%%
%% %CopyrightBegin%
%%
%% Copyright Ericsson AB 1999-2013. All Rights Reserved.
%%
%% The contents of this file are subject to the Erlang Public License,
%% Version 1.1, (the "License"); you may not use this file except in
%% compliance with the License. You should have received a copy of the
%% Erlang Public License along with this software. If not, it can be
%% retrieved online at http://www.erlang.org/.
%%
%% Software distributed under the License is distributed on an "AS IS"
%% basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See
%% the License for the specific language governing rights and limitations
%% under the License.
%%
%% %CopyrightEnd%
%%
-module(crypto_SUITE).
-include_lib("common_test/include/ct.hrl").
%% Note: This directive should only be used in test suites.
-compile(export_all).
%%--------------------------------------------------------------------
%% Common Test interface functions -----------------------------------
%%--------------------------------------------------------------------
suite() -> [{ct_hooks,[ts_install_cth]}].
all() ->
[app,
{group, md4},
{group, md5},
{group, ripemd160},
{group, sha},
{group, sha224},
{group, sha256},
{group, sha384},
{group, sha512},
{group, rsa},
{group, dss},
{group, ecdsa},
{group, dh},
{group, ecdh},
{group, srp},
{group, des_cbc},
{group, des_cfb},
{group, des3_cbc},
{group, des3_cbf},
{group, des_ede3},
{group, blowfish_cbc},
{group, blowfish_ecb},
{group, blowfish_cfb64},
{group, blowfish_ofb64},
{group, aes_cbc128},
{group, aes_cfb128},
{group, aes_cbc256},
{group, rc2_cbc},
{group, rc4},
{group, aes_ctr},
mod_pow,
exor,
rand_uniform
].
groups() ->
[{md4, [], [hash]},
{md5, [], [hash, hmac]},
{ripemd160, [], [hash]},
{sha, [], [hash, hmac]},
{sha224, [], [hash, hmac]},
{sha256, [], [hash, hmac]},
{sha384, [], [hash, hmac]},
{sha512, [], [hash, hmac]},
{rsa, [], [sign_verify,
public_encrypt
]},
{dss, [], [sign_verify]},
{ecdsa, [], [sign_verify]},
{dh, [], [generate_compute]},
{ecdh, [], [compute]},
{srp, [], [generate_compute]},
{des_cbc, [], [block]},
{des_cfb, [], [block]},
{des3_cbc,[], [block]},
{des_ede3,[], [block]},
{des3_cbf,[], [block]},
{rc2_cbc,[], [block]},
{aes_cbc128,[], [block]},
{aes_cfb128,[], [block]},
{aes_cbc256,[], [block]},
{blowfish_cbc, [], [block]},
{blowfish_ecb, [], [block]},
{blowfish_cfb64, [], [block]},
{blowfish_ofb64,[], [block]},
{rc4, [], [stream]},
{aes_ctr, [], [stream]}
].
%%-------------------------------------------------------------------
init_per_suite(Config) ->
try crypto:start() of
ok ->
Config
catch _:_ ->
{skip, "Crypto did not start"}
end.
end_per_suite(_Config) ->
application:stop(crypto).
%%-------------------------------------------------------------------
init_per_group(GroupName, Config) ->
case is_supported(GroupName) of
true ->
group_config(GroupName, Config);
false ->
{skip, "Group not supported"}
end.
end_per_group(_GroupName, Config) ->
Config.
init_per_testcase(info, Config) ->
Config;
init_per_testcase(_Name,Config) ->
Config.
end_per_testcase(info, Config) ->
Config;
end_per_testcase(_Name,Config) ->
Config.
%%--------------------------------------------------------------------
%% Test Cases --------------------------------------------------------
%%--------------------------------------------------------------------
app() ->
[{doc, "Test that the crypto app file is ok"}].
app(Config) when is_list(Config) ->
ok = ?t:app_test(crypto).
%%--------------------------------------------------------------------
hash() ->
[{doc, "Test all different hash functions"}].
hash(Config) when is_list(Config) ->
{Type, Msgs, Digests} = proplists:get_value(hash, Config),
[LongMsg | _] = lists:reverse(Msgs),
Inc = iolistify(LongMsg),
[IncrDigest | _] = lists:reverse(Digests),
hash(Type, Msgs, Digests),
hash(Type, lists:map(fun iolistify/1, Msgs), Digests),
hash_increment(Type, Inc, IncrDigest).
%%--------------------------------------------------------------------
hmac() ->
[{doc, "Test all different hmac functions"}].
hmac(Config) when is_list(Config) ->
{Type, Keys, Data, Expected} = proplists:get_value(hmac, Config),
hmac(Type, Keys, Data, Expected),
hmac(Type, lists:map(fun iolistify/1, Keys), lists:map(fun iolistify/1, Data), Expected),
hmac_increment(Type).
%%--------------------------------------------------------------------
block() ->
[{doc, "Test block ciphers"}].
block(Config) when is_list(Config) ->
Blocks = proplists:get_value(block, Config),
lists:foreach(fun block_cipher/1, Blocks),
lists:foreach(fun block_cipher/1, block_iolistify(Blocks)),
lists:foreach(fun block_cipher_increment/1, block_iolistify(Blocks)).
%%--------------------------------------------------------------------
stream() ->
[{doc, "Test stream ciphers"}].
stream(Config) when is_list(Config) ->
Streams = proplists:get_value(stream, Config),
lists:foreach(fun stream_cipher/1, Streams),
lists:foreach(fun stream_cipher/1, stream_iolistify(Streams)),
lists:foreach(fun stream_cipher_incment/1, stream_iolistify(Streams)).
%%--------------------------------------------------------------------
sign_verify() ->
[{doc, "Sign/verify digital signatures"}].
sign_verify(Config) when is_list(Config) ->
SignVerify = proplists:get_value(sign_verify, Config),
lists:foreach(fun do_sign_verify/1, SignVerify).
%%--------------------------------------------------------------------
public_encrypt() ->
[{doc, "Test public_encrypt/decrypt and private_encrypt/decrypt functions. "}].
public_encrypt(Config) when is_list(Config) ->
Params = proplists:get_value(pub_priv_encrypt, Config),
lists:foreach(fun do_public_encrypt/1, Params),
lists:foreach(fun do_private_encrypt/1, Params).
%%--------------------------------------------------------------------
generate_compute() ->
[{doc, " Test crypto:genarate_key and crypto:compute_key"}].
generate_compute(Config) when is_list(Config) ->
GenCom = proplists:get_value(generate_compute, Config),
lists:foreach(fun do_generate_compute/1, GenCom).
%%--------------------------------------------------------------------
compute() ->
[{doc, " Test crypto:compute_key"}].
compute(Config) when is_list(Config) ->
Gen = proplists:get_value(compute, Config),
lists:foreach(fun do_compute/1, Gen).
%%--------------------------------------------------------------------
mod_pow() ->
[{doc, "mod_pow testing (A ^ M % P with bignums)"}].
mod_pow(Config) when is_list(Config) ->
mod_pow_aux_test(2, 5, 10, 8).
%%--------------------------------------------------------------------
exor() ->
[{doc, "Test the exor function"}].
exor(Config) when is_list(Config) ->
B = <<1, 2, 3, 4, 5, 6, 7, 8, 9, 10>>,
Z1 = zero_bin(B),
Z1 = crypto:exor(B, B),
B1 = crypto:rand_bytes(100),
B2 = crypto:rand_bytes(100),
Z2 = zero_bin(B1),
Z2 = crypto:exor(B1, B1),
Z2 = crypto:exor(B2, B2),
R = xor_bytes(B1, B2),
R = crypto:exor(B1, B2).
%%--------------------------------------------------------------------
rand_uniform() ->
[{doc, "rand_uniform and random_bytes testing"}].
rand_uniform(Config) when is_list(Config) ->
rand_uniform_aux_test(10),
10 = byte_size(crypto:rand_bytes(10)),
10 = byte_size(crypto:strong_rand_bytes(10)).
%%--------------------------------------------------------------------
%% Internal functions ------------------------------------------------
%%--------------------------------------------------------------------
hash(_, [], []) ->
ok;
hash(Type, [Msg | RestMsg], [Digest| RestDigest]) ->
case crypto:hash(Type, Msg) of
Digest ->
hash(Type, RestMsg, RestDigest);
Other ->
ct:fail({{crypto, hash, [Type, Msg]}, {expected, Digest}, {got, Other}})
end.
hash_increment(Type, Increments, Digest) ->
State = crypto:hash_init(Type),
case hash_increment(State, Increments) of
Digest ->
ok;
Other ->
ct:fail({{crypto, "hash_init/update/final", [Type, Increments]}, {expected, Digest}, {got, Other}})
end.
hash_increment(State, []) ->
crypto:hash_final(State);
hash_increment(State0, [Increment | Rest]) ->
State = crypto:hash_update(State0, Increment),
hash_increment(State, Rest).
hmac(_, [],[],[]) ->
ok;
hmac(sha = Type, [Key | Keys], [ <<"Test With Truncation">> = Data| Rest], [Expected | Expects]) ->
case crypto:hmac(Type, Key, Data, 20) of
Expected ->
ok;
Other ->
ct:fail({{crypto, hmac, [Type, Key, Data]}, {expected, Expected}, {got, Other}})
end,
hmac(Type, Keys, Rest, Expects);
hmac(Type, [Key | Keys], [ <<"Test With Truncation">> = Data| Rest], [Expected | Expects]) ->
case crypto:hmac(Type, Key, Data, 16) of
Expected ->
ok;
Other ->
ct:fail({{crypto, hmac, [Type, Key, Data]}, {expected, Expected}, {got, Other}})
end,
hmac(Type, Keys, Rest, Expects);
hmac(Type, [Key | Keys], [Data| Rest], [Expected | Expects]) ->
case crypto:hmac(Type, Key, Data) of
Expected ->
ok;
Other ->
ct:fail({{crypto, hmac, [Type, Key, Data]}, {expected, Expected}, {got, Other}})
end,
hmac(Type, Keys, Rest, Expects).
hmac_increment(Type) ->
Key = hmac_key(Type),
Increments = hmac_inc(Type),
Expected = crypto:hmac(Type, Key, lists:flatten(Increments)),
State = crypto:hmac_init(Type, Key),
case hmac_increment(State, Increments) of
Expected ->
ok;
Other ->
ct:fail({{crypto, "hmac_init/update/final", [Type, Increments]}, {expected, Expected}, {got, Other}})
end.
hmac_increment(State, []) ->
crypto:hmac_final(State);
hmac_increment(State0, [Increment | Rest]) ->
State = crypto:hmac_update(State0, Increment),
hmac_increment(State, Rest).
block_cipher({Type, Key, PlainText}) ->
Plain = iolist_to_binary(PlainText),
CipherText = crypto:block_encrypt(Type, Key, PlainText),
case crypto:block_decrypt(Type, Key, CipherText) of
Plain ->
ok;
Other ->
ct:fail({{crypto, block_decrypt, [Type, Key, CipherText]}, {expected, Plain}, {got, Other}})
end;
block_cipher({Type, Key, IV, PlainText}) ->
Plain = iolist_to_binary(PlainText),
CipherText = crypto:block_encrypt(Type, Key, IV, PlainText),
case crypto:block_decrypt(Type, Key, IV, CipherText) of
Plain ->
ok;
Other ->
ct:fail({{crypto, block_decrypt, [Type, Key, IV, CipherText]}, {expected, Plain}, {got, Other}})
end.
block_cipher_increment({Type, Key, IV, PlainTexts}) when Type == des_cbc;
Type == des3_cbc;
Type == aes_cbc;
Type == des_cbf
->
block_cipher_increment(Type, Key, IV, IV, PlainTexts, iolist_to_binary(PlainTexts), []);
block_cipher_increment({_Type, _, _, _}) ->
ok;
block_cipher_increment({_,_,_}) ->
ok.
block_cipher_increment(Type, Key, IV0, _IV, [], Plain, Acc) ->
CipherText = iolist_to_binary(lists:reverse(Acc)),
case crypto:block_decrypt(Type, Key, IV0, CipherText) of
Plain ->
ok;
Other ->
ct:fail({{crypto, block_decrypt, [Type, Key, IV0, CipherText]}, {expected, Plain}, {got, Other}})
end;
block_cipher_increment(Type, Key, IV0, IV, [PlainText | PlainTexts], Plain, Acc) ->
CipherText = crypto:block_encrypt(Type, Key, IV, PlainText),
NextIV = crypto:next_iv(Type, CipherText),
block_cipher_increment(Type, Key, IV0, NextIV, PlainTexts, Plain, [CipherText | Acc]).
stream_cipher({Type, Key, PlainText}) ->
Plain = iolist_to_binary(PlainText),
State = crypto:stream_init(Type, Key),
{_, CipherText} = crypto:stream_encrypt(State, PlainText),
case crypto:stream_decrypt(State, CipherText) of
{_, Plain} ->
ok;
Other ->
ct:fail({{crypto, stream_decrypt, [State, CipherText]}, {expected, PlainText}, {got, Other}})
end;
stream_cipher({Type, Key, IV, PlainText}) ->
Plain = iolist_to_binary(PlainText),
State = crypto:stream_init(Type, Key, IV),
{_, CipherText} = crypto:stream_encrypt(State, PlainText),
case crypto:stream_decrypt(State, CipherText) of
{_, Plain} ->
ok;
Other ->
ct:fail({{crypto, stream_decrypt, [State, CipherText]}, {expected, PlainText}, {got, Other}})
end.
stream_cipher_incment({Type, Key, PlainTexts}) ->
State = crypto:stream_init(Type, Key),
stream_cipher_incment(State, State, PlainTexts, [], iolist_to_binary(PlainTexts));
stream_cipher_incment({Type, Key, IV, PlainTexts}) ->
State = crypto:stream_init(Type, Key, IV),
stream_cipher_incment(State, State, PlainTexts, [], iolist_to_binary(PlainTexts)).
stream_cipher_incment(_State, OrigState, [], Acc, Plain) ->
CipherText = iolist_to_binary(lists:reverse(Acc)),
case crypto:stream_decrypt(OrigState, CipherText) of
{_, Plain} ->
ok;
Other ->
ct:fail({{crypto, stream_decrypt, [OrigState, CipherText]}, {expected, Plain}, {got, Other}})
end;
stream_cipher_incment(State0, OrigState, [PlainText | PlainTexts], Acc, Plain) ->
{State, CipherText} = crypto:stream_encrypt(State0, PlainText),
stream_cipher_incment(State, OrigState, PlainTexts, [CipherText | Acc], Plain).
do_sign_verify({Type, Hash, Public, Private, Msg}) ->
Signature = crypto:sign(Type, Hash, Msg, Private),
case crypto:verify(Type, Hash, Msg, Signature, Public) of
true ->
negative_verify(Type, Hash, Msg, <<10,20>>, Public);
false ->
ct:fail({{crypto, verify, [Type, Hash, Msg, Signature, Public]}})
end.
negative_verify(Type, Hash, Msg, Signature, Public) ->
case crypto:verify(Type, Hash, Msg, Signature, Public) of
true ->
ct:fail({{crypto, verify, [Type, Hash, Msg, Signature, Public]}, should_fail});
false ->
ok
end.
do_public_encrypt({Type, Public, Private, Msg, Padding}) ->
PublicEcn = (catch crypto:public_encrypt(Type, Msg, Public, Padding)),
case crypto:private_decrypt(Type, PublicEcn, Private, Padding) of
Msg ->
ok;
Other ->
ct:fail({{crypto, private_decrypt, [Type, PublicEcn, Private, Padding]}, {expected, Msg}, {got, Other}})
end.
do_private_encrypt({_Type, _Public, _Private, _Msg, rsa_pkcs1_oaep_padding}) ->
ok; %% Not supported by openssl
do_private_encrypt({Type, Public, Private, Msg, Padding}) ->
PrivEcn = (catch crypto:private_encrypt(Type, Msg, Private, Padding)),
case crypto:public_decrypt(rsa, PrivEcn, Public, Padding) of
Msg ->
ok;
Other ->
ct:fail({{crypto, public_decrypt, [Type, PrivEcn, Public, Padding]}, {expected, Msg}, {got, Other}})
end.
do_generate_compute({srp = Type, UserPrivate, UserGenParams, UserComParams,
HostPublic, HostPrivate, HostGenParams, HostComParam, SessionKey}) ->
{UserPublic, UserPrivate} = crypto:generate_key(Type, UserGenParams, UserPrivate),
{HostPublic, HostPrivate} = crypto:generate_key(Type, HostGenParams, HostPrivate),
SessionKey = crypto:compute_key(Type, HostPublic, {UserPublic, UserPrivate},
UserComParams),
SessionKey = crypto:compute_key(Type, UserPublic, {HostPublic, HostPrivate},
HostComParam);
do_generate_compute({dh, P, G}) ->
{UserPub, UserPriv} = crypto:generate_key(dh, [P, G]),
{HostPub, HostPriv} = crypto:generate_key(dh, [P, G]),
SharedSecret = crypto:compute_key(dh, HostPub, UserPriv, [P, G]),
SharedSecret = crypto:compute_key(dh, UserPub, HostPriv, [P, G]).
do_compute({ecdh = Type, Pub, Priv, Curve, SharedSecret}) ->
Secret = crypto:bytes_to_integer(crypto:compute_key(Type, Pub, Priv, Curve)),
case Secret of
SharedSecret ->
ok;
Other ->
ct:fail({{crypto, compute_key, [Type, Pub, Priv, Curve]}, {expected, SharedSecret}, {got, Other}})
end.
hexstr2bin(S) ->
list_to_binary(hexstr2list(S)).
hexstr2list([X,Y|T]) ->
[mkint(X)*16 + mkint(Y) | hexstr2list(T)];
hexstr2list([]) ->
[].
mkint(C) when $0 =< C, C =< $9 ->
C - $0;
mkint(C) when $A =< C, C =< $F ->
C - $A + 10;
mkint(C) when $a =< C, C =< $f ->
C - $a + 10.
is_supported(Group) ->
lists:member(Group, lists:append([Algo || {_, Algo} <- crypto:supports()])).
block_iolistify(Blocks) ->
lists:map(fun do_block_iolistify/1, Blocks).
stream_iolistify(Streams) ->
lists:map(fun do_stream_iolistify/1, Streams).
do_stream_iolistify({Type, Key, PlainText}) ->
{Type, iolistify(Key), iolistify(PlainText)};
do_stream_iolistify({Type, Key, IV, PlainText}) ->
{Type, iolistify(Key), IV, iolistify(PlainText)}.
do_block_iolistify({des_cbc = Type, Key, IV, PlainText}) ->
{Type, Key, IV, des_iolistify(PlainText)};
do_block_iolistify({des3_cbc = Type, Key, IV, PlainText}) ->
{Type, Key, IV, des_iolistify(PlainText)};
do_block_iolistify({des3_cbf = Type, Key, IV, PlainText}) ->
{Type, Key, IV, des_iolistify(PlainText)};
do_block_iolistify({des_ede3 = Type, Key, IV, PlainText}) ->
{Type, Key, IV, des_iolistify(PlainText)};
do_block_iolistify({Type, Key, PlainText}) ->
{Type, iolistify(Key), iolistify(PlainText)};
do_block_iolistify({Type, Key, IV, PlainText}) ->
{Type, iolistify(Key), IV, iolistify(PlainText)}.
iolistify(<<"Test With Truncation">>)->
%% Do not iolistify as it spoils this special case
<<"Test With Truncation">>;
iolistify(Msg)->
Length = erlang:byte_size(Msg),
Split = Length div 2,
List0 = binary_to_list(Msg),
case lists:split(Split, List0) of
{[Element | List1], List2} ->
[[Element], List1, List2];
{List1, List2}->
[List1, List2]
end.
des_iolistify(Msg) ->
des_iolist(erlang:byte_size(Msg) div 8, Msg, []).
des_iolist(1, Msg, Acc) ->
lists:reverse([Msg | Acc]);
des_iolist(Split, Msg, Acc) ->
<<Part:8/binary, Rest/binary>> = Msg,
des_iolist(Split-1, Rest, [Part | Acc]).
%%--------------------------------------------------------------------
mod_pow_aux_test(_, _, _, 0) ->
ok;
mod_pow_aux_test(B, E, M, N) ->
Result = crypto:bytes_to_integer(crypto:mod_pow(B, E, M)),
Result = ipow(B, E, M),
mod_pow_aux_test(B, E*E+1, M*M+1, N-1).
%% mod_exp in erlang (copied from jungerl's ssh_math.erl)
ipow(A, B, M) when M > 0, B >= 0 ->
if A == 1 ->
1;
true ->
ipow(A, B, M, 1)
end.
ipow(A, 1, M, Prod) ->
(A*Prod) rem M;
ipow(_A, 0, _M, Prod) ->
Prod;
ipow(A, B, M, Prod) ->
B1 = B bsr 1,
A1 = (A*A) rem M,
if B - B1 == B1 ->
ipow(A1, B1, M, Prod);
true ->
ipow(A1, B1, M, (A*Prod) rem M)
end.
zero_bin(N) when is_integer(N) ->
N8 = N * 8,
<<0:N8/integer>>;
zero_bin(B) when is_binary(B) ->
zero_bin(size(B)).
xor_bytes(Bin1, Bin2) when is_binary(Bin1), is_binary(Bin2) ->
L1 = binary_to_list(Bin1),
L2 = binary_to_list(Bin2),
list_to_binary(xor_bytes(L1, L2));
xor_bytes(L1, L2) ->
xor_bytes(L1, L2, []).
xor_bytes([], [], Acc) ->
lists:reverse(Acc);
xor_bytes([N1 | Tl1], [N2 | Tl2], Acc) ->
xor_bytes(Tl1, Tl2, [N1 bxor N2 | Acc]).
rand_uniform_aux_test(0) ->
ok;
rand_uniform_aux_test(N) ->
L = N*1000,
H = N*100000+1,
crypto_rand_uniform(L, H),
crypto_rand_uniform(-L, L),
crypto_rand_uniform(-H, -L),
crypto_rand_uniform(-H, L),
rand_uniform_aux_test(N-1).
crypto_rand_uniform(L,H) ->
R1 = crypto:rand_uniform(L, H),
case (R1 >= L) and (R1 < H) of
true ->
ok;
false ->
ct:fail({"Not in interval", R1, L, H})
end.
%%--------------------------------------------------------------------
%% Test data ------------------------------------------------
%%--------------------------------------------------------------------
group_config(md4 = Type, Config) ->
Msgs = rfc_1321_msgs(),
Digests = rfc_1321_md4_digests(),
[{hash, {Type, Msgs, Digests}} | Config];
group_config(md5 = Type, Config) ->
Msgs = rfc_1321_msgs(),
Digests = rfc_1321_md5_digests(),
Keys = rfc_2202_md5_keys(),
Data = rfc_2202_msgs(),
Hmac = rfc_2202_hmac_md5(),
[{hash, {Type, Msgs, Digests}}, {hmac, {Type, Keys, Data, Hmac}} | Config];
group_config(ripemd160 = Type, Config) ->
Msgs = ripemd160_msgs(),
Digests = ripemd160_digests(),
[{hash, {Type, Msgs, Digests}} | Config];
group_config(sha = Type, Config) ->
Msgs = [rfc_4634_test1(), rfc_4634_test2_1()],
Digests = rfc_4634_sha_digests(),
Keys = rfc_2202_sha_keys(),
Data = rfc_2202_msgs(),
Hmac = rfc_2202_hmac_sha(),
[{hash, {Type, Msgs, Digests}}, {hmac, {Type, Keys, Data, Hmac}} | Config];
group_config(sha224 = Type, Config) ->
Msgs = [rfc_4634_test1(), rfc_4634_test2_1()],
Digests = rfc_4634_sha224_digests(),
Keys = rfc_4231_keys(),
Data = rfc_4231_msgs(),
Hmac = rfc4231_hmac_sha224(),
[{hash, {Type, Msgs, Digests}}, {hmac, {Type, Keys, Data, Hmac}} | Config];
group_config(sha256 = Type, Config) ->
Msgs = [rfc_4634_test1(), rfc_4634_test2_1()],
Digests = rfc_4634_sha256_digests(),
Keys = rfc_4231_keys(),
Data = rfc_4231_msgs(),
Hmac = rfc4231_hmac_sha256(),
[{hash, {Type, Msgs, Digests}}, {hmac, {Type, Keys, Data, Hmac}} | Config];
group_config(sha384 = Type, Config) ->
Msgs = [rfc_4634_test1(), rfc_4634_test2()],
Digests = rfc_4634_sha384_digests(),
Keys = rfc_4231_keys(),
Data = rfc_4231_msgs(),
Hmac = rfc4231_hmac_sha384(),
[{hash, {Type, Msgs, Digests}}, {hmac, {Type, Keys, Data, Hmac}} | Config];
group_config(sha512 = Type, Config) ->
Msgs = [rfc_4634_test1(), rfc_4634_test2()],
Digests = rfc_4634_sha512_digests(),
Keys = rfc_4231_keys(),
Data = rfc_4231_msgs(),
Hmac = rfc4231_hmac_sha512(),
[{hash, {Type, Msgs, Digests}}, {hmac, {Type, Keys, Data, Hmac}} | Config];
group_config(rsa = Type, Config) ->
Msg = rsa_plain(),
Public = rsa_public(),
Private = rsa_private(),
PublicS = rsa_public_stronger(),
PrivateS = rsa_private_stronger(),
SignVerify = sign_verify_tests(Type, Msg, Public, Private, PublicS, PrivateS),
MsgPubEnc = <<"7896345786348 Asldi">>,
PubPrivEnc = [{rsa, Public, Private, MsgPubEnc, rsa_pkcs1_padding},
rsa_oaep(),
no_padding()
],
[{sign_verify, SignVerify}, {pub_priv_encrypt, PubPrivEnc} | Config];
group_config(dss = Type, Config) ->
Msg = dss_plain(),
Public = dss_params() ++ [dss_public()],
Private = dss_params() ++ [dss_private()],
SignVerify = [{Type, sha, Public, Private, Msg}],
[{sign_verify, SignVerify} | Config];
group_config(ecdsa = Type, Config) ->
{Private, Public} = ec_key_named(),
Msg = ec_msg(),
SignVerify = [{Type, sha, Public, Private, Msg}],
[{sign_verify, SignVerify} | Config];
group_config(srp, Config) ->
GenerateCompute = [srp3(), srp6(), srp6a()],
[{generate_compute, GenerateCompute} | Config];
group_config(ecdh, Config) ->
Compute = [ecdh()],
[{compute, Compute} | Config];
group_config(dh, Config) ->
GenerateCompute = [dh()],
[{generate_compute, GenerateCompute} | Config];
group_config(des_cbc, Config) ->
Block = des_cbc(),
[{block, Block} | Config];
group_config(des_cfb, Config) ->
Block = des_cfb(),
[{block, Block} | Config];
group_config(des3_cbc, Config) ->
Block = des3_cbc(),
[{block, Block} | Config];
group_config(des3_cbf, Config) ->
Block = des3_cbf(),
[{block, Block} | Config];
group_config(des_ede3, Config) ->
Block = des_ede3(),
[{block, Block} | Config];
group_config(rc2_cbc, Config) ->
Block = rc2_cbc(),
[{block, Block} | Config];
group_config(aes_cbc128, Config) ->
Block = aes_cbc128(),
[{block, Block} | Config];
group_config(aes_cbc256, Config) ->
Block = aes_cbc256(),
[{block, Block} | Config];
group_config(aes_cfb128, Config) ->
Block = aes_cfb128(),
[{block, Block} | Config];
group_config(blowfish_cbc, Config) ->
Block = blowfish_cbc(),
[{block, Block} | Config];
group_config(blowfish_ecb, Config) ->
Block = blowfish_ecb(),
[{block, Block} | Config];
group_config(blowfish_cfb64, Config) ->
Block = blowfish_cfb64(),
[{block, Block} | Config];
group_config(blowfish_ofb64, Config) ->
Block = blowfish_ofb64(),
[{block, Block} | Config];
group_config(rc4, Config) ->
Stream = rc4(),
[{stream, Stream} | Config];
group_config(aes_ctr, Config) ->
Stream = aes_ctr(),
[{stream, Stream} | Config];
group_config(_, Config) ->
Config.
sign_verify_tests(Type, Msg, Public, Private, PublicS, PrivateS) ->
sign_verify_tests(Type, [md5, sha, sha224, sha256], Msg, Public, Private) ++
sign_verify_tests(Type, [sha384, sha512], Msg, PublicS, PrivateS).
sign_verify_tests(Type, Hashs, Msg, Public, Private) ->
lists:foldl(fun(Hash, Acc) ->
case is_supported(Hash) of
true ->
[{Type, Hash, Public, Private, Msg}|Acc];
false ->
Acc
end
end, [], Hashs).
rfc_1321_msgs() ->
[<<"">>,
<<"a">>,
<<"abc">>,
<<"message digest">>,
<<"abcdefghijklmnopqrstuvwxyz">>,
<<"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789">>,
<<"12345678901234567890123456789012345678901234567890123456789012345678901234567890">>
].
rfc_1321_md4_digests() ->
[hexstr2bin("31d6cfe0d16ae931b73c59d7e0c089c0"),
hexstr2bin("bde52cb31de33e46245e05fbdbd6fb24"),
hexstr2bin("a448017aaf21d8525fc10ae87aa6729d"),
hexstr2bin("d9130a8164549fe818874806e1c7014b"),
hexstr2bin("d79e1c308aa5bbcdeea8ed63df412da9"),
hexstr2bin("043f8582f241db351ce627e153e7f0e4"),
hexstr2bin("e33b4ddc9c38f2199c3e7b164fcc0536")].
rfc_1321_md5_digests() ->
[hexstr2bin("d41d8cd98f00b204e9800998ecf8427e"),
hexstr2bin("0cc175b9c0f1b6a831c399e269772661"),
hexstr2bin("900150983cd24fb0d6963f7d28e17f72"),
hexstr2bin("f96b697d7cb7938d525a2f31aaf161d0"),
hexstr2bin("c3fcd3d76192e4007dfb496cca67e13b"),
hexstr2bin("d174ab98d277d9f5a5611c2c9f419d9f"),
hexstr2bin("57edf4a22be3c955ac49da2e2107b67a")].
rfc_4634_test1() ->
<<"abc">>.
rfc_4634_test2_1() ->
<<"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq">>.
rfc_4634_test2_2a() ->
<<"abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmn">>.
rfc_4634_test2_2b() ->
<<"hijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu">>.
rfc_4634_test2() ->
A2 =rfc_4634_test2_2a(),
B2 = rfc_4634_test2_2b(),
<<A2/binary, B2/binary>>.
rfc_4634_sha_digests()->
[hexstr2bin("A9993E364706816ABA3E25717850C26C9CD0D89D"),
hexstr2bin("84983E441C3BD26EBAAE4AA1F95129E5E54670F1")].
rfc_4634_sha224_digests() ->
[hexstr2bin("23097D223405D8228642A477BDA255B32AADBCE4BDA0B3F7E36C9DA7"),
hexstr2bin("75388B16512776CC5DBA5DA1FD890150B0C6455CB4F58B1952522525")].
rfc_4634_sha256_digests() ->
[
hexstr2bin("BA7816BF8F01CFEA4141"
"40DE5DAE2223B00361A396177A9CB410FF61F20015AD"),
hexstr2bin("248D6A61D20638B8"
"E5C026930C3E6039A33CE45964FF2167F6ECEDD419DB06C1")
].
rfc_4634_sha384_digests() ->
[hexstr2bin("CB00753F45A35E8BB5A03D699AC65007272C32AB0EDED1631A8B605A43FF5BED8086072BA1E7CC2358BAECA134C825A7"),
hexstr2bin("09330C33F71147E83D192FC782CD1B4753111B173B3B05D22FA08086E3B0F712FCC7C71A557E2DB966C3E9FA91746039")
].
rfc_4634_sha512_digests() ->
[hexstr2bin("DDAF35A193617ABACC417349AE20413112E6FA4E89A97EA2"
"0A9EEEE64B55D39A2192992A274FC1A836BA3C23A3FEEBBD"
"454D4423643CE80E2A9AC94FA54CA49F"),
hexstr2bin("8E959B75DAE313DA8CF4F72814FC143F8F7779C6EB9F7FA17299AEADB6889018501D289E4900F7E4331B99DEC4B5433AC7D329EEB6DD26545E96E55B874BE909")].
ripemd160_msgs() ->
[<<"">>,
<<"a">>,
<<"abc">>,
<<"message digest">>,
<<"abcdefghijklmnopqrstuvwxyz">>,
<<"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq">>,
<<"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789">>
].
ripemd160_digests() ->
[hexstr2bin("9c1185a5c5e9fc54612808977ee8f548b2258d31"),
hexstr2bin("0bdc9d2d256b3ee9daae347be6f4dc835a467ffe"),
hexstr2bin("8eb208f7e05d987a9b044a8e98c6b087f15a0bfc"),
hexstr2bin("5d0689ef49d2fae572b881b123a85ffa21595f36"),
hexstr2bin("f71c27109c692c1b56bbdceb5b9d2865b3708dbc"),
hexstr2bin("12a053384a9c0c88e405a06c27dcf49ada62eb2b"),
hexstr2bin("b0e20b6e3116640286ed3a87a5713079b21f5189")
].
ripemd160_incr_msgs() ->
[<<"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefg">>,<<"hijklmnopqrstuvwxyz0123456789">>].
ripemd160_incr_digest() ->
hexstr2bin("b0e20b6e3116640286ed3a87a5713079b21f5189").
rfc_2202_md5_keys() ->
[binary:copy(<<16#0b>>, 16),
<<"Jefe">>,
binary:copy(<<16#aa>>, 16),
list_to_binary(lists:seq(1, 16#19)),
binary:copy(<<16#0c>>, 16),
binary:copy(<<16#aa>>, 80),
binary:copy(<<16#aa>>, 80)].
rfc_2202_sha_keys() ->
[binary:copy(<<16#0b>>, 20),
<<"Jefe">>,
binary:copy(<<16#aa>>, 20),
list_to_binary(lists:seq(1, 16#19)),
binary:copy(<<16#0c>>, 20),
binary:copy(<<16#aa>>, 80),
binary:copy(<<16#aa>>, 80)].
rfc_2202_msgs()->
[<<"Hi There">>,
<<"what do ya want for nothing?">>,
binary:copy(<<16#dd>>, 50),
binary:copy(<<16#cd>>, 50),
<<"Test With Truncation">>,
<<"Test Using Larger Than Block-Size Key - Hash Key First">>,
<<"Test Using Larger Than Block-Size Key and Larger Than One Block-Size Data">>
].
hmac_key(md5) ->
[<<"A fine speach">>, <<"by a fine man!">>];
hmac_key(_) ->
hexstr2bin("00010203101112132021222330313233"
"04050607141516172425262734353637"
"08090a0b18191a1b28292a2b38393a3b"
"0c0d0e0f1c1d1e1f2c2d2e2f3c3d3e3f").
hmac_inc(_) ->
[<<"Sampl">>, <<"e #1">>].
rfc_2202_hmac_md5() ->
[
hexstr2bin("9294727a3638bb1c13f48ef8158bfc9d"),
hexstr2bin("750c783e6ab0b503eaa86e310a5db738"),
hexstr2bin("56be34521d144c88dbb8c733f0e8b3f6"),
hexstr2bin("697eaf0aca3a3aea3a75164746ffaa79"),
hexstr2bin("56461ef2342edc00f9bab995690efd4c"),
hexstr2bin("6b1ab7fe4bd7bf8f0b62e6ce61b9d0cd"),
hexstr2bin("6f630fad67cda0ee1fb1f562db3aa53e")
].
rfc_2202_hmac_sha() ->
[
hexstr2bin("b617318655057264e28bc0b6fb378c8ef146be00"),
hexstr2bin("effcdf6ae5eb2fa2d27416d5f184df9c259a7c79"),
hexstr2bin("125d7342b9ac11cd91a39af48aa17b4f63f175d3"),
hexstr2bin("4c9007f4026250c6bc8414f9bf50c86c2d7235da"),
hexstr2bin("4c1a03424b55e07fe7f27be1d58bb9324a9a5a04"),
hexstr2bin("aa4ae5e15272d00e95705637ce8a3b55ed402112"),
hexstr2bin("e8e99d0f45237d786d6bbaa7965c7808bbff1a91")
].
rfc_4231_keys() ->
[binary:copy(<<16#0b>>, 20),
<<"Jefe">>,
binary:copy(<<16#aa>>, 20),
list_to_binary(lists:seq(1, 16#19)),
binary:copy(<<16#0c>>, 20),
binary:copy(<<16#aa>>, 131),
binary:copy(<<16#aa>>, 131)
].
rfc_4231_msgs() ->
[<<"Hi There">>,
<<"what do ya want for nothing?">>,
binary:copy(<<16#dd>>, 50),
binary:copy(<<16#cd>>, 50),
<<"Test With Truncation">>,
<<"Test Using Larger Than Block-Size Key - Hash Key First">>,
<<"This is a test using a larger than block-size key and a larger t",
"han block-size data. The key needs to be hashed before being use",
"d by the HMAC algorithm.">>
].
rfc4231_hmac_sha224() ->
[hexstr2bin("896fb1128abbdf196832107cd49df33f"
"47b4b1169912ba4f53684b22"),
hexstr2bin("a30e01098bc6dbbf45690f3a7e9e6d0f"
"8bbea2a39e6148008fd05e44"),
hexstr2bin("7fb3cb3588c6c1f6ffa9694d7d6ad264"
"9365b0c1f65d69d1ec8333ea"),
hexstr2bin("6c11506874013cac6a2abc1bb382627c"
"ec6a90d86efc012de7afec5a"),
hexstr2bin("0e2aea68a90c8d37c988bcdb9fca6fa8"),
hexstr2bin("95e9a0db962095adaebe9b2d6f0dbce2"
"d499f112f2d2b7273fa6870e"),
hexstr2bin("3a854166ac5d9f023f54d517d0b39dbd"
"946770db9c2b95c9f6f565d1")].
rfc4231_hmac_sha256() ->
[hexstr2bin("b0344c61d8db38535ca8afceaf0bf12b"
"881dc200c9833da726e9376c2e32cff7"),
hexstr2bin("5bdcc146bf60754e6a042426089575c7"
"5a003f089d2739839dec58b964ec3843"),
hexstr2bin("773ea91e36800e46854db8ebd09181a7"
"2959098b3ef8c122d9635514ced565fe"),
hexstr2bin("82558a389a443c0ea4cc819899f2083a"
"85f0faa3e578f8077a2e3ff46729665b"),
hexstr2bin("a3b6167473100ee06e0c796c2955552b"),
hexstr2bin("60e431591ee0b67f0d8a26aacbf5b77f"
"8e0bc6213728c5140546040f0ee37f54"),
hexstr2bin("9b09ffa71b942fcb27635fbcd5b0e944"
"bfdc63644f0713938a7f51535c3a35e2")].
rfc4231_hmac_sha384() ->
[hexstr2bin("afd03944d84895626b0825f4ab46907f"
"15f9dadbe4101ec682aa034c7cebc59c"
"faea9ea9076ede7f4af152e8b2fa9cb6"),
hexstr2bin("af45d2e376484031617f78d2b58a6b1b"
"9c7ef464f5a01b47e42ec3736322445e"
"8e2240ca5e69e2c78b3239ecfab21649"),
hexstr2bin("88062608d3e6ad8a0aa2ace014c8a86f"
"0aa635d947ac9febe83ef4e55966144b"
"2a5ab39dc13814b94e3ab6e101a34f27"),
hexstr2bin("3e8a69b7783c25851933ab6290af6ca7"
"7a9981480850009cc5577c6e1f573b4e"
"6801dd23c4a7d679ccf8a386c674cffb"),
hexstr2bin("3abf34c3503b2a23a46efc619baef897"),
hexstr2bin("4ece084485813e9088d2c63a041bc5b4"
"4f9ef1012a2b588f3cd11f05033ac4c6"
"0c2ef6ab4030fe8296248df163f44952"),
hexstr2bin("6617178e941f020d351e2f254e8fd32c"
"602420feb0b8fb9adccebb82461e99c5"
"a678cc31e799176d3860e6110c46523e")].
rfc4231_hmac_sha512() ->
[hexstr2bin("87aa7cdea5ef619d4ff0b4241a1d6cb0"
"2379f4e2ce4ec2787ad0b30545e17cde"
"daa833b7d6b8a702038b274eaea3f4e4"
"be9d914eeb61f1702e696c203a126854"),
hexstr2bin("164b7a7bfcf819e2e395fbe73b56e0a3"
"87bd64222e831fd610270cd7ea250554"
"9758bf75c05a994a6d034f65f8f0e6fd"
"caeab1a34d4a6b4b636e070a38bce737"),
hexstr2bin("fa73b0089d56a284efb0f0756c890be9"
"b1b5dbdd8ee81a3655f83e33b2279d39"
"bf3e848279a722c806b485a47e67c807"
"b946a337bee8942674278859e13292fb"),
hexstr2bin("b0ba465637458c6990e5a8c5f61d4af7"
"e576d97ff94b872de76f8050361ee3db"
"a91ca5c11aa25eb4d679275cc5788063"
"a5f19741120c4f2de2adebeb10a298dd"),
hexstr2bin("415fad6271580a531d4179bc891d87a6"),
hexstr2bin("80b24263c7c1a3ebb71493c1dd7be8b4"
"9b46d1f41b4aeec1121b013783f8f352"
"6b56d037e05f2598bd0fd2215d6a1e52"
"95e64f73f63f0aec8b915a985d786598"),
hexstr2bin("e37b6a775dc87dbaa4dfa9f96e5e3ffd"
"debd71f8867289865df5a32d20cdc944"
"b6022cac3c4982b10d5eeb55c3e4de15"
"134676fb6de0446065c97440fa8c6a58")].
des_cbc() ->
[{des_cbc,
hexstr2bin("0123456789abcdef"),
hexstr2bin("1234567890abcdef"),
<<"Now is the time for all ">> }].
des_cfb() ->
[{des_cfb,
hexstr2bin("0123456789abcdef"),
hexstr2bin("1234567890abcdef"),
<<"Now is the">>}].
des3_cbc() ->
[{des3_cbc,
[hexstr2bin("0123456789abcdef"),
hexstr2bin("fedcba9876543210"),
hexstr2bin("0f2d4b6987a5c3e1")],
hexstr2bin("1234567890abcdef"),
<<"Now is the time for all ">>
}].
des_ede3() ->
[{des_ede3,
[hexstr2bin("8000000000000000"),
hexstr2bin("4000000000000000"),
hexstr2bin("2000000000000000")],
hexstr2bin("7AD16FFB79C45926"),
hexstr2bin("0000000000000000")
}].
des3_cbf() ->
[{des3_cbf,
[hexstr2bin("0123456789abcdef"),
hexstr2bin("fedcba9876543210"),
hexstr2bin("0f2d4b6987a5c3e1")],
hexstr2bin("1234567890abcdef"),
<<"Now is the time for all ">>
}].
rc2_cbc() ->
[{rc2_cbc,
<<146,210,160,124,215,227,153,239,227,17,222,140,3,93,27,191>>,
<<72,91,135,182,25,42,35,210>>,
<<36,245,206,158,168,230,58,69,148,137,32,192,250,41,237,181,181,251, 192,2,175,135,177,171,57,30,111,117,159,149,15,28,88,158,28,81,28,115, 85,219,241,82,117,222,91,85,73,117,164,25,182,52,191,64,123,57,26,19, 211,27,253,31,194,219,231,104,247,240,172,130,119,21,225,154,101,247, 32,216,42,216,133,169,78,22,97,27,227,26,196,224,172,168,17,9,148,55, 203,91,252,40,61,226,236,221,215,160,78,63,13,181,68,57,196,241,185, 207, 116,129,152,237,60,139,247,153,27,146,161,246,222,98,185,222,152, 187,135, 236,86,34,7,110,91,230,173,34,160,242,202,222,121,127,181,140, 101,203,195, 190,88,250,86,147,127,87,72,126,171,16,71,47,110,248,88, 14,29,143,161,152, 129,236,148,22,152,186,208,119,70,8,174,193,203,100, 193,203,200,117,102,242, 134,142,96,125,135,200,217,190,76,117,50,70, 209,186,101,241,200,91,40,193,54, 90,195,38,47,59,197,38,234,86,223,16, 51,253,204,129,20,171,66,21,241,26,135,216, 196,114,110,91,15,53,40, 164,201,136,113,95,247,51,181,208,241,68,168,98,151,36, 155,72,24,57, 42,191,14,125,204,10,167,214,233,138,115,125,234,121,134,227,26,247, 77,200,117,110,117,111,168,156,206,67,159,149,189,173,150,193,91,199, 216,153,22, 189,137,185,89,160,13,131,132,58,109,28,110,246,252,251,14, 232,91,38,52,29,101,188,69,123,50,0,130,178,93,73,239,118,7,77,35,59, 253,10,159,45,86,142,37,78,232,48>>
}].
aes_cbc128() ->
[{aes_cbc128,
hexstr2bin("2b7e151628aed2a6abf7158809cf4f3c"),
hexstr2bin("000102030405060708090a0b0c0d0e0f"),
hexstr2bin("6bc1bee22e409f96e93d7e117393172a")},
{aes_cbc128,
hexstr2bin("2b7e151628aed2a6abf7158809cf4f3c"),
hexstr2bin("7649ABAC8119B246CEE98E9B12E9197D"),
hexstr2bin("ae2d8a571e03ac9c9eb76fac45af8e51")},
{aes_cbc128,
hexstr2bin("2b7e151628aed2a6abf7158809cf4f3c"),
hexstr2bin("5086CB9B507219EE95DB113A917678B2"),
hexstr2bin("30c81c46a35ce411e5fbc1191a0a52ef")},
{aes_cbc128,
hexstr2bin("2b7e151628aed2a6abf7158809cf4f3c"),
hexstr2bin("73BED6B8E3C1743B7116E69E22229516"),
hexstr2bin("f69f2445df4f9b17ad2b417be66c3710")}
].
aes_cbc256() ->
[{aes_cbc256,
hexstr2bin("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"),
hexstr2bin("000102030405060708090A0B0C0D0E0F"),
hexstr2bin("6bc1bee22e409f96e93d7e117393172a")},
{aes_cbc256,
hexstr2bin("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"),
hexstr2bin("F58C4C04D6E5F1BA779EABFB5F7BFBD6"),
hexstr2bin("ae2d8a571e03ac9c9eb76fac45af8e51")},
{aes_cbc256,
hexstr2bin("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"),
hexstr2bin("9CFC4E967EDB808D679F777BC6702C7D"),
hexstr2bin("30c81c46a35ce411e5fbc1191a0a52ef")},
{aes_cbc256,
hexstr2bin("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"),
hexstr2bin("39F23369A9D9BACFA530E26304231461"),
hexstr2bin("f69f2445df4f9b17ad2b417be66c3710")}
].
aes_cfb128() ->
[{aes_cfb128,
hexstr2bin("2b7e151628aed2a6abf7158809cf4f3c"),
hexstr2bin("000102030405060708090a0b0c0d0e0f"),
hexstr2bin("6bc1bee22e409f96e93d7e117393172a")},
{aes_cfb128,
hexstr2bin("2b7e151628aed2a6abf7158809cf4f3c"),
hexstr2bin("3B3FD92EB72DAD20333449F8E83CFB4A"),
hexstr2bin("ae2d8a571e03ac9c9eb76fac45af8e51")},
{aes_cfb128,
hexstr2bin("2b7e151628aed2a6abf7158809cf4f3c"),
hexstr2bin("C8A64537A0B3A93FCDE3CDAD9F1CE58B"),
hexstr2bin("30c81c46a35ce411e5fbc1191a0a52ef")},
{aes_cfb128,
hexstr2bin("2b7e151628aed2a6abf7158809cf4f3c"),
hexstr2bin("26751F67A3CBB140B1808CF187A4F4DF"),
hexstr2bin("f69f2445df4f9b17ad2b417be66c3710")}
].
blowfish_cbc() ->
[{blowfish_cbc,
hexstr2bin("0123456789ABCDEFF0E1D2C3B4A59687"),
hexstr2bin("FEDCBA9876543210"),
hexstr2bin("37363534333231204E6F77206973207468652074696D6520666F722000000000")
}].
blowfish_ecb() ->
[
{blowfish_ecb,
hexstr2bin("0000000000000000"),
hexstr2bin("0000000000000000")},
{blowfish_ecb,
hexstr2bin("FFFFFFFFFFFFFFFF"),
hexstr2bin("FFFFFFFFFFFFFFFF")},
{blowfish_ecb,
hexstr2bin("3000000000000000"),
hexstr2bin("1000000000000001")},
{blowfish_ecb,
hexstr2bin("1111111111111111"),
hexstr2bin("1111111111111111")},
{blowfish_ecb,
hexstr2bin("0123456789ABCDEF"),
hexstr2bin("1111111111111111")},
{blowfish_ecb,
hexstr2bin("0000000000000000"),
hexstr2bin("0000000000000000")},
{blowfish_ecb,
hexstr2bin("FEDCBA9876543210"),
hexstr2bin("0123456789ABCDEF")},
{blowfish_ecb,
hexstr2bin("7CA110454A1A6E57"),
hexstr2bin("01A1D6D039776742")},
{blowfish_ecb,
hexstr2bin("0131D9619DC1376E"),
hexstr2bin("5CD54CA83DEF57DA")},
{blowfish_ecb,
hexstr2bin("07A1133E4A0B2686"),
hexstr2bin("0248D43806F67172")},
{blowfish_ecb,
hexstr2bin("3849674C2602319E"),
hexstr2bin("51454B582DDF440A")},
{blowfish_ecb,
hexstr2bin("04B915BA43FEB5B6"),
hexstr2bin("42FD443059577FA2")},
{blowfish_ecb,
hexstr2bin("0113B970FD34F2CE"),
hexstr2bin("059B5E0851CF143A")},
{blowfish_ecb,
hexstr2bin("0170F175468FB5E6"),
hexstr2bin("0756D8E0774761D2")},
{blowfish_ecb,
hexstr2bin("43297FAD38E373FE"),
hexstr2bin("762514B829BF486A")},
{blowfish_ecb,
hexstr2bin("07A7137045DA2A16"),
hexstr2bin("3BDD119049372802")},
{blowfish_ecb,
hexstr2bin("04689104C2FD3B2F"),
hexstr2bin("26955F6835AF609A")},
{blowfish_ecb,
hexstr2bin("37D06BB516CB7546"),
hexstr2bin("164D5E404F275232")},
{blowfish_ecb,
hexstr2bin("1F08260D1AC2465E"),
hexstr2bin("6B056E18759F5CCA")},
{blowfish_ecb,
hexstr2bin("584023641ABA6176"),
hexstr2bin("004BD6EF09176062")},
{blowfish_ecb,
hexstr2bin("025816164629B007"),
hexstr2bin("480D39006EE762F2")},
{blowfish_ecb,
hexstr2bin("49793EBC79B3258F"),
hexstr2bin("437540C8698F3CFA")},
{blowfish_ecb,
hexstr2bin("018310DC409B26D6"),
hexstr2bin("1D9D5C5018F728C2")},
{blowfish_ecb,
hexstr2bin("1C587F1C13924FEF"),
hexstr2bin("305532286D6F295A")},
{blowfish_ecb,
hexstr2bin("0101010101010101"),
hexstr2bin("0123456789ABCDEF")},
{blowfish_ecb,
hexstr2bin("1F1F1F1F0E0E0E0E"),
hexstr2bin("0123456789ABCDEF")},
{blowfish_ecb,
hexstr2bin("E0FEE0FEF1FEF1FE"),
hexstr2bin("0123456789ABCDEF")},
{blowfish_ecb,
hexstr2bin("0000000000000000"),
hexstr2bin("FFFFFFFFFFFFFFFF")},
{blowfish_ecb,
hexstr2bin("FFFFFFFFFFFFFFFF"),
hexstr2bin("0000000000000000")},
{blowfish_ecb,
hexstr2bin("0123456789ABCDEF"),
hexstr2bin("0000000000000000")},
{blowfish_ecb,
hexstr2bin("FEDCBA9876543210"),
hexstr2bin("FFFFFFFFFFFFFFFF")}
].
blowfish_cfb64() ->
[{blowfish_cfb64,
hexstr2bin("0123456789ABCDEFF0E1D2C3B4A59687"),
hexstr2bin("FEDCBA9876543210"),
hexstr2bin("37363534333231204E6F77206973207468652074696D6520666F722000")
}].
blowfish_ofb64() ->
[{blowfish_ofb64,
hexstr2bin("0123456789ABCDEFF0E1D2C3B4A59687"),
hexstr2bin("FEDCBA9876543210"),
hexstr2bin("37363534333231204E6F77206973207468652074696D6520666F722000")
}].
rc4() ->
[{rc4, <<"apaapa">>, <<"Yo baby yo">>},
{rc4, <<"apaapa">>, list_to_binary(lists:seq(0, 255))}
].
aes_ctr() ->
[ %% F.5.3 CTR-AES192.Encrypt
{aes_ctr, hexstr2bin("2b7e151628aed2a6abf7158809cf4f3c"),
hexstr2bin("f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff"),
hexstr2bin("6bc1bee22e409f96e93d7e117393172a")},
{aes_ctr, hexstr2bin("2b7e151628aed2a6abf7158809cf4f3c"),
hexstr2bin("f0f1f2f3f4f5f6f7f8f9fafbfcfdff00"),
hexstr2bin("ae2d8a571e03ac9c9eb76fac45af8e51")},
{aes_ctr, hexstr2bin("2b7e151628aed2a6abf7158809cf4f3c"),
hexstr2bin("f0f1f2f3f4f5f6f7f8f9fafbfcfdff01"),
hexstr2bin("30c81c46a35ce411e5fbc1191a0a52ef") },
{aes_ctr, hexstr2bin("2b7e151628aed2a6abf7158809cf4f3c"),
hexstr2bin("f0f1f2f3f4f5f6f7f8f9fafbfcfdff02"),
hexstr2bin("f69f2445df4f9b17ad2b417be66c3710")},
%% F.5.3 CTR-AES192.Encrypt
{aes_ctr, hexstr2bin("8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b"),
hexstr2bin("f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff"),
hexstr2bin("6bc1bee22e409f96e93d7e117393172a")},
{aes_ctr, hexstr2bin("8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b"),
hexstr2bin("f0f1f2f3f4f5f6f7f8f9fafbfcfdff00"),
hexstr2bin("ae2d8a571e03ac9c9eb76fac45af8e51")},
{aes_ctr, hexstr2bin("8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b"),
hexstr2bin("f0f1f2f3f4f5f6f7f8f9fafbfcfdff01"),
hexstr2bin("30c81c46a35ce411e5fbc1191a0a52ef")},
{aes_ctr, hexstr2bin("8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b"),
hexstr2bin("f0f1f2f3f4f5f6f7f8f9fafbfcfdff02"),
hexstr2bin("f69f2445df4f9b17ad2b417be66c3710")},
%% F.5.5 CTR-AES256.Encrypt
{aes_ctr, hexstr2bin("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"),
hexstr2bin("f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff"),
hexstr2bin("6bc1bee22e409f96e93d7e117393172a")},
{aes_ctr, hexstr2bin("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"),
hexstr2bin("f0f1f2f3f4f5f6f7f8f9fafbfcfdff00"),
hexstr2bin("ae2d8a571e03ac9c9eb76fac45af8e51")},
{aes_ctr, hexstr2bin("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"),
hexstr2bin("f0f1f2f3f4f5f6f7f8f9fafbfcfdff01"),
hexstr2bin("30c81c46a35ce411e5fbc1191a0a52ef")},
{aes_ctr, hexstr2bin("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"),
hexstr2bin("f0f1f2f3f4f5f6f7f8f9fafbfcfdff02"),
hexstr2bin("f69f2445df4f9b17ad2b417be66c3710")}
].
rsa_plain() ->
<<"7896345786348756234 Hejsan Svejsan, erlang crypto debugger"
"09812312908312378623487263487623412039812 huagasd">>.
rsa_public() ->
[65537, 7919488123861148172698919999061127847747888703039837999377650217570191053151807772962118671509138346758471459464133273114654252861270845708312601272799123].
rsa_private() ->
rsa_public() ++ [7531712708607620783801185371644749935066152052780368689827275932079815492940396744378735701395659435842364793962992309884847527234216715366607660219930945].
rsa_public_stronger() ->
[65537, 24629450921918866883077380602720734920775458960049554761386137065662137652635369332143446151320538248280934442179850504891395344346514465469955766163141133564033962851182759993807898821114734943339732032639891483186089941567854227407119560631150779000222837755424893038740314247760600374970909894211201220612920040986106639419467243909950276018045907029941478599124238353052062083560294570722081552510960894164859765695309596889747541376908786225647625736062865138957717982693312699025417086612046330464651009693307624955796202070510577399561730651967517158452930742355327167632521808183383868100102455048819375344881].
rsa_private_stronger() ->
rsa_public_stronger() ++ [13565232776562604620467234237694854016819673873109064019820773052201665024482754648718278717031083946624786145611240731564761987114634269887293030432042088547345315212418830656522115993209293567218379960177754901461542373481136856927955012596579314262051109321754382091434920473734937991286600905464814063189230779981494358415076362038786197620360127262110530926733754185204773610295221669711309000953136320804528874719105049753061737780710448207922456570922652651354760939379096788728229638142403068102990416717272880560951246813789730402978652924934794503277969128609831043469924881848849409122972426787999886557185].
dss_plain() ->
rsa_plain().
dss_public() ->
25854665488880835237281628794585130313500176551981812527054397586638455298000483144002221850980183404910190346416063318160497344811383498859129095184158800144312512447497510551471331451396405348497845813002058423110442376886564659959543650802132345311573634832461635601376738282831340827591903548964194832978.
dss_private() ->
441502407453038284293378221372000880210588566361.
dss_params() ->
[109799869232806890760655301608454668257695818999841877165019612946154359052535682480084145133201304812979481136659521529774182959764860329095546511521488413513097576425638476458000255392402120367876345280670101492199681798674053929238558140260669578407351853803102625390950534052428162468100618240968893110797,
1349199015905534965792122312016505075413456283393,
18320614775012672475365915366944922415598782131828709277168615511695849821411624805195787607930033958243224786899641459701930253094446221381818858674389863050420226114787005820357372837321561754462061849169568607689530279303056075793886577588606958623645901271866346406773590024901668622321064384483571751669].
ec_key_named() ->
{D2_pub, D2_priv} = crypto:generate_key(ecdh, sect113r2),
{[D2_priv, sect113r2], [D2_pub, sect113r2]}.
ec_msg() ->
<<99,234,6,64,190,237,201,99,80,248,58,40,70,45,149,218,5,246,242,63>>.
srp3() ->
Username = <<"alice">>,
Password = <<"password123">>,
Salt = hexstr2bin("2857827A19266A1F2BC6"),
Prime = hexstr2bin("EEAF0AB9ADB38DD69C33F80AFA8FC5E86072618775FF3C0B9EA2314C"
"9C256576D674DF7496EA81D3383B4813D692C6E0E0D5D8E250B98BE4"
"8E495C1D6089DAD15DC7D7B46154D6B6CE8EF4AD69B15D4982559B29"
"7BCF1885C529F566660E57EC68EDBC3C05726CC02FD4CBF4976EAA9A"
"FD5138FE8376435B9FC61D2FC0EB06E3"),
Generator = <<2>>,
Version = '3',
Scrambler = hexstr2bin("02E2476A"),
%% X = hexstr2bin("96E54AB0CD4C5123EDCFA4A1502918AAD3C9E2A8"),
Verifier = hexstr2bin("96EB5F13621D911AA1CA405DE9C64217D4108EEEECAFFE500034FE0E"
"C031E42C8714667C161BCE0E7996F7DDE1B63824C130D2D7286C08C0"
"49758420735961347112AE102A3F23B3F687F8FEE0DF2BFAF933C608"
"D6FE5B5EEE3116FE54016E065BF8E8C9FDBBC08719231AC215149140"
"519E8FDD9AA4F410C28A58AF42974D2D"),
ClientPrivate = hexstr2bin("6411DE75538BED8170677D577D0608F39112BC95B503C447EB6AC945"
"49C75C7B"),
ServerPrivate = hexstr2bin("85E44A6F694DBE676145DB245A045CD37C99F05C562C7840A31F270D"
"9AADCF8B"),
ClientPublic = hexstr2bin("B22B1FFA2244B8CB94F3A9080F419CAEAB0DBA93EA1965B5E84587EE"
"55C79E7A118865DC59B9D0353362C2A8261E7C1B0D221A0E233C2AD1"
"640DACBB8664CBC9733EAC392DA7800142860380C3FC573C3C064329"
"CF54063FD114C7210E9CB3A611EA8002B1844B698F930D95D143899B"
"948A090E0C25938E5F84067D1883DC63"),
ServerPublic = hexstr2bin("93A8C4D8B7F7395ADCFD4ABA37B015124513D3F37B3E85EB23064BE5"
"F53C0AE32FFB9D8C0AA0DCFFA74D632DD67DEBB5C35AAE9812286CC8"
"C43CC176ECBC6D3F447594D9554E995B2509127BF88FADDDA4982D03"
"8EC3001320712D3B1269308CE70F319B2295FA57674F03A2D993CFB1"
"F84C35B7D0C012FA73CD4C8F7D5A71C7"),
SessionKey = hexstr2bin("C29A986C4D521BBC66428ED11D994CD7431574A6184B83CDCC345092"
"791E75748A1D38CAC4BD14760F0D2694B711236419240FF2F172454C"
"46ABF4FF39498DAFDD2C82924F7D7BD76CDFCE688C77D93F18A65409"
"9176A9192615DC0277AE7C12F1F6A7F6563FCA11675D809AF578BDE5"
"2B51E05D440B63099A017A0B45044801"),
UserPassHash = crypto:hash(sha, [Salt, crypto:hash(sha, [Username, <<$:>>, Password])]),
Verifier = crypto:mod_pow(Generator, UserPassHash, Prime),
ClientPublic = crypto:mod_pow(Generator, ClientPrivate, Prime),
srp(ClientPrivate, Generator, Prime, Version, Verifier, ServerPublic, ServerPrivate, UserPassHash, Scrambler, SessionKey).
srp6() ->
Username = <<"alice">>,
Password = <<"password123">>,
Salt = hexstr2bin("2857827A19266A1F2BC6"),
Prime = hexstr2bin("EEAF0AB9ADB38DD69C33F80AFA8FC5E86072618775FF3C0B9EA2314C"
"9C256576D674DF7496EA81D3383B4813D692C6E0E0D5D8E250B98BE4"
"8E495C1D6089DAD15DC7D7B46154D6B6CE8EF4AD69B15D4982559B29"
"7BCF1885C529F566660E57EC68EDBC3C05726CC02FD4CBF4976EAA9A"
"FD5138FE8376435B9FC61D2FC0EB06E3"),
Generator = <<2>>,
Version = '6',
Scrambler = hexstr2bin("0A2534C0BF52A0DA9001EEC62CF2A546AB0908A7"),
Verifier = hexstr2bin("96EB5F13621D911AA1CA405DE9C64217D4108EEEECAFFE500034FE0E"
"C031E42C8714667C161BCE0E7996F7DDE1B63824C130D2D7286C08C0"
"49758420735961347112AE102A3F23B3F687F8FEE0DF2BFAF933C608"
"D6FE5B5EEE3116FE54016E065BF8E8C9FDBBC08719231AC215149140"
"519E8FDD9AA4F410C28A58AF42974D2D"),
ClientPrivate = hexstr2bin("6411DE75538BED8170677D577D0608F39112BC95B503C447EB6AC945"
"49C75C7B"),
ServerPrivate = hexstr2bin("85E44A6F694DBE676145DB245A045CD37C99F05C562C7840A31F270D"
"9AADCF8B"),
ClientPublic = hexstr2bin("B22B1FFA2244B8CB94F3A9080F419CAEAB0DBA93EA1965B5E84587EE"
"55C79E7A118865DC59B9D0353362C2A8261E7C1B0D221A0E233C2AD1"
"640DACBB8664CBC9733EAC392DA7800142860380C3FC573C3C064329"
"CF54063FD114C7210E9CB3A611EA8002B1844B698F930D95D143899B"
"948A090E0C25938E5F84067D1883DC63"),
ServerPublic = hexstr2bin("D2D07845CE7ECDB9845DD36B10ACD3598CC29049DE9F467F84CE16B6"
"D97A6DC567AF8B0F9FEDF74962400AD5C357951E64E67B641246F264"
"C8DE6D9A72E554D6C8D3194548780A0C438A0FCC509CA88A14AA1DEB"
"C0F09E4B37A965D1545DB4AD361346F3189B0EA569C06D326C4E4797"
"9E381C748293B7C0591BE0BE419E053E"),
SessionKey = hexstr2bin("19D22C19612874EBF1F2581F8EFCFDC44C6FDA3B87B0A73823D7E962"
"554295D4E48D3A336523ADBDDD0EC8FB0F02687109E97E01C17C93CC"
"7216F9CD8A4AC39F0429857D8D1023066614BDFCBCB89F59A0FEB81C"
"72E992AAD89095A84B6A5FADA152369AB1E350A03693BEF044DF3EDF"
"0C34741F4696C30E9F675D09F58ACBEB"),
UserPassHash = crypto:hash(sha, [Salt, crypto:hash(sha, [Username, <<$:>>, Password])]),
Verifier = crypto:mod_pow(Generator, UserPassHash, Prime),
ClientPublic = crypto:mod_pow(Generator, ClientPrivate, Prime),
srp(ClientPrivate, Generator, Prime, Version, Verifier, ServerPublic, ServerPrivate, UserPassHash, Scrambler, SessionKey).
srp6a() ->
Username = <<"alice">>,
Password = <<"password123">>,
Salt = hexstr2bin("BEB25379D1A8581EB5A727673A2441EE"),
Prime = hexstr2bin("EEAF0AB9ADB38DD69C33F80AFA8FC5E86072618775FF3C0B9EA2314C"
"9C256576D674DF7496EA81D3383B4813D692C6E0E0D5D8E250B98BE4"
"8E495C1D6089DAD15DC7D7B46154D6B6CE8EF4AD69B15D4982559B29"
"7BCF1885C529F566660E57EC68EDBC3C05726CC02FD4CBF4976EAA9A"
"FD5138FE8376435B9FC61D2FC0EB06E3"),
Generator = <<2>>,
Version = '6a',
Scrambler = hexstr2bin("CE38B9593487DA98554ED47D70A7AE5F462EF019"),
Verifier = hexstr2bin("7E273DE8696FFC4F4E337D05B4B375BEB0DDE1569E8FA00A9886D812"
"9BADA1F1822223CA1A605B530E379BA4729FDC59F105B4787E5186F5"
"C671085A1447B52A48CF1970B4FB6F8400BBF4CEBFBB168152E08AB5"
"EA53D15C1AFF87B2B9DA6E04E058AD51CC72BFC9033B564E26480D78"
"E955A5E29E7AB245DB2BE315E2099AFB"),
ClientPrivate = hexstr2bin("60975527035CF2AD1989806F0407210BC81EDC04E2762A56AFD529DD"
"DA2D4393"),
ServerPrivate = hexstr2bin("E487CB59D31AC550471E81F00F6928E01DDA08E974A004F49E61F5D1"
"05284D20"),
ClientPublic = hexstr2bin("61D5E490F6F1B79547B0704C436F523DD0E560F0C64115BB72557EC4"
"4352E8903211C04692272D8B2D1A5358A2CF1B6E0BFCF99F921530EC"
"8E39356179EAE45E42BA92AEACED825171E1E8B9AF6D9C03E1327F44"
"BE087EF06530E69F66615261EEF54073CA11CF5858F0EDFDFE15EFEA"
"B349EF5D76988A3672FAC47B0769447B"),
ServerPublic = hexstr2bin("BD0C61512C692C0CB6D041FA01BB152D4916A1E77AF46AE105393011"
"BAF38964DC46A0670DD125B95A981652236F99D9B681CBF87837EC99"
"6C6DA04453728610D0C6DDB58B318885D7D82C7F8DEB75CE7BD4FBAA"
"37089E6F9C6059F388838E7A00030B331EB76840910440B1B27AAEAE"
"EB4012B7D7665238A8E3FB004B117B58"),
SessionKey = hexstr2bin("B0DC82BABCF30674AE450C0287745E7990A3381F63B387AAF271A10D"
"233861E359B48220F7C4693C9AE12B0A6F67809F0876E2D013800D6C"
"41BB59B6D5979B5C00A172B4A2A5903A0BDCAF8A709585EB2AFAFA8F"
"3499B200210DCC1F10EB33943CD67FC88A2F39A4BE5BEC4EC0A3212D"
"C346D7E474B29EDE8A469FFECA686E5A"),
UserPassHash = crypto:hash(sha, [Salt, crypto:hash(sha, [Username, <<$:>>, Password])]),
Verifier = crypto:mod_pow(Generator, UserPassHash, Prime),
ClientPublic = crypto:mod_pow(Generator, ClientPrivate, Prime),
srp(ClientPrivate, Generator, Prime, Version, Verifier, ServerPublic, ServerPrivate, UserPassHash, Scrambler, SessionKey).
srp(ClientPrivate, Generator, Prime, Version, Verifier, ServerPublic, ServerPrivate, UserPassHash, Scrambler, SessionKey)->
{srp, ClientPrivate,
{user, [Generator, Prime, Version]}, {user, [UserPassHash, Prime, Generator, Version, Scrambler]},
ServerPublic, ServerPrivate, {host, [Verifier, Generator, Prime, Version]},
{host, [Verifier, Prime, Version, Scrambler]},
SessionKey}.
ecdh() ->
{ecdh, 10053111454769593468622878414300213417816614162107065345116848162553478019161427871683337786549966,
1373339791687564785573162818422814591820885704654,
secp160r1, 990333295438215762119481641129490894973766052278}.
dh() ->
{dh, 0087761979513264537414556992123116644042638206717762626089877284926656954974893442000747478454809111207351620687968672207938731607963470779396984752680274820156266685080223616226905101126463253150237669547023934604953898814222890239130021414026118792251620881355456432549881723310342870016961804255746630219, 2}.
rsa_oaep() ->
%% ftp://ftp.rsa.com/pub/rsalabs/tmp/pkcs1v15crypt-vectors.txt
Public = [hexstr2bin("010001"),
hexstr2bin("a8b3b284af8eb50b387034a860f146c4919f318763cd6c5598c8ae4811a1e0abc4c7e0b082d693a5e7fced675cf4668512772c0cbc64a742c6c630f533c8cc72f62ae833c40bf25842e984bb78bdbf97c0107d55bdb662f5c4e0fab9845cb5148ef7392dd3aaff93ae1e6b667bb3d4247616d4f5ba10d4cfd226de88d39f16fb")],
Private = Public ++ [hexstr2bin("53339cfdb79fc8466a655c7316aca85c55fd8f6dd898fdaf119517ef4f52e8fd8e258df93fee180fa0e4ab29693cd83b152a553d4ac4d1812b8b9fa5af0e7f55fe7304df41570926f3311f15c4d65a732c483116ee3d3d2d0af3549ad9bf7cbfb78ad884f84d5beb04724dc7369b31def37d0cf539e9cfcdd3de653729ead5d1"),
hexstr2bin("d32737e7267ffe1341b2d5c0d150a81b586fb3132bed2f8d5262864a9cb9f30af38be448598d413a172efb802c21acf1c11c520c2f26a471dcad212eac7ca39d"),
hexstr2bin("cc8853d1d54da630fac004f471f281c7b8982d8224a490edbeb33d3e3d5cc93c4765703d1dd791642f1f116a0dd852be2419b2af72bfe9a030e860b0288b5d77"),
hexstr2bin("0e12bf1718e9cef5599ba1c3882fe8046a90874eefce8f2ccc20e4f2741fb0a33a3848aec9c9305fbecbd2d76819967d4671acc6431e4037968db37878e695c1"),
hexstr2bin("95297b0f95a2fa67d00707d609dfd4fc05c89dafc2ef6d6ea55bec771ea333734d9251e79082ecda866efef13c459e1a631386b7e354c899f5f112ca85d71583"),
hexstr2bin("4f456c502493bdc0ed2ab756a3a6ed4d67352a697d4216e93212b127a63d5411ce6fa98d5dbefd73263e3728142743818166ed7dd63687dd2a8ca1d2f4fbd8e1")],
%%Msg = hexstr2bin("6628194e12073db03ba94cda9ef9532397d50dba79b987004afefe34"),
Msg = hexstr2bin("750c4047f547e8e41411856523298ac9bae245efaf1397fbe56f9dd5"),
{rsa, Public, Private, Msg, rsa_pkcs1_oaep_padding}.
no_padding() ->
Public = [_, Mod] = rsa_public(),
Private = rsa_private(),
MsgLen = erlang:byte_size(int_to_bin(Mod)),
Msg = list_to_binary(lists:duplicate(MsgLen, $X)),
{rsa, Public, Private, Msg, rsa_no_padding}.
int_to_bin(X) when X < 0 -> int_to_bin_neg(X, []);
int_to_bin(X) -> int_to_bin_pos(X, []).
int_to_bin_pos(0,Ds=[_|_]) ->
list_to_binary(Ds);
int_to_bin_pos(X,Ds) ->
int_to_bin_pos(X bsr 8, [(X band 255)|Ds]).
int_to_bin_neg(-1, Ds=[MSB|_]) when MSB >= 16#80 ->
list_to_binary(Ds);
int_to_bin_neg(X,Ds) ->
int_to_bin_neg(X bsr 8, [(X band 255)|Ds]).