aboutsummaryrefslogtreecommitdiffstats
path: root/signaling-server/node_modules/socket.io/node_modules/socket.io-client/lib/vendor/web-socket-js/flash-src/com/hurlant/crypto/tests/CBCModeTest.as
diff options
context:
space:
mode:
Diffstat (limited to 'signaling-server/node_modules/socket.io/node_modules/socket.io-client/lib/vendor/web-socket-js/flash-src/com/hurlant/crypto/tests/CBCModeTest.as')
-rwxr-xr-xsignaling-server/node_modules/socket.io/node_modules/socket.io-client/lib/vendor/web-socket-js/flash-src/com/hurlant/crypto/tests/CBCModeTest.as160
1 files changed, 160 insertions, 0 deletions
diff --git a/signaling-server/node_modules/socket.io/node_modules/socket.io-client/lib/vendor/web-socket-js/flash-src/com/hurlant/crypto/tests/CBCModeTest.as b/signaling-server/node_modules/socket.io/node_modules/socket.io-client/lib/vendor/web-socket-js/flash-src/com/hurlant/crypto/tests/CBCModeTest.as
new file mode 100755
index 0000000..153aa00
--- /dev/null
+++ b/signaling-server/node_modules/socket.io/node_modules/socket.io-client/lib/vendor/web-socket-js/flash-src/com/hurlant/crypto/tests/CBCModeTest.as
@@ -0,0 +1,160 @@
+/**
+ * CBCModeTest
+ *
+ * A test class for CBCMode
+ * Copyright (c) 2007 Henri Torgemane
+ *
+ * See LICENSE.txt for full license information.
+ */
+package com.hurlant.crypto.tests
+{
+ import com.hurlant.crypto.symmetric.AESKey;
+ import com.hurlant.crypto.symmetric.CBCMode;
+ import com.hurlant.crypto.symmetric.NullPad;
+ import com.hurlant.crypto.symmetric.XTeaKey;
+ import com.hurlant.util.Hex;
+
+ import flash.utils.ByteArray;
+
+ public class CBCModeTest extends TestCase
+ {
+ public function CBCModeTest(h:ITestHarness) {
+ super(h, "CBCMode Test");
+ runTest(testAES,"CBC AES Test Vectors");
+ runTest(testXTea,"CBC XTea Test Vectors");
+ //
+ runTest(testCBC_AES128, "CBC AES-128 Test Vectors");
+ runTest(testCBC_AES192, "CBC AES-192 Test Vectors");
+ runTest(testCBC_AES256, "CBC AES-256 Test Vectors");
+ h.endTestCase();
+ }
+
+ /**
+ * Hawt NIST Vectors: http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf
+ * Section F.2.1 and below.
+ */
+ public function testCBC_AES128():void {
+ var key:ByteArray = Hex.toArray("2b7e151628aed2a6abf7158809cf4f3c");
+ var pt:ByteArray = Hex.toArray(
+ "6bc1bee22e409f96e93d7e117393172a" +
+ "ae2d8a571e03ac9c9eb76fac45af8e51" +
+ "30c81c46a35ce411e5fbc1191a0a52ef" +
+ "f69f2445df4f9b17ad2b417be66c3710");
+ var ct:ByteArray = Hex.toArray(
+ "7649abac8119b246cee98e9b12e9197d" +
+ "5086cb9b507219ee95db113a917678b2" +
+ "73bed6b8e3c1743b7116e69e22229516" +
+ "3ff1caa1681fac09120eca307586e1a7");
+ var cbc:CBCMode = new CBCMode(new AESKey(key), new NullPad);
+ cbc.IV = Hex.toArray("000102030405060708090a0b0c0d0e0f");
+ var src:ByteArray = new ByteArray;
+ src.writeBytes(pt);
+ cbc.encrypt(src);
+ assert("CBC_AES128 test 1", Hex.fromArray(src)==Hex.fromArray(ct));
+ cbc.decrypt(src);
+ assert("CBC_AES128 test 2", Hex.fromArray(src)==Hex.fromArray(pt));
+ }
+ public function testCBC_AES192():void {
+ var key:ByteArray = Hex.toArray("8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b");
+ var pt:ByteArray = Hex.toArray(
+ "6bc1bee22e409f96e93d7e117393172a" +
+ "ae2d8a571e03ac9c9eb76fac45af8e51" +
+ "30c81c46a35ce411e5fbc1191a0a52ef" +
+ "f69f2445df4f9b17ad2b417be66c3710");
+ var ct:ByteArray = Hex.toArray(
+ "4f021db243bc633d7178183a9fa071e8" +
+ "b4d9ada9ad7dedf4e5e738763f69145a" +
+ "571b242012fb7ae07fa9baac3df102e0" +
+ "08b0e27988598881d920a9e64f5615cd");
+ var cbc:CBCMode = new CBCMode(new AESKey(key), new NullPad);
+ cbc.IV = Hex.toArray("000102030405060708090a0b0c0d0e0f");
+ var src:ByteArray = new ByteArray;
+ src.writeBytes(pt);
+ cbc.encrypt(src);
+ assert("CBC_AES192 test 1", Hex.fromArray(src)==Hex.fromArray(ct));
+ cbc.decrypt(src);
+ assert("CBC_AES192 test 2", Hex.fromArray(src)==Hex.fromArray(pt));
+ }
+ public function testCBC_AES256():void {
+ var key:ByteArray = Hex.toArray(
+ "603deb1015ca71be2b73aef0857d7781" +
+ "1f352c073b6108d72d9810a30914dff4");
+ var pt:ByteArray = Hex.toArray(
+ "6bc1bee22e409f96e93d7e117393172a" +
+ "ae2d8a571e03ac9c9eb76fac45af8e51" +
+ "30c81c46a35ce411e5fbc1191a0a52ef" +
+ "f69f2445df4f9b17ad2b417be66c3710");
+ var ct:ByteArray = Hex.toArray(
+ "f58c4c04d6e5f1ba779eabfb5f7bfbd6" +
+ "9cfc4e967edb808d679f777bc6702c7d" +
+ "39f23369a9d9bacfa530e26304231461" +
+ "b2eb05e2c39be9fcda6c19078c6a9d1b");
+ var cbc:CBCMode = new CBCMode(new AESKey(key), new NullPad);
+ cbc.IV = Hex.toArray("000102030405060708090a0b0c0d0e0f");
+ var src:ByteArray = new ByteArray;
+ src.writeBytes(pt);
+ cbc.encrypt(src);
+ assert("CBC_AES256 test 1", Hex.fromArray(src)==Hex.fromArray(ct));
+ cbc.decrypt(src);
+ assert("CBC_AES256 test 2", Hex.fromArray(src)==Hex.fromArray(pt));
+ }
+
+
+ /**
+ * For now the main goal is to show we can decrypt what we encrypt in this mode.
+ * Eventually, this should get correlated with some well known vectors.
+ */
+ public function testAES():void {
+ var keys:Array = [
+ "00010203050607080A0B0C0D0F101112",
+ "14151617191A1B1C1E1F202123242526"];
+ var cts:Array = [
+ "D8F532538289EF7D06B506A4FD5BE9C94894C5508A8D8E29AB600DB0261F0555A8FA287B89E65C0973F1F8283E70C72863FE1C8F1F782084CE05626E961A67B3",
+ "59AB30F4D4EE6E4FF9907EF65B1FB68C96890CE217689B1BE0C93ED51CF21BB5A0101A8C30714EC4F52DBC9C6F4126067D363F67ABE58463005E679B68F0B496"];
+ var pts:Array = [
+ "506812A45F08C889B97F5980038B8359506812A45F08C889B97F5980038B8359506812A45F08C889B97F5980038B8359",
+ "5C6D71CA30DE8B8B00549984D2EC7D4B5C6D71CA30DE8B8B00549984D2EC7D4B5C6D71CA30DE8B8B00549984D2EC7D4B"];
+
+ for (var i:uint=0;i<keys.length;i++) {
+ var key:ByteArray = Hex.toArray(keys[i]);
+ var pt:ByteArray = Hex.toArray(pts[i]);
+ var aes:AESKey = new AESKey(key);
+ var cbc:CBCMode = new CBCMode(aes);
+ cbc.IV = Hex.toArray("00000000000000000000000000000000");
+ cbc.encrypt(pt);
+ var str:String = Hex.fromArray(pt).toUpperCase();
+ assert("comparing "+cts[i]+" to "+str, cts[i]==str);
+ // back to pt
+ cbc.decrypt(pt);
+ str = Hex.fromArray(pt).toUpperCase();
+ assert("comparing "+pts[i]+" to "+str, pts[i]==str);
+ }
+ }
+ public function testXTea():void {
+ var keys:Array=[
+ "00000000000000000000000000000000",
+ "2b02056806144976775d0e266c287843"];
+ var cts:Array = [
+ "2dc7e8d3695b0538d8f1640d46dca717790af2ab545e11f3b08e798eb3f17b1744299d4d20b534aa",
+ "790958213819878370eb8251ffdac371081c5a457fc42502c63910306fea150be8674c3b8e675516"];
+ var pts:Array=[
+ "0000000000000000000000000000000000000000000000000000000000000000",
+ "74657374206d652e74657374206d652e74657374206d652e74657374206d652e"];
+
+ for (var i:uint=0;i<keys.length;i++) {
+ var key:ByteArray = Hex.toArray(keys[i]);
+ var pt:ByteArray = Hex.toArray(pts[i]);
+ var tea:XTeaKey = new XTeaKey(key);
+ var cbc:CBCMode = new CBCMode(tea);
+ cbc.IV = Hex.toArray("0000000000000000");
+ cbc.encrypt(pt);
+ var str:String = Hex.fromArray(pt);
+ assert("comparing "+cts[i]+" to "+str, cts[i]==str);
+ // now go back to plaintext.
+ cbc.decrypt(pt);
+ str = Hex.fromArray(pt);
+ assert("comparing "+pts[i]+" to "+str, pts[i]==str);
+ }
+ }
+ }
+} \ No newline at end of file