| // Copyright 2009 The Go Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style |
| // license that can be found in the LICENSE file. |
| |
| package aes |
| |
| import ( |
| "crypto/internal/boring" |
| "crypto/internal/cryptotest" |
| "fmt" |
| "testing" |
| ) |
| |
| // Test vectors are from FIPS 197: |
| // https://csrc.nist.gov/publications/fips/fips197/fips-197.pdf |
| |
| // Appendix B, C of FIPS 197: Cipher examples, Example vectors. |
| type CryptTest struct { |
| key []byte |
| in []byte |
| out []byte |
| } |
| |
| var encryptTests = []CryptTest{ |
| { |
| // Appendix B. |
| []byte{0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c}, |
| []byte{0x32, 0x43, 0xf6, 0xa8, 0x88, 0x5a, 0x30, 0x8d, 0x31, 0x31, 0x98, 0xa2, 0xe0, 0x37, 0x07, 0x34}, |
| []byte{0x39, 0x25, 0x84, 0x1d, 0x02, 0xdc, 0x09, 0xfb, 0xdc, 0x11, 0x85, 0x97, 0x19, 0x6a, 0x0b, 0x32}, |
| }, |
| { |
| // Appendix C.1. AES-128 |
| []byte{0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f}, |
| []byte{0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff}, |
| []byte{0x69, 0xc4, 0xe0, 0xd8, 0x6a, 0x7b, 0x04, 0x30, 0xd8, 0xcd, 0xb7, 0x80, 0x70, 0xb4, 0xc5, 0x5a}, |
| }, |
| { |
| // Appendix C.2. AES-192 |
| []byte{0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, |
| 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, |
| }, |
| []byte{0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff}, |
| []byte{0xdd, 0xa9, 0x7c, 0xa4, 0x86, 0x4c, 0xdf, 0xe0, 0x6e, 0xaf, 0x70, 0xa0, 0xec, 0x0d, 0x71, 0x91}, |
| }, |
| { |
| // Appendix C.3. AES-256 |
| []byte{0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, |
| 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, |
| }, |
| []byte{0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff}, |
| []byte{0x8e, 0xa2, 0xb7, 0xca, 0x51, 0x67, 0x45, 0xbf, 0xea, 0xfc, 0x49, 0x90, 0x4b, 0x49, 0x60, 0x89}, |
| }, |
| } |
| |
| // Test Cipher Encrypt method against FIPS 197 examples. |
| func TestCipherEncrypt(t *testing.T) { |
| cryptotest.TestAllImplementations(t, "aes", testCipherEncrypt) |
| } |
| |
| func testCipherEncrypt(t *testing.T) { |
| for i, tt := range encryptTests { |
| c, err := NewCipher(tt.key) |
| if err != nil { |
| t.Errorf("NewCipher(%d bytes) = %s", len(tt.key), err) |
| continue |
| } |
| out := make([]byte, len(tt.in)) |
| c.Encrypt(out, tt.in) |
| for j, v := range out { |
| if v != tt.out[j] { |
| t.Errorf("Cipher.Encrypt %d: out[%d] = %#x, want %#x", i, j, v, tt.out[j]) |
| break |
| } |
| } |
| } |
| } |
| |
| // Test Cipher Decrypt against FIPS 197 examples. |
| func TestCipherDecrypt(t *testing.T) { |
| cryptotest.TestAllImplementations(t, "aes", testCipherDecrypt) |
| } |
| |
| func testCipherDecrypt(t *testing.T) { |
| for i, tt := range encryptTests { |
| c, err := NewCipher(tt.key) |
| if err != nil { |
| t.Errorf("NewCipher(%d bytes) = %s", len(tt.key), err) |
| continue |
| } |
| plain := make([]byte, len(tt.in)) |
| c.Decrypt(plain, tt.out) |
| for j, v := range plain { |
| if v != tt.in[j] { |
| t.Errorf("decryptBlock %d: plain[%d] = %#x, want %#x", i, j, v, tt.in[j]) |
| break |
| } |
| } |
| } |
| } |
| |
| // Test AES against the general cipher.Block interface tester |
| func TestAESBlock(t *testing.T) { |
| cryptotest.TestAllImplementations(t, "aes", testAESBlock) |
| } |
| |
| func testAESBlock(t *testing.T) { |
| for _, keylen := range []int{128, 192, 256} { |
| t.Run(fmt.Sprintf("AES-%d", keylen), func(t *testing.T) { |
| cryptotest.TestBlock(t, keylen/8, NewCipher) |
| }) |
| } |
| } |
| |
| func TestExtraMethods(t *testing.T) { |
| if boring.Enabled { |
| t.Skip("Go+BoringCrypto still uses the interface upgrades in crypto/cipher") |
| } |
| cryptotest.TestAllImplementations(t, "aes", func(t *testing.T) { |
| b, _ := NewCipher(make([]byte, 16)) |
| cryptotest.NoExtraMethods(t, &b) |
| }) |
| } |
| |
| func BenchmarkEncrypt(b *testing.B) { |
| b.Run("AES-128", func(b *testing.B) { benchmarkEncrypt(b, encryptTests[1]) }) |
| b.Run("AES-192", func(b *testing.B) { benchmarkEncrypt(b, encryptTests[2]) }) |
| b.Run("AES-256", func(b *testing.B) { benchmarkEncrypt(b, encryptTests[3]) }) |
| } |
| |
| func benchmarkEncrypt(b *testing.B, tt CryptTest) { |
| c, err := NewCipher(tt.key) |
| if err != nil { |
| b.Fatal("NewCipher:", err) |
| } |
| out := make([]byte, len(tt.in)) |
| b.SetBytes(int64(len(out))) |
| b.ResetTimer() |
| for i := 0; i < b.N; i++ { |
| c.Encrypt(out, tt.in) |
| } |
| } |
| |
| func BenchmarkDecrypt(b *testing.B) { |
| b.Run("AES-128", func(b *testing.B) { benchmarkDecrypt(b, encryptTests[1]) }) |
| b.Run("AES-192", func(b *testing.B) { benchmarkDecrypt(b, encryptTests[2]) }) |
| b.Run("AES-256", func(b *testing.B) { benchmarkDecrypt(b, encryptTests[3]) }) |
| } |
| |
| func benchmarkDecrypt(b *testing.B, tt CryptTest) { |
| c, err := NewCipher(tt.key) |
| if err != nil { |
| b.Fatal("NewCipher:", err) |
| } |
| out := make([]byte, len(tt.out)) |
| b.SetBytes(int64(len(out))) |
| b.ResetTimer() |
| for i := 0; i < b.N; i++ { |
| c.Decrypt(out, tt.out) |
| } |
| } |
| |
| func BenchmarkCreateCipher(b *testing.B) { |
| b.Run("AES-128", func(b *testing.B) { benchmarkCreateCipher(b, encryptTests[1]) }) |
| b.Run("AES-192", func(b *testing.B) { benchmarkCreateCipher(b, encryptTests[2]) }) |
| b.Run("AES-256", func(b *testing.B) { benchmarkCreateCipher(b, encryptTests[3]) }) |
| } |
| |
| func benchmarkCreateCipher(b *testing.B, tt CryptTest) { |
| b.ReportAllocs() |
| for i := 0; i < b.N; i++ { |
| if _, err := NewCipher(tt.key); err != nil { |
| b.Fatal(err) |
| } |
| } |
| } |