⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 validat1.cpp

📁 lots Elliptic curve cryptography codes. Use Visual c++ to compile
💻 CPP
📖 第 1 页 / 共 4 页
字号:
		CBC_CTS_Mode_ExternalCipher::Decryption modeD(desD, stolenIV);		fail = !TestFilter(StreamTransformationFilter(modeD).Ref(),			encrypted, sizeof(encrypted), plain, 3);		pass = pass && !fail;		cout << (fail ? "FAILED   " : "passed   ") << "CBC decryption with ciphertext and IV stealing" << endl;	}	{		const byte encrypted[] = {	// from FIPS 81			0xF3,0x09,0x62,0x49,0xC7,0xF4,0x6E,0x51,			0xA6,0x9E,0x83,0x9B,0x1A,0x92,0xF7,0x84,			0x03,0x46,0x71,0x33,0x89,0x8E,0xA6,0x22};		CFB_Mode_ExternalCipher::Encryption modeE(desE, iv);		fail = !TestFilter(StreamTransformationFilter(modeE).Ref(),			plain, sizeof(plain), encrypted, sizeof(encrypted));		pass = pass && !fail;		cout << (fail ? "FAILED   " : "passed   ") << "CFB encryption" << endl;		CFB_Mode_ExternalCipher::Decryption modeD(desE, iv);		fail = !TestFilter(StreamTransformationFilter(modeD).Ref(),			encrypted, sizeof(encrypted), plain, sizeof(plain));		pass = pass && !fail;		cout << (fail ? "FAILED   " : "passed   ") << "CFB decryption" << endl;		fail = !TestModeIV(modeE, modeD);		pass = pass && !fail;		cout << (fail ? "FAILED   " : "passed   ") << "CFB mode IV generation" << endl;	}	{		const byte plain[] = {	// "Now is the." without tailing 0			0x4e,0x6f,0x77,0x20,0x69,0x73,0x20,0x74,0x68,0x65};		const byte encrypted[] = {	// from FIPS 81			0xf3,0x1f,0xda,0x07,0x01,0x14,0x62,0xee,0x18,0x7f};		CFB_Mode_ExternalCipher::Encryption modeE(desE, iv, 1);		fail = !TestFilter(StreamTransformationFilter(modeE).Ref(),			plain, sizeof(plain), encrypted, sizeof(encrypted));		pass = pass && !fail;		cout << (fail ? "FAILED   " : "passed   ") << "CFB (8-bit feedback) encryption" << endl;		CFB_Mode_ExternalCipher::Decryption modeD(desE, iv, 1);		fail = !TestFilter(StreamTransformationFilter(modeD).Ref(),			encrypted, sizeof(encrypted), plain, sizeof(plain));		pass = pass && !fail;		cout << (fail ? "FAILED   " : "passed   ") << "CFB (8-bit feedback) decryption" << endl;		fail = !TestModeIV(modeE, modeD);		pass = pass && !fail;		cout << (fail ? "FAILED   " : "passed   ") << "CFB (8-bit feedback) IV generation" << endl;	}	{		const byte encrypted[] = {	// from Eric Young's libdes			0xf3,0x09,0x62,0x49,0xc7,0xf4,0x6e,0x51,			0x35,0xf2,0x4a,0x24,0x2e,0xeb,0x3d,0x3f,			0x3d,0x6d,0x5b,0xe3,0x25,0x5a,0xf8,0xc3};		OFB_Mode_ExternalCipher::Encryption modeE(desE, iv);		fail = !TestFilter(StreamTransformationFilter(modeE).Ref(),			plain, sizeof(plain), encrypted, sizeof(encrypted));		pass = pass && !fail;		cout << (fail ? "FAILED   " : "passed   ") << "OFB encryption" << endl;		OFB_Mode_ExternalCipher::Decryption modeD(desE, iv);		fail = !TestFilter(StreamTransformationFilter(modeD).Ref(),			encrypted, sizeof(encrypted), plain, sizeof(plain));		pass = pass && !fail;		cout << (fail ? "FAILED   " : "passed   ") << "OFB decryption" << endl;		fail = !TestModeIV(modeE, modeD);		pass = pass && !fail;		cout << (fail ? "FAILED   " : "passed   ") << "OFB IV generation" << endl;	}	{		const byte encrypted[] = {	// generated with Crypto++			0xF3, 0x09, 0x62, 0x49, 0xC7, 0xF4, 0x6E, 0x51, 			0x16, 0x3A, 0x8C, 0xA0, 0xFF, 0xC9, 0x4C, 0x27, 			0xFA, 0x2F, 0x80, 0xF4, 0x80, 0xB8, 0x6F, 0x75};		CTR_Mode_ExternalCipher::Encryption modeE(desE, iv);		fail = !TestFilter(StreamTransformationFilter(modeE).Ref(),			plain, sizeof(plain), encrypted, sizeof(encrypted));		pass = pass && !fail;		cout << (fail ? "FAILED   " : "passed   ") << "Counter Mode encryption" << endl;		CTR_Mode_ExternalCipher::Decryption modeD(desE, iv);		fail = !TestFilter(StreamTransformationFilter(modeD).Ref(),			encrypted, sizeof(encrypted), plain, sizeof(plain));		pass = pass && !fail;		cout << (fail ? "FAILED   " : "passed   ") << "Counter Mode decryption" << endl;		fail = !TestModeIV(modeE, modeD);		pass = pass && !fail;		cout << (fail ? "FAILED   " : "passed   ") << "Counter Mode IV generation" << endl;	}	{		const byte plain[] = {	// "7654321 Now is the time for "			0x37, 0x36, 0x35, 0x34, 0x33, 0x32, 0x31, 0x20, 			0x4e, 0x6f, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74, 			0x68, 0x65, 0x20, 0x74, 0x69, 0x6d, 0x65, 0x20, 			0x66, 0x6f, 0x72, 0x20};		const byte mac1[] = {	// from FIPS 113			0xf1, 0xd3, 0x0f, 0x68, 0x49, 0x31, 0x2c, 0xa4};		const byte mac2[] = {	// generated with Crypto++			0x35, 0x80, 0xC5, 0xC4, 0x6B, 0x81, 0x24, 0xE2};		CBC_MAC<DES> cbcmac(key);		HashFilter cbcmacFilter(cbcmac);		fail = !TestFilter(cbcmacFilter, plain, sizeof(plain), mac1, sizeof(mac1));		pass = pass && !fail;		cout << (fail ? "FAILED   " : "passed   ") << "CBC MAC" << endl;		DMAC<DES> dmac(key);		HashFilter dmacFilter(dmac);		fail = !TestFilter(dmacFilter, plain, sizeof(plain), mac2, sizeof(mac2));		pass = pass && !fail;		cout << (fail ? "FAILED   " : "passed   ") << "DMAC" << endl;	}	{		CTR_Mode<AES>::Encryption modeE(plain, 16, plain);		CTR_Mode<AES>::Decryption modeD(plain, 16, plain);		fail = !TestModeIV(modeE, modeD);		pass = pass && !fail;		cout << (fail ? "FAILED   " : "passed   ") << "AES CTR Mode" << endl;	}	{		OFB_Mode<AES>::Encryption modeE(plain, 16, plain);		OFB_Mode<AES>::Decryption modeD(plain, 16, plain);		fail = !TestModeIV(modeE, modeD);		pass = pass && !fail;		cout << (fail ? "FAILED   " : "passed   ") << "AES OFB Mode" << endl;	}	{		CFB_Mode<AES>::Encryption modeE(plain, 16, plain);		CFB_Mode<AES>::Decryption modeD(plain, 16, plain);		fail = !TestModeIV(modeE, modeD);		pass = pass && !fail;		cout << (fail ? "FAILED   " : "passed   ") << "AES CFB Mode" << endl;	}	{		CBC_Mode<AES>::Encryption modeE(plain, 16, plain);		CBC_Mode<AES>::Decryption modeD(plain, 16, plain);		fail = !TestModeIV(modeE, modeD);		pass = pass && !fail;		cout << (fail ? "FAILED   " : "passed   ") << "AES CBC Mode" << endl;	}	return pass;}bool ValidateIDEA(){	cout << "\nIDEA validation suite running...\n\n";	FileSource valdata("TestData/ideaval.dat", true, new HexDecoder);	return BlockTransformationTest(FixedRoundsCipherFactory<IDEAEncryption, IDEADecryption>(), valdata);}bool ValidateSAFER(){	cout << "\nSAFER validation suite running...\n\n";	FileSource valdata("TestData/saferval.dat", true, new HexDecoder);	bool pass = true;	pass = BlockTransformationTest(VariableRoundsCipherFactory<SAFER_K_Encryption, SAFER_K_Decryption>(8,6), valdata, 4) && pass;	pass = BlockTransformationTest(VariableRoundsCipherFactory<SAFER_K_Encryption, SAFER_K_Decryption>(16,12), valdata, 4) && pass;	pass = BlockTransformationTest(VariableRoundsCipherFactory<SAFER_SK_Encryption, SAFER_SK_Decryption>(8,6), valdata, 4) && pass;	pass = BlockTransformationTest(VariableRoundsCipherFactory<SAFER_SK_Encryption, SAFER_SK_Decryption>(16,10), valdata, 4) && pass;	return pass;}bool ValidateRC2(){	cout << "\nRC2 validation suite running...\n\n";	FileSource valdata("TestData/rc2val.dat", true, new HexDecoder);	HexEncoder output(new FileSink(cout));	SecByteBlock plain(RC2Encryption::BLOCKSIZE), cipher(RC2Encryption::BLOCKSIZE), out(RC2Encryption::BLOCKSIZE), outplain(RC2Encryption::BLOCKSIZE);	SecByteBlock key(128);	bool pass=true, fail;	while (valdata.MaxRetrievable())	{		byte keyLen, effectiveLen;		valdata.Get(keyLen);		valdata.Get(effectiveLen);		valdata.Get(key, keyLen);		valdata.Get(plain, RC2Encryption::BLOCKSIZE);		valdata.Get(cipher, RC2Encryption::BLOCKSIZE);		apbt transE(new RC2Encryption(key, keyLen, effectiveLen));		transE->ProcessBlock(plain, out);		fail = memcmp(out, cipher, RC2Encryption::BLOCKSIZE) != 0;		apbt transD(new RC2Decryption(key, keyLen, effectiveLen));		transD->ProcessBlock(out, outplain);		fail=fail || memcmp(outplain, plain, RC2Encryption::BLOCKSIZE);		pass = pass && !fail;		cout << (fail ? "FAILED   " : "passed   ");		output.Put(key, keyLen);		cout << "   ";		output.Put(outplain, RC2Encryption::BLOCKSIZE);		cout << "   ";		output.Put(out, RC2Encryption::BLOCKSIZE);		cout << endl;	}	return pass;}bool ValidateARC4(){	unsigned char Key0[] = {0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef };	unsigned char Input0[]={0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef};	unsigned char Output0[] = {0x75,0xb7,0x87,0x80,0x99,0xe0,0xc5,0x96};	unsigned char Key1[]={0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef};	unsigned char Input1[]={0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00};	unsigned char Output1[]={0x74,0x94,0xc2,0xe7,0x10,0x4b,0x08,0x79};	unsigned char Key2[]={0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00};	unsigned char Input2[]={0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00};	unsigned char Output2[]={0xde,0x18,0x89,0x41,0xa3,0x37,0x5d,0x3a};	unsigned char Key3[]={0xef,0x01,0x23,0x45};	unsigned char Input3[]={0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00};	unsigned char Output3[]={0xd6,0xa1,0x41,0xa7,0xec,0x3c,0x38,0xdf,0xbd,0x61};	unsigned char Key4[]={ 0x01,0x23,0x45,0x67,0x89,0xab, 0xcd,0xef };	unsigned char Input4[] =	{0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,	0x01};	unsigned char Output4[]= {	0x75,0x95,0xc3,0xe6,0x11,0x4a,0x09,0x78,0x0c,0x4a,0xd4,	0x52,0x33,0x8e,0x1f,0xfd,0x9a,0x1b,0xe9,0x49,0x8f,	0x81,0x3d,0x76,0x53,0x34,0x49,0xb6,0x77,0x8d,0xca,	0xd8,0xc7,0x8a,0x8d,0x2b,0xa9,0xac,0x66,0x08,0x5d,	0x0e,0x53,0xd5,0x9c,0x26,0xc2,0xd1,0xc4,0x90,0xc1,	0xeb,0xbe,0x0c,0xe6,0x6d,0x1b,0x6b,0x1b,0x13,0xb6,	0xb9,0x19,0xb8,0x47,0xc2,0x5a,0x91,0x44,0x7a,0x95,	0xe7,0x5e,0x4e,0xf1,0x67,0x79,0xcd,0xe8,0xbf,0x0a,	0x95,0x85,0x0e,0x32,0xaf,0x96,0x89,0x44,0x4f,0xd3,	0x77,0x10,0x8f,0x98,0xfd,0xcb,0xd4,0xe7,0x26,0x56,	0x75,0x00,0x99,0x0b,0xcc,0x7e,0x0c,0xa3,0xc4,0xaa,	0xa3,0x04,0xa3,0x87,0xd2,0x0f,0x3b,0x8f,0xbb,0xcd,	0x42,0xa1,0xbd,0x31,0x1d,0x7a,0x43,0x03,0xdd,0xa5,	0xab,0x07,0x88,0x96,0xae,0x80,0xc1,0x8b,0x0a,0xf6,	0x6d,0xff,0x31,0x96,0x16,0xeb,0x78,0x4e,0x49,0x5a,	0xd2,0xce,0x90,0xd7,0xf7,0x72,0xa8,0x17,0x47,0xb6,	0x5f,0x62,0x09,0x3b,0x1e,0x0d,0xb9,0xe5,0xba,0x53,	0x2f,0xaf,0xec,0x47,0x50,0x83,0x23,0xe6,0x71,0x32,	0x7d,0xf9,0x44,0x44,0x32,0xcb,0x73,0x67,0xce,0xc8,	0x2f,0x5d,0x44,0xc0,0xd0,0x0b,0x67,0xd6,0x50,0xa0,	0x75,0xcd,0x4b,0x70,0xde,0xdd,0x77,0xeb,0x9b,0x10,	0x23,0x1b,0x6b,0x5b,0x74,0x13,0x47,0x39,0x6d,0x62,	0x89,0x74,0x21,0xd4,0x3d,0xf9,0xb4,0x2e,0x44,0x6e,	0x35,0x8e,0x9c,0x11,0xa9,0xb2,0x18,0x4e,0xcb,0xef,	0x0c,0xd8,0xe7,0xa8,0x77,0xef,0x96,0x8f,0x13,0x90,	0xec,0x9b,0x3d,0x35,0xa5,0x58,0x5c,0xb0,0x09,0x29,	0x0e,0x2f,0xcd,0xe7,0xb5,0xec,0x66,0xd9,0x08,0x4b,	0xe4,0x40,0x55,0xa6,0x19,0xd9,0xdd,0x7f,0xc3,0x16,	0x6f,0x94,0x87,0xf7,0xcb,0x27,0x29,0x12,0x42,0x64,	0x45,0x99,0x85,0x14,0xc1,0x5d,0x53,0xa1,0x8c,0x86,	0x4c,0xe3,0xa2,0xb7,0x55,0x57,0x93,0x98,0x81,0x26,	0x52,0x0e,0xac,0xf2,0xe3,0x06,0x6e,0x23,0x0c,0x91,	0xbe,0xe4,0xdd,0x53,0x04,0xf5,0xfd,0x04,0x05,0xb3,	0x5b,0xd9,0x9c,0x73,0x13,0x5d,0x3d,0x9b,0xc3,0x35,	0xee,0x04,0x9e,0xf6,0x9b,0x38,0x67,0xbf,0x2d,0x7b,	0xd1,0xea,0xa5,0x95,0xd8,0xbf,0xc0,0x06,0x6f,0xf8,	0xd3,0x15,0x09,0xeb,0x0c,0x6c,0xaa,0x00,0x6c,0x80,	0x7a,0x62,0x3e,0xf8,0x4c,0x3d,0x33,0xc1,0x95,0xd2,	0x3e,0xe3,0x20,0xc4,0x0d,0xe0,0x55,0x81,0x57,0xc8,	0x22,0xd4,0xb8,0xc5,0x69,0xd8,0x49,0xae,0xd5,0x9d,	0x4e,0x0f,0xd7,0xf3,0x79,0x58,0x6b,0x4b,0x7f,0xf6,	0x84,0xed,0x6a,0x18,0x9f,0x74,0x86,0xd4,0x9b,0x9c,	0x4b,0xad,0x9b,0xa2,0x4b,0x96,0xab,0xf9,0x24,0x37,	0x2c,0x8a,0x8f,0xff,0xb1,0x0d,0x55,0x35,0x49,0x00,	0xa7,0x7a,0x3d,0xb5,0xf2,0x05,0xe1,0xb9,0x9f,0xcd,	0x86,0x60,0x86,0x3a,0x15,0x9a,0xd4,0xab,0xe4,0x0f,	0xa4,0x89,0x34,0x16,0x3d,0xdd,0xe5,0x42,0xa6,0x58,	0x55,0x40,0xfd,0x68,0x3c,0xbf,0xd8,0xc0,0x0f,0x12,	0x12,0x9a,0x28,0x4d,0xea,0xcc,0x4c,0xde,0xfe,0x58,	0xbe,0x71,0x37,0x54,0x1c,0x04,0x71,0x26,0xc8,0xd4,	0x9e,0x27,0x55,0xab,0x18,0x1a,0xb7,0xe9,0x40,0xb0,	0xc0};	// VC60 workaround: auto_ptr lacks reset()	member_ptr<Weak::ARC4> arc4;	bool pass=true, fail;	int i;	cout << "\nARC4 validation suite running...\n\n";	arc4.reset(new Weak::ARC4(Key0, sizeof(Key0)));	arc4->ProcessString(Input0, sizeof(Input0));	fail = memcmp(Input0, Output0, sizeof(Input0)) != 0;	cout << (fail ? "FAILED" : "passed") << "    Test 0" << endl;	pass = pass && !fail;	arc4.reset(new Weak::ARC4(Key1, sizeof(Key1)));	arc4->ProcessString(Key1, Input1, sizeof(Key1));

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -