Mirror of BoringSSL (grpc依赖)
https://boringssl.googlesource.com/boringssl
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
194 lines
6.0 KiB
194 lines
6.0 KiB
5 years ago
|
// Copyright (c) 2020, Google Inc.
|
||
|
//
|
||
|
// Permission to use, copy, modify, and/or distribute this software for any
|
||
|
// purpose with or without fee is hereby granted, provided that the above
|
||
|
// copyright notice and this permission notice appear in all copies.
|
||
|
//
|
||
|
// THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
||
|
// WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
||
|
// MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
|
||
|
// SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
||
|
// WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
|
||
|
// OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
|
||
|
// CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
||
|
|
||
|
package subprocess
|
||
|
|
||
|
import (
|
||
|
"encoding/hex"
|
||
|
"encoding/json"
|
||
|
"fmt"
|
||
|
)
|
||
|
|
||
|
// aead implements an ACVP algorithm by making requests to the subprocess
|
||
|
// to encrypt and decrypt with an AEAD.
|
||
|
type aead struct {
|
||
|
algo string
|
||
|
}
|
||
|
|
||
|
type aeadVectorSet struct {
|
||
|
Groups []aeadTestGroup `json:"testGroups"`
|
||
|
}
|
||
|
|
||
|
type aeadTestGroup struct {
|
||
|
ID uint64 `json:"tgId"`
|
||
|
Type string `json:"testType"`
|
||
|
Direction string `json:"direction"`
|
||
|
KeyBits int `json:"keyLen"`
|
||
|
TagBits int `json:"tagLen"`
|
||
|
Tests []struct {
|
||
|
ID uint64 `json:"tcId"`
|
||
|
PlaintextHex string `json:"pt"`
|
||
|
CiphertextHex string `json:"ct"`
|
||
|
IVHex string `json:"iv"`
|
||
|
KeyHex string `json:"key"`
|
||
|
AADHex string `json:"aad"`
|
||
|
TagHex string `json:"tag"`
|
||
|
} `json:"tests"`
|
||
|
}
|
||
|
|
||
|
type aeadTestGroupResponse struct {
|
||
|
ID uint64 `json:"tgId"`
|
||
|
Tests []aeadTestResponse `json:"tests"`
|
||
|
}
|
||
|
|
||
|
type aeadTestResponse struct {
|
||
|
ID uint64 `json:"tcId"`
|
||
|
CiphertextHex *string `json:"ct,omitempty"`
|
||
|
TagHex string `json:"tag,omitempty"`
|
||
|
PlaintextHex *string `json:"pt,omitempty"`
|
||
|
Passed *bool `json:"testPassed,omitempty"`
|
||
|
}
|
||
|
|
||
|
func (a *aead) Process(vectorSet []byte, m Transactable) (interface{}, error) {
|
||
|
var parsed aeadVectorSet
|
||
|
if err := json.Unmarshal(vectorSet, &parsed); err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
|
||
|
var ret []aeadTestGroupResponse
|
||
|
// See draft-celi-acvp-symmetric.html#table-6. (NIST no longer publish HTML
|
||
|
// versions of the ACVP documents. You can find fragments in
|
||
|
// https://github.com/usnistgov/ACVP.)
|
||
|
for _, group := range parsed.Groups {
|
||
|
response := aeadTestGroupResponse{
|
||
|
ID: group.ID,
|
||
|
}
|
||
|
|
||
|
var encrypt bool
|
||
|
switch group.Direction {
|
||
|
case "encrypt":
|
||
|
encrypt = true
|
||
|
case "decrypt":
|
||
|
encrypt = false
|
||
|
default:
|
||
|
return nil, fmt.Errorf("test group %d has unknown direction %q", group.ID, group.Direction)
|
||
|
}
|
||
|
|
||
|
op := a.algo + "/seal"
|
||
|
if !encrypt {
|
||
|
op = a.algo + "/open"
|
||
|
}
|
||
|
|
||
|
if group.KeyBits%8 != 0 || group.KeyBits < 0 {
|
||
|
return nil, fmt.Errorf("test group %d contains non-byte-multiple key length %d", group.ID, group.KeyBits)
|
||
|
}
|
||
|
keyBytes := group.KeyBits / 8
|
||
|
|
||
|
if group.TagBits%8 != 0 || group.TagBits < 0 {
|
||
|
return nil, fmt.Errorf("test group %d contains non-byte-multiple tag length %d", group.ID, group.TagBits)
|
||
|
}
|
||
|
tagBytes := group.TagBits / 8
|
||
|
|
||
|
for _, test := range group.Tests {
|
||
|
if len(test.KeyHex) != keyBytes*2 {
|
||
|
return nil, fmt.Errorf("test case %d/%d contains key %q of length %d, but expected %d-bit key", group.ID, test.ID, test.KeyHex, len(test.KeyHex), group.KeyBits)
|
||
|
}
|
||
|
|
||
|
key, err := hex.DecodeString(test.KeyHex)
|
||
|
if err != nil {
|
||
|
return nil, fmt.Errorf("failed to decode key in test case %d/%d: %s", group.ID, test.ID, err)
|
||
|
}
|
||
|
|
||
|
nonce, err := hex.DecodeString(test.IVHex)
|
||
|
if err != nil {
|
||
|
return nil, fmt.Errorf("failed to decode nonce in test case %d/%d: %s", group.ID, test.ID, err)
|
||
|
}
|
||
|
|
||
|
aad, err := hex.DecodeString(test.AADHex)
|
||
|
if err != nil {
|
||
|
return nil, fmt.Errorf("failed to decode aad in test case %d/%d: %s", group.ID, test.ID, err)
|
||
|
}
|
||
|
|
||
|
var tag []byte
|
||
|
if !encrypt {
|
||
|
if tag, err = hex.DecodeString(test.TagHex); err != nil {
|
||
|
return nil, fmt.Errorf("failed to decode tag in test case %d/%d: %s", group.ID, test.ID, err)
|
||
|
}
|
||
|
if len(tag) != tagBytes {
|
||
|
return nil, fmt.Errorf("tag in test case %d/%d is %d bytes long, but should be %d", group.ID, test.ID, len(tag), tagBytes)
|
||
|
}
|
||
|
} else if len(test.TagHex) != 0 {
|
||
|
return nil, fmt.Errorf("test case %d/%d has unexpected tag input", group.ID, test.ID)
|
||
|
}
|
||
|
|
||
|
var inputHex, otherHex string
|
||
|
if encrypt {
|
||
|
inputHex, otherHex = test.PlaintextHex, test.CiphertextHex
|
||
|
} else {
|
||
|
inputHex, otherHex = test.CiphertextHex, test.PlaintextHex
|
||
|
}
|
||
|
|
||
|
if len(otherHex) != 0 {
|
||
|
return nil, fmt.Errorf("test case %d/%d has unexpected plain/ciphertext input", group.ID, test.ID)
|
||
|
}
|
||
|
|
||
|
input, err := hex.DecodeString(inputHex)
|
||
|
if err != nil {
|
||
|
return nil, fmt.Errorf("failed to decode hex in test case %d/%d: %s", group.ID, test.ID, err)
|
||
|
}
|
||
|
|
||
|
testResp := aeadTestResponse{ID: test.ID}
|
||
|
|
||
|
if encrypt {
|
||
|
result, err := m.Transact(op, 1, uint32le(uint32(tagBytes)), key, input, nonce, aad)
|
||
|
if err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
|
||
|
if len(result[0]) < tagBytes {
|
||
|
return nil, fmt.Errorf("ciphertext from subprocess for test case %d/%d is shorter than the tag (%d vs %d)", group.ID, test.ID, len(result[0]), tagBytes)
|
||
|
}
|
||
|
|
||
|
ciphertext := result[0][:len(result[0])-tagBytes]
|
||
|
ciphertextHex := hex.EncodeToString(ciphertext)
|
||
|
tag := result[0][len(result[0])-tagBytes:]
|
||
|
|
||
|
testResp.CiphertextHex = &ciphertextHex
|
||
|
testResp.TagHex = hex.EncodeToString(tag)
|
||
|
} else {
|
||
|
result, err := m.Transact(op, 2, uint32le(uint32(tagBytes)), key, append(input, tag...), nonce, aad)
|
||
|
if err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
|
||
|
if len(result[0]) != 1 || (result[0][0]&0xfe) != 0 {
|
||
|
return nil, fmt.Errorf("invalid AEAD status result from subprocess")
|
||
|
}
|
||
|
passed := result[0][0] == 1
|
||
|
testResp.Passed = &passed
|
||
|
if passed {
|
||
|
plaintextHex := hex.EncodeToString(result[1])
|
||
|
testResp.PlaintextHex = &plaintextHex
|
||
|
}
|
||
|
}
|
||
|
|
||
|
response.Tests = append(response.Tests, testResp)
|
||
|
}
|
||
|
|
||
|
ret = append(ret, response)
|
||
|
}
|
||
|
|
||
|
return ret, nil
|
||
|
}
|