Repository URL to install this package:
|
Version:
43.0.1 ▾
|
# This file is dual licensed under the terms of the Apache License, Version
# 2.0, and the BSD License. See the LICENSE file in the root of this repository
# for complete details.
import binascii
import os
import pytest
from cryptography.exceptions import InvalidTag
from cryptography.hazmat.primitives.ciphers import algorithms, base, modes
from ...utils import load_nist_vectors, load_vectors_from_file
from .utils import generate_encrypt_test
@pytest.mark.supported(
only_if=lambda backend: backend.cipher_supported(
algorithms.SM4(b"\x00" * 16), modes.ECB()
),
skip_message="Does not support SM4 ECB",
)
class TestSM4ModeECB:
test_ecb = generate_encrypt_test(
load_nist_vectors,
os.path.join("ciphers", "SM4"),
["draft-ribose-cfrg-sm4-10-ecb.txt"],
lambda key, **kwargs: algorithms.SM4(binascii.unhexlify(key)),
lambda **kwargs: modes.ECB(),
)
@pytest.mark.supported(
only_if=lambda backend: backend.cipher_supported(
algorithms.SM4(b"\x00" * 16), modes.CBC(b"\x00" * 16)
),
skip_message="Does not support SM4 CBC",
)
class TestSM4ModeCBC:
test_cbc = generate_encrypt_test(
load_nist_vectors,
os.path.join("ciphers", "SM4"),
["draft-ribose-cfrg-sm4-10-cbc.txt"],
lambda key, **kwargs: algorithms.SM4(binascii.unhexlify(key)),
lambda iv, **kwargs: modes.CBC(binascii.unhexlify(iv)),
)
@pytest.mark.supported(
only_if=lambda backend: backend.cipher_supported(
algorithms.SM4(b"\x00" * 16), modes.OFB(b"\x00" * 16)
),
skip_message="Does not support SM4 OFB",
)
class TestSM4ModeOFB:
test_ofb = generate_encrypt_test(
load_nist_vectors,
os.path.join("ciphers", "SM4"),
["draft-ribose-cfrg-sm4-10-ofb.txt"],
lambda key, **kwargs: algorithms.SM4(binascii.unhexlify(key)),
lambda iv, **kwargs: modes.OFB(binascii.unhexlify(iv)),
)
@pytest.mark.supported(
only_if=lambda backend: backend.cipher_supported(
algorithms.SM4(b"\x00" * 16), modes.CFB(b"\x00" * 16)
),
skip_message="Does not support SM4 CFB",
)
class TestSM4ModeCFB:
test_cfb = generate_encrypt_test(
load_nist_vectors,
os.path.join("ciphers", "SM4"),
["draft-ribose-cfrg-sm4-10-cfb.txt"],
lambda key, **kwargs: algorithms.SM4(binascii.unhexlify(key)),
lambda iv, **kwargs: modes.CFB(binascii.unhexlify(iv)),
)
@pytest.mark.supported(
only_if=lambda backend: backend.cipher_supported(
algorithms.SM4(b"\x00" * 16), modes.CTR(b"\x00" * 16)
),
skip_message="Does not support SM4 CTR",
)
class TestSM4ModeCTR:
test_cfb = generate_encrypt_test(
load_nist_vectors,
os.path.join("ciphers", "SM4"),
["draft-ribose-cfrg-sm4-10-ctr.txt"],
lambda key, **kwargs: algorithms.SM4(binascii.unhexlify(key)),
lambda iv, **kwargs: modes.CTR(binascii.unhexlify(iv)),
)
@pytest.mark.supported(
only_if=lambda backend: backend.cipher_supported(
algorithms.SM4(b"\x00" * 16), modes.GCM(b"\x00" * 16)
),
skip_message="Does not support SM4 GCM",
)
class TestSM4ModeGCM:
@pytest.mark.parametrize(
"vector",
load_vectors_from_file(
os.path.join("ciphers", "SM4", "rfc8998.txt"),
load_nist_vectors,
),
)
def test_encryption(self, vector, backend):
key = binascii.unhexlify(vector["key"])
iv = binascii.unhexlify(vector["iv"])
associated_data = binascii.unhexlify(vector["aad"])
tag = binascii.unhexlify(vector["tag"])
plaintext = binascii.unhexlify(vector["plaintext"])
ciphertext = binascii.unhexlify(vector["ciphertext"])
cipher = base.Cipher(algorithms.SM4(key), modes.GCM(iv))
encryptor = cipher.encryptor()
encryptor.authenticate_additional_data(associated_data)
computed_ct = encryptor.update(plaintext) + encryptor.finalize()
assert computed_ct == ciphertext
assert encryptor.tag == tag
@pytest.mark.parametrize(
"vector",
load_vectors_from_file(
os.path.join("ciphers", "SM4", "rfc8998.txt"),
load_nist_vectors,
),
)
def test_decryption(self, vector, backend):
key = binascii.unhexlify(vector["key"])
iv = binascii.unhexlify(vector["iv"])
associated_data = binascii.unhexlify(vector["aad"])
tag = binascii.unhexlify(vector["tag"])
plaintext = binascii.unhexlify(vector["plaintext"])
ciphertext = binascii.unhexlify(vector["ciphertext"])
cipher = base.Cipher(algorithms.SM4(key), modes.GCM(iv, tag))
decryptor = cipher.decryptor()
decryptor.authenticate_additional_data(associated_data)
computed_pt = decryptor.update(ciphertext) + decryptor.finalize()
assert computed_pt == plaintext
cipher_no_tag = base.Cipher(algorithms.SM4(key), modes.GCM(iv))
decryptor = cipher_no_tag.decryptor()
decryptor.authenticate_additional_data(associated_data)
computed_pt = decryptor.update(
ciphertext
) + decryptor.finalize_with_tag(tag)
assert computed_pt == plaintext
@pytest.mark.parametrize(
"vector",
load_vectors_from_file(
os.path.join("ciphers", "SM4", "rfc8998.txt"),
load_nist_vectors,
),
)
def test_invalid_tag(self, vector, backend):
key = binascii.unhexlify(vector["key"])
iv = binascii.unhexlify(vector["iv"])
associated_data = binascii.unhexlify(vector["aad"])
tag = binascii.unhexlify(vector["tag"])
ciphertext = binascii.unhexlify(vector["ciphertext"])
cipher = base.Cipher(algorithms.SM4(key), modes.GCM(iv, tag))
decryptor = cipher.decryptor()
decryptor.authenticate_additional_data(associated_data)
decryptor.update(ciphertext[:-1])
with pytest.raises(InvalidTag):
decryptor.finalize()
cipher_no_tag = base.Cipher(algorithms.SM4(key), modes.GCM(iv))
decryptor = cipher_no_tag.decryptor()
decryptor.authenticate_additional_data(associated_data)
decryptor.update(ciphertext[:-1])
with pytest.raises(InvalidTag):
decryptor.finalize_with_tag(tag)