mirror of
https://github.com/phpseclib/phpseclib.git
synced 2024-12-27 19:54:57 +00:00
74 lines
3.2 KiB
PHP
74 lines
3.2 KiB
PHP
<?php
|
|
/**
|
|
* @author Andreas Fischer <bantu@phpbb.com>
|
|
* @copyright MMXIII Andreas Fischer
|
|
* @license http://www.opensource.org/licenses/mit-license.html MIT License
|
|
*/
|
|
|
|
require_once 'Crypt/Twofish.php';
|
|
|
|
class Unit_Crypt_TwofishTest extends PhpseclibTestCase
|
|
{
|
|
public function testVectors()
|
|
{
|
|
$engines = array(
|
|
CRYPT_ENGINE_INTERNAL => 'internal',
|
|
CRYPT_ENGINE_MCRYPT => 'mcrypt',
|
|
CRYPT_ENGINE_OPENSSL => 'OpenSSL',
|
|
);
|
|
|
|
foreach ($engines as $engine => $name) {
|
|
$tf = new Crypt_Twofish();
|
|
$tf->disablePadding();
|
|
|
|
// tests from https://www.schneier.com/code/ecb_ival.txt
|
|
|
|
// key size = 128
|
|
$key = pack('H*', '00000000000000000000000000000000');
|
|
$tf->setKey($key);
|
|
if (!$tf->isValidEngine($engine)) {
|
|
self::markTestSkipped('Unable to initialize ' . $name . ' engine');
|
|
}
|
|
|
|
$plaintext = pack('H*', '00000000000000000000000000000000');
|
|
$ciphertext = $tf->encrypt($plaintext);
|
|
$expected = strtolower('9F589F5CF6122C32B6BFEC2F2AE8C35A');
|
|
$this->assertEquals(bin2hex($ciphertext), $expected, "Failed asserting that $plaintext yielded expected output in $name engine");
|
|
|
|
$expected = bin2hex($plaintext);
|
|
$plaintext = bin2hex($tf->decrypt($ciphertext));
|
|
$this->assertEquals($plaintext, $expected, "Failed asserting that $plaintext yielded expected output in $name engine");
|
|
|
|
// key size = 192
|
|
$key = pack('H*', '0123456789ABCDEFFEDCBA98765432100011223344556677');
|
|
$tf->setKey($key);
|
|
if (!$tf->isValidEngine($engine)) {
|
|
self::markTestSkipped('Unable to initialize ' . $name . ' engine');
|
|
}
|
|
$plaintext = pack('H*', '00000000000000000000000000000000');
|
|
$ciphertext = $tf->encrypt($plaintext);
|
|
$expected = strtolower('CFD1D2E5A9BE9CDF501F13B892BD2248');
|
|
$this->assertEquals(bin2hex($ciphertext), $expected, "Failed asserting that $plaintext yielded expected output in $name engine");
|
|
|
|
$expected = bin2hex($plaintext);
|
|
$plaintext = bin2hex($tf->decrypt($ciphertext));
|
|
$this->assertEquals($plaintext, $expected, "Failed asserting that $plaintext yielded expected output in $name engine");
|
|
|
|
// key size = 256
|
|
$key = pack('H*', '0123456789ABCDEFFEDCBA987654321000112233445566778899AABBCCDDEEFF');
|
|
$tf->setKey($key);
|
|
if (!$tf->isValidEngine($engine)) {
|
|
self::markTestSkipped('Unable to initialize ' . $name . ' engine');
|
|
}
|
|
$plaintext = pack('H*', '00000000000000000000000000000000');
|
|
$ciphertext = $tf->encrypt($plaintext);
|
|
$expected = strtolower('37527BE0052334B89F0CFCCAE87CFA20');
|
|
$this->assertEquals(bin2hex($ciphertext), $expected, "Failed asserting that $plaintext yielded expected output in $name engine");
|
|
|
|
$expected = bin2hex($plaintext);
|
|
$plaintext = bin2hex($tf->decrypt($ciphertext));
|
|
$this->assertEquals($plaintext, $expected, "Failed asserting that $plaintext yielded expected output in $name engine");
|
|
}
|
|
}
|
|
}
|