Tests are implemented using: crypto_vectors
Please look at magma_samples
```rust use cipher_magma::Magma;
let key: [u32; 8] = [ 0xffeeddcc, 0xbbaa9988, 0x77665544, 0x33221100, 0xf0f1f2f3, 0xf4f5f6f7, 0xf8f9fafb, 0xfcfdfeff, ]; println!("Key:\n{:x?}\n", key); let magma = Magma::with_key(key);
let source = 0xfedcba9876543210_u64; println!("Source:\n{:x}\n", source);
let encrypted = magma.encrypt(source); println!("Encrypted:\n{:x}\n", encrypted);
let decrypted = magma.decrypt(encrypted); println!("Decrypted:\n{:x}", decrypted);
assert_eq!(decrypted, source);
```
```rust use cipher_magma::{CipherMode, CipherOperation, Magma};
let cipher_mode = CipherMode::CFB;
let key = [0xab; 32]; println!("Key:\n{:x?}\n", key); let mut magma = Magma::with_key(key);
let source = b"Lorem ipsum dolor sit amet, consectetur adipiscing elit. \ Aenean ac sem leo. Morbi pretium neque eget felis finibus convallis. \ Praesent tristique rutrum odio at rhoncus. Duis non ligula ut diam tristique commodo. \ Phasellus vel ex nec leo pretium efficitur. Aliquam malesuada vestibulum magna. \ Quisque iaculis est et est volutpat posuere.";
println!("Source:\n{}\n", String::fromutf8(source.tovec()).unwrap());
let encrypted = magma.cipher(source, &CipherOperation::Encrypt, &cipher_mode); println!("Encrypted:\n{:02x?}\n", encrypted);
let mut decrypted = magma.cipher(&encrypted, &CipherOperation::Decrypt, &cipher_mode);
if ciphermode.haspadding() { // remove padding bytes decrypted.truncate(source.len()); }
asserteq!(decrypted, source); println!("Decrypted:\n{}\n", String::fromutf8(decrypted).unwrap()); ```
```rust use cipher_magma::{mac, Magma};
let key: [u8; 32] = [ 0xff, 0xee, 0xdd, 0xcc, 0xbb, 0xaa, 0x99, 0x88, 0x77, 0x66, 0x55, 0x44, 0x33, 0x22, 0x11, 0x00, 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff, ]; println!("Key:\n{:x?}\n", key); let mut magma = Magma::with_key(key);
let message = [ 0x92, 0xde, 0xf0, 0x6b, 0x3c, 0x13, 0x0a, 0x59, 0xdb, 0x54, 0xc7, 0x04, 0xf8, 0x18, 0x9d, 0x20, 0x4a, 0x98, 0xfb, 0x2e, 0x67, 0xa8, 0x02, 0x4c, 0x89, 0x12, 0x40, 0x9b, 0x17, 0xb5, 0x7e, 0x41, ]; println!("Message:\n{:02x?}\n", message);
// update the context for chunk in message.chunks(8) { mac::update(&mut magma, &chunk); }
// finalize and get result let mac = mac::finalize(&mut magma); println!("Calculated MAC:\n{:x}\n", mac);
assert_eq!(mac, 0x154e7210); ```
```rust use cipher_magma::{CipherMode, CipherOperation, Magma}; use std::io::{Read, Seek, Write};
let cipher_mode = CipherMode::CBC;
let key = [0xab; 32]; let mut magma = Magma::with_key(key);
// opening file let sourcefilename = "README.md"; println!("Opening source file: {}", sourcefilename);
let mut sourcefile = std::fs::File::open(sourcefilename).expect("Could not open file."); let sourcelen = sourcefile.metadata().unwrap().len();
let tempdir = std::env::tempdir();
// creating file for encrypted data let encryptedfilename = format!("{}.encrypted", sourcefilename); let encryptedfilepath = tempdir.join(encryptedfilename); println!("Creating encrypted file: {:?}", encryptedfilepath);
let mut encryptedfile = std::fs::File::options() .write(true) .read(true) .create(true) .open(encryptedfilepath) .expect("Could not create encrypted file.");
println!("Encrypting ...");
// ensure buf size % 8 bytes let mut buf = [0u8; 1024];
loop { let readcount = sourcefile .read(&mut buf) .expect("Could not read source file");
if read_count == 0 {
break;
}
let ciphertext = magma.cipher(&buf[0..read_count], &CipherOperation::Encrypt, &cipher_mode);
encrypted_file
.write_all(&ciphertext)
.expect("Could not write into encrypted file");
} encrypted_file .flush() .expect("Could not flush the encrypted file");
println!("Encryption completed.");
let decryptedfilename = format!("{}.decrypted", sourcefilename); let decryptedfilepath = tempdir.join(decrypted_filename);
println!("Creating decrypted file: {:?}", decrypted_filepath);
let mut decryptedfile = std::fs::File::create(decryptedfilepath).expect("Could not create decrypted file.");
println!("Decrypting ...");
// rewind the file position to the begining encrypted_file .rewind() .expect("Could not rewind encrypted file");
loop { let readcount = encryptedfile .read(&mut buf) .expect("Could not read encrypted file");
if read_count == 0 {
break;
}
let plaintext = magma.cipher(&buf[0..read_count], &CipherOperation::Decrypt, &cipher_mode);
decrypted_file
.write_all(&plaintext)
.expect("Could not write into decrypted file");
} decrypted_file .flush() .expect("Could not flush the decrypted file");
if ciphermode.haspadding() { // remove padding bytes decryptedfile .setlen(source_len) .expect("Could not remove padding bytes from decrypted file"); }
println!("Decryption completed."); ```