1
0
Fork 0
firefox/security/nss/cmd/bltest/tests
Daniel Baumann 5e9a113729
Adding upstream version 140.0.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
2025-06-25 09:37:52 +02:00
..
aes_cbc Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
aes_ctr Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
aes_cts Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
aes_ecb Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
aes_gcm Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
camellia_cbc Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
camellia_ecb Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
chacha20_poly1305 Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
des3_cbc Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
des3_ecb Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
des_cbc Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
des_ecb Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
dsa Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
ecdsa Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
md2 Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
md5 Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
rc2_cbc Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
rc2_ecb Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
rc4 Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
rc5_cbc Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
rc5_ecb Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
rsa Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
rsa_oaep Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
rsa_pss Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
seed_cbc Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
seed_ecb Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
sha1 Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
sha3_224 Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
sha3_256 Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
sha3_384 Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
sha3_512 Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
sha224 Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
sha256 Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
sha384 Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
sha512 Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00
README Adding upstream version 140.0. 2025-06-25 09:37:52 +02:00

This directory contains a set of tests for each cipher supported by
BLAPI.  Each subdirectory contains known plaintext and ciphertext pairs
(and keys and/or iv's if needed).  The tests can be run as a full set
with:
    bltest -T
or as subsets, for example:
    bltest -T -m des_ecb,md2,rsa

In each subdirectory, the plaintext, key, and iv are ascii, and treated
as such.  The ciphertext is base64-encoded to avoid the hassle of binary
files.

To add a test, incremement the value in the numtests file.  Create a
plaintext, key, and iv file, such that the name of the file is
incrememted one from the last set of tests.  For example, if you are
adding the second test, put your data in files named plaintext1, key1,
and iv1 (ignoring key and iv if they are not needed, of course).  Make
sure your key and iv are the correct number of bytes for your cipher (a
trailing \n is okay, but any other trailing bytes will be used!).  Once
you have your input data, create output data by running bltest on a
trusted implementation.  For example, for a new DES ECB test, run
    bltest -E -m des_ecb -i plaintext1 -k key1 -o ciphertext1 -a in the
tests/des_ecb directory.  Then run
    bltest -T des_ecb from the cmd/bltest directory in the tree of the
implementation you want to test.

Note that the -a option above is important, it tells bltest to expect
the input to be straight ASCII, and not base64 encoded binary!

Special cases:

RC5:
RC5 can take additional parameters, the number of rounds to perform and
the wordsize to use.  The number of rounds is between is between 0 and
255, and the wordsize is either is either 16, 32, or 64 bits (at this
time only 32-bit is supported).  These parameters are specified in a
paramsN file, where N is an index as above.  The format of the file is
"rounds=R\nwordsize=W\n".

public key modes (RSA and DSA):
Asymmetric key ciphers use keys with special properties, so creating a
key file with "Mozilla!" in it will not get you very far!  To create a
public key, run bltest with the plaintext you want to encrypt, using a
trusted implementation.  bltest will generate a key and store it in
"tmp.key", rename that file to keyN.  For example:
    bltest -E -m rsa -i plaintext0 -o ciphertext0 -e 65537 -g 32 -a
    mv tmp.key key0

RSA-OAEP/RSA-PSS:
RSA-OAEP and RSA-PSS have a number of additional parameters to feed in.
- "seedN": The seed or salt to use when encrypting/signing
- "hashN" / "maskhashN" - The base digest algorithm and the digest algorithm
   to use with MGF1, respectively. This should be an ASCII string specifying
   one of the hash algorithms recognized by bltest (eg: "sha1", "sha256")

[note: specifying a keysize (-g) when using RSA is important!]