
* | Merge branch 'master' into triple-desAlex Gaynor2013-09-101-2/+2
|\| | | | | | | | | Conflicts: tests/primitives/test_nist.py
| * Merge pull request #55 from reaperhulk/parameterize-encrypt-changesAlex Gaynor2013-09-101-22/+30
| |\ | | | | | | Changes to parameterize_encrypt_test to support other NIST vectors
| | * changes to parameterize_encrypt_test to support other NIST vectorsPaul Kehrer2013-09-101-22/+30
| | | | | | | | | | | | | | | * ECB has no IV so we need to be able to pass params rather than have them hardcoded in the method
| * | Aded the 3DES vectors. Refs #51.Alex Gaynor2013-09-0988-0/+48004
| |/
* | Get tests running (fail miserably)Alex Gaynor2013-09-101-48/+109
| |
* | Write out the initial test cases, they don't even fail properly because the ↵Alex Gaynor2013-09-091-0/+40
| | | | | | | | 3DES cases look different from the AES ones
* | Iinital work on 3DES. No tests and no implementation yet.Alex Gaynor2013-09-0988-0/+48004
|/
* Simplified the NIST tests and reduced duplicationAlex Gaynor2013-09-091-150/+31
|
* Update docstring to pass alex8 lintingPaul Kehrer2013-09-091-1/+2
|
* openssl_version_text now calls startswith rather than findPaul Kehrer2013-09-091-1/+1
|
* ascii decode on openssl_version_text + doc string improvementsPaul Kehrer2013-09-091-0/+7
|
* Add method to bindings to get OPENSSL_VERSION_TEXTPaul Kehrer2013-09-091-0/+3
| | | | | | | * This allows you to check that you're binding against the expected version of OpenSSL * Test is pretty basic (just checks to see that the string starts with OpenSSL)
* Add mandatory headers to files touched by this branchHynek Schlawack2013-08-113-0/+7
|
* Fixed wrong testAlex Gaynor2013-08-101-1/+1
|
* Ensure that AES gets a proper key sizeDonald Stufft2013-08-101-0/+4
|
* Use an enum for determining BlockCipher operationDonald Stufft2013-08-101-2/+4
|
* Be consistentAlex Gaynor2013-08-101-1/+1
|
* Remove the padding from the BlockCipher APIDonald Stufft2013-08-102-21/+21
|
* BlockCiphers should know their own nameDonald Stufft2013-08-101-0/+7
| | | | We normalize on CIPHER-KEYSIZE-MODE for the block cipher name.
* Ciphers should know what size their keys areDonald Stufft2013-08-101-0/+29
|
* Ensure that a BlockCipher can only be used for one operationDonald Stufft2013-08-101-0/+20
| | | | | | This prevents trying to call encrypt() and then decrypt() on a block cipher. It also enables finalize() to know what type of finalization to call.
* Some apache license headers (we need a pyflkaes check for thsi)Alex Gaynor2013-08-104-0/+52
|
* Removed duplicate tests, added tests + fix for use after finalizeAlex Gaynor2013-08-091-15/+9
|
* Use a test file with shorter keys so that all lines match our coding standardAlex Gaynor2013-08-091-32/+56
|
* Get stuff working on py3k for realAlex Gaynor2013-08-093-61/+65
|
* Steps to get this running on py32 and py33 againAlex Gaynor2013-08-091-2/+2
|
* Properly decode plaintext before encrypting itDonald Stufft2013-08-092-16/+32
|
* Use the NIST MMT vectors to test AES-CBC w/ no paddingDonald Stufft2013-08-0919-13/+2348
|
* Reduce code duplicationAlex Gaynor2013-08-081-80/+19
|
* StyleAlex Gaynor2013-08-081-2/+1
|
* Use the NIST KAT vectors to test AES-CBC w/ no paddingDonald Stufft2013-08-0972-0/+73644
|
* Tests now running against the NIST vectorsAlex Gaynor2013-08-082-8/+5
|