Skip to content

telemt/aesdiag

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

Aesdiag

Small tool on Python for automated diagnosing AES-crypto in telemt!

Usage

  1. Run telemt with ME_DIAG=2
  2. Put your log w/ telemt::transport::middle_proxy messages in aesdiag.log (or another filename)
  3. Download aesdiag.py
wget https://raw.githubusercontent.com/telemt/aesdiag/refs/heads/main/aesdiag.py
  1. Run aesdiag.py and provide log
python3 aesdiag.py < aesdiag.log
  1. Analyze results:
============================================================
STATISTICS SUMMARY
============================================================
Total tests processed          : 10
Key length OK (32)              : 10/10
IV length OK (16)                : 10/10
Ciphertext 16-byte aligned       : 10/10
Decryption starts with hs_plain  : 10/10
After PKCS#7 removal matches     : 0/10
Extra bytes after hs_plain are 0 : 0/10
Extra bytes are noop frames       : 10/10
PKCS#7 re-encryption OK           : 0/10
Zero padding re-encryption OK     : 0/10
Noop padding re-encryption OK     : 10/10

============================================================
HEURISTIC CONCLUSION
============================================================
✓ All tests: first bytes of decrypted data match hs_plain → keys and IV are correct.
✓ All tests consistent with padding scheme: noop padding.
✓ All tests: extra bytes after hs_plain are noop frames → strongly indicates noop padding.

✅ OVERALL: All tests consistent. The encryption parameters and padding are correct.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages