Change-Id: I7636736752ac371fc8d86fbc6bf81ca797ac5092 Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/43127 Reviewed-by: Adam Langley <agl@google.com> Reviewed-by: David Benjamin <davidben@google.com> Commit-Queue: Adam Langley <agl@google.com>chromium-5359
parent
6b6b66bacd
commit
fda92cd640
3 changed files with 306 additions and 0 deletions
@ -0,0 +1,193 @@ |
||||
// Copyright (c) 2020, Google Inc.
|
||||
//
|
||||
// Permission to use, copy, modify, and/or distribute this software for any
|
||||
// purpose with or without fee is hereby granted, provided that the above
|
||||
// copyright notice and this permission notice appear in all copies.
|
||||
//
|
||||
// THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
||||
// WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
||||
// MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
|
||||
// SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
||||
// WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
|
||||
// OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
|
||||
// CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
||||
|
||||
package subprocess |
||||
|
||||
import ( |
||||
"encoding/hex" |
||||
"encoding/json" |
||||
"fmt" |
||||
) |
||||
|
||||
// aead implements an ACVP algorithm by making requests to the subprocess
|
||||
// to encrypt and decrypt with an AEAD.
|
||||
type aead struct { |
||||
algo string |
||||
} |
||||
|
||||
type aeadVectorSet struct { |
||||
Groups []aeadTestGroup `json:"testGroups"` |
||||
} |
||||
|
||||
type aeadTestGroup struct { |
||||
ID uint64 `json:"tgId"` |
||||
Type string `json:"testType"` |
||||
Direction string `json:"direction"` |
||||
KeyBits int `json:"keyLen"` |
||||
TagBits int `json:"tagLen"` |
||||
Tests []struct { |
||||
ID uint64 `json:"tcId"` |
||||
PlaintextHex string `json:"pt"` |
||||
CiphertextHex string `json:"ct"` |
||||
IVHex string `json:"iv"` |
||||
KeyHex string `json:"key"` |
||||
AADHex string `json:"aad"` |
||||
TagHex string `json:"tag"` |
||||
} `json:"tests"` |
||||
} |
||||
|
||||
type aeadTestGroupResponse struct { |
||||
ID uint64 `json:"tgId"` |
||||
Tests []aeadTestResponse `json:"tests"` |
||||
} |
||||
|
||||
type aeadTestResponse struct { |
||||
ID uint64 `json:"tcId"` |
||||
CiphertextHex *string `json:"ct,omitempty"` |
||||
TagHex string `json:"tag,omitempty"` |
||||
PlaintextHex *string `json:"pt,omitempty"` |
||||
Passed *bool `json:"testPassed,omitempty"` |
||||
} |
||||
|
||||
func (a *aead) Process(vectorSet []byte, m Transactable) (interface{}, error) { |
||||
var parsed aeadVectorSet |
||||
if err := json.Unmarshal(vectorSet, &parsed); err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
var ret []aeadTestGroupResponse |
||||
// See draft-celi-acvp-symmetric.html#table-6. (NIST no longer publish HTML
|
||||
// versions of the ACVP documents. You can find fragments in
|
||||
// https://github.com/usnistgov/ACVP.)
|
||||
for _, group := range parsed.Groups { |
||||
response := aeadTestGroupResponse{ |
||||
ID: group.ID, |
||||
} |
||||
|
||||
var encrypt bool |
||||
switch group.Direction { |
||||
case "encrypt": |
||||
encrypt = true |
||||
case "decrypt": |
||||
encrypt = false |
||||
default: |
||||
return nil, fmt.Errorf("test group %d has unknown direction %q", group.ID, group.Direction) |
||||
} |
||||
|
||||
op := a.algo + "/seal" |
||||
if !encrypt { |
||||
op = a.algo + "/open" |
||||
} |
||||
|
||||
if group.KeyBits%8 != 0 || group.KeyBits < 0 { |
||||
return nil, fmt.Errorf("test group %d contains non-byte-multiple key length %d", group.ID, group.KeyBits) |
||||
} |
||||
keyBytes := group.KeyBits / 8 |
||||
|
||||
if group.TagBits%8 != 0 || group.TagBits < 0 { |
||||
return nil, fmt.Errorf("test group %d contains non-byte-multiple tag length %d", group.ID, group.TagBits) |
||||
} |
||||
tagBytes := group.TagBits / 8 |
||||
|
||||
for _, test := range group.Tests { |
||||
if len(test.KeyHex) != keyBytes*2 { |
||||
return nil, fmt.Errorf("test case %d/%d contains key %q of length %d, but expected %d-bit key", group.ID, test.ID, test.KeyHex, len(test.KeyHex), group.KeyBits) |
||||
} |
||||
|
||||
key, err := hex.DecodeString(test.KeyHex) |
||||
if err != nil { |
||||
return nil, fmt.Errorf("failed to decode key in test case %d/%d: %s", group.ID, test.ID, err) |
||||
} |
||||
|
||||
nonce, err := hex.DecodeString(test.IVHex) |
||||
if err != nil { |
||||
return nil, fmt.Errorf("failed to decode nonce in test case %d/%d: %s", group.ID, test.ID, err) |
||||
} |
||||
|
||||
aad, err := hex.DecodeString(test.AADHex) |
||||
if err != nil { |
||||
return nil, fmt.Errorf("failed to decode aad in test case %d/%d: %s", group.ID, test.ID, err) |
||||
} |
||||
|
||||
var tag []byte |
||||
if !encrypt { |
||||
if tag, err = hex.DecodeString(test.TagHex); err != nil { |
||||
return nil, fmt.Errorf("failed to decode tag in test case %d/%d: %s", group.ID, test.ID, err) |
||||
} |
||||
if len(tag) != tagBytes { |
||||
return nil, fmt.Errorf("tag in test case %d/%d is %d bytes long, but should be %d", group.ID, test.ID, len(tag), tagBytes) |
||||
} |
||||
} else if len(test.TagHex) != 0 { |
||||
return nil, fmt.Errorf("test case %d/%d has unexpected tag input", group.ID, test.ID) |
||||
} |
||||
|
||||
var inputHex, otherHex string |
||||
if encrypt { |
||||
inputHex, otherHex = test.PlaintextHex, test.CiphertextHex |
||||
} else { |
||||
inputHex, otherHex = test.CiphertextHex, test.PlaintextHex |
||||
} |
||||
|
||||
if len(otherHex) != 0 { |
||||
return nil, fmt.Errorf("test case %d/%d has unexpected plain/ciphertext input", group.ID, test.ID) |
||||
} |
||||
|
||||
input, err := hex.DecodeString(inputHex) |
||||
if err != nil { |
||||
return nil, fmt.Errorf("failed to decode hex in test case %d/%d: %s", group.ID, test.ID, err) |
||||
} |
||||
|
||||
testResp := aeadTestResponse{ID: test.ID} |
||||
|
||||
if encrypt { |
||||
result, err := m.Transact(op, 1, uint32le(uint32(tagBytes)), key, input, nonce, aad) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
if len(result[0]) < tagBytes { |
||||
return nil, fmt.Errorf("ciphertext from subprocess for test case %d/%d is shorter than the tag (%d vs %d)", group.ID, test.ID, len(result[0]), tagBytes) |
||||
} |
||||
|
||||
ciphertext := result[0][:len(result[0])-tagBytes] |
||||
ciphertextHex := hex.EncodeToString(ciphertext) |
||||
tag := result[0][len(result[0])-tagBytes:] |
||||
|
||||
testResp.CiphertextHex = &ciphertextHex |
||||
testResp.TagHex = hex.EncodeToString(tag) |
||||
} else { |
||||
result, err := m.Transact(op, 2, uint32le(uint32(tagBytes)), key, append(input, tag...), nonce, aad) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
if len(result[0]) != 1 || (result[0][0]&0xfe) != 0 { |
||||
return nil, fmt.Errorf("invalid AEAD status result from subprocess") |
||||
} |
||||
passed := result[0][0] == 1 |
||||
testResp.Passed = &passed |
||||
if passed { |
||||
plaintextHex := hex.EncodeToString(result[1]) |
||||
testResp.PlaintextHex = &plaintextHex |
||||
} |
||||
} |
||||
|
||||
response.Tests = append(response.Tests, testResp) |
||||
} |
||||
|
||||
ret = append(ret, response) |
||||
} |
||||
|
||||
return ret, nil |
||||
} |
Loading…
Reference in new issue