From b60df56157ee1fd0bd4938799bac05a62fda91a1 Mon Sep 17 00:00:00 2001 From: lookshe Date: Sat, 14 Mar 2015 20:45:20 +0100 Subject: initial commit from working version --- .../com/hurlant/crypto/tests/CBCModeTest.as | 160 +++++++++++++++++++++ 1 file changed, 160 insertions(+) create mode 100755 signaling-server/node_modules/socket.io/node_modules/socket.io-client/lib/vendor/web-socket-js/flash-src/com/hurlant/crypto/tests/CBCModeTest.as (limited to 'signaling-server/node_modules/socket.io/node_modules/socket.io-client/lib/vendor/web-socket-js/flash-src/com/hurlant/crypto/tests/CBCModeTest.as') diff --git a/signaling-server/node_modules/socket.io/node_modules/socket.io-client/lib/vendor/web-socket-js/flash-src/com/hurlant/crypto/tests/CBCModeTest.as b/signaling-server/node_modules/socket.io/node_modules/socket.io-client/lib/vendor/web-socket-js/flash-src/com/hurlant/crypto/tests/CBCModeTest.as new file mode 100755 index 0000000..153aa00 --- /dev/null +++ b/signaling-server/node_modules/socket.io/node_modules/socket.io-client/lib/vendor/web-socket-js/flash-src/com/hurlant/crypto/tests/CBCModeTest.as @@ -0,0 +1,160 @@ +/** + * CBCModeTest + * + * A test class for CBCMode + * Copyright (c) 2007 Henri Torgemane + * + * See LICENSE.txt for full license information. + */ +package com.hurlant.crypto.tests +{ + import com.hurlant.crypto.symmetric.AESKey; + import com.hurlant.crypto.symmetric.CBCMode; + import com.hurlant.crypto.symmetric.NullPad; + import com.hurlant.crypto.symmetric.XTeaKey; + import com.hurlant.util.Hex; + + import flash.utils.ByteArray; + + public class CBCModeTest extends TestCase + { + public function CBCModeTest(h:ITestHarness) { + super(h, "CBCMode Test"); + runTest(testAES,"CBC AES Test Vectors"); + runTest(testXTea,"CBC XTea Test Vectors"); + // + runTest(testCBC_AES128, "CBC AES-128 Test Vectors"); + runTest(testCBC_AES192, "CBC AES-192 Test Vectors"); + runTest(testCBC_AES256, "CBC AES-256 Test Vectors"); + h.endTestCase(); + } + + /** + * Hawt NIST Vectors: http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf + * Section F.2.1 and below. + */ + public function testCBC_AES128():void { + var key:ByteArray = Hex.toArray("2b7e151628aed2a6abf7158809cf4f3c"); + var pt:ByteArray = Hex.toArray( + "6bc1bee22e409f96e93d7e117393172a" + + "ae2d8a571e03ac9c9eb76fac45af8e51" + + "30c81c46a35ce411e5fbc1191a0a52ef" + + "f69f2445df4f9b17ad2b417be66c3710"); + var ct:ByteArray = Hex.toArray( + "7649abac8119b246cee98e9b12e9197d" + + "5086cb9b507219ee95db113a917678b2" + + "73bed6b8e3c1743b7116e69e22229516" + + "3ff1caa1681fac09120eca307586e1a7"); + var cbc:CBCMode = new CBCMode(new AESKey(key), new NullPad); + cbc.IV = Hex.toArray("000102030405060708090a0b0c0d0e0f"); + var src:ByteArray = new ByteArray; + src.writeBytes(pt); + cbc.encrypt(src); + assert("CBC_AES128 test 1", Hex.fromArray(src)==Hex.fromArray(ct)); + cbc.decrypt(src); + assert("CBC_AES128 test 2", Hex.fromArray(src)==Hex.fromArray(pt)); + } + public function testCBC_AES192():void { + var key:ByteArray = Hex.toArray("8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b"); + var pt:ByteArray = Hex.toArray( + "6bc1bee22e409f96e93d7e117393172a" + + "ae2d8a571e03ac9c9eb76fac45af8e51" + + "30c81c46a35ce411e5fbc1191a0a52ef" + + "f69f2445df4f9b17ad2b417be66c3710"); + var ct:ByteArray = Hex.toArray( + "4f021db243bc633d7178183a9fa071e8" + + "b4d9ada9ad7dedf4e5e738763f69145a" + + "571b242012fb7ae07fa9baac3df102e0" + + "08b0e27988598881d920a9e64f5615cd"); + var cbc:CBCMode = new CBCMode(new AESKey(key), new NullPad); + cbc.IV = Hex.toArray("000102030405060708090a0b0c0d0e0f"); + var src:ByteArray = new ByteArray; + src.writeBytes(pt); + cbc.encrypt(src); + assert("CBC_AES192 test 1", Hex.fromArray(src)==Hex.fromArray(ct)); + cbc.decrypt(src); + assert("CBC_AES192 test 2", Hex.fromArray(src)==Hex.fromArray(pt)); + } + public function testCBC_AES256():void { + var key:ByteArray = Hex.toArray( + "603deb1015ca71be2b73aef0857d7781" + + "1f352c073b6108d72d9810a30914dff4"); + var pt:ByteArray = Hex.toArray( + "6bc1bee22e409f96e93d7e117393172a" + + "ae2d8a571e03ac9c9eb76fac45af8e51" + + "30c81c46a35ce411e5fbc1191a0a52ef" + + "f69f2445df4f9b17ad2b417be66c3710"); + var ct:ByteArray = Hex.toArray( + "f58c4c04d6e5f1ba779eabfb5f7bfbd6" + + "9cfc4e967edb808d679f777bc6702c7d" + + "39f23369a9d9bacfa530e26304231461" + + "b2eb05e2c39be9fcda6c19078c6a9d1b"); + var cbc:CBCMode = new CBCMode(new AESKey(key), new NullPad); + cbc.IV = Hex.toArray("000102030405060708090a0b0c0d0e0f"); + var src:ByteArray = new ByteArray; + src.writeBytes(pt); + cbc.encrypt(src); + assert("CBC_AES256 test 1", Hex.fromArray(src)==Hex.fromArray(ct)); + cbc.decrypt(src); + assert("CBC_AES256 test 2", Hex.fromArray(src)==Hex.fromArray(pt)); + } + + + /** + * For now the main goal is to show we can decrypt what we encrypt in this mode. + * Eventually, this should get correlated with some well known vectors. + */ + public function testAES():void { + var keys:Array = [ + "00010203050607080A0B0C0D0F101112", + "14151617191A1B1C1E1F202123242526"]; + var cts:Array = [ + "D8F532538289EF7D06B506A4FD5BE9C94894C5508A8D8E29AB600DB0261F0555A8FA287B89E65C0973F1F8283E70C72863FE1C8F1F782084CE05626E961A67B3", + "59AB30F4D4EE6E4FF9907EF65B1FB68C96890CE217689B1BE0C93ED51CF21BB5A0101A8C30714EC4F52DBC9C6F4126067D363F67ABE58463005E679B68F0B496"]; + var pts:Array = [ + "506812A45F08C889B97F5980038B8359506812A45F08C889B97F5980038B8359506812A45F08C889B97F5980038B8359", + "5C6D71CA30DE8B8B00549984D2EC7D4B5C6D71CA30DE8B8B00549984D2EC7D4B5C6D71CA30DE8B8B00549984D2EC7D4B"]; + + for (var i:uint=0;i