Mirror of BoringSSL (grpc依赖)
https://boringssl.googlesource.com/boringssl
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
162 lines
4.8 KiB
162 lines
4.8 KiB
/* Copyright (c) 2018, Google Inc. |
|
* |
|
* Permission to use, copy, modify, and/or distribute this software for any |
|
* purpose with or without fee is hereby granted, provided that the above |
|
* copyright notice and this permission notice appear in all copies. |
|
* |
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY |
|
* SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION |
|
* OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN |
|
* CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ |
|
|
|
#include "./wycheproof_util.h" |
|
|
|
#include <stdlib.h> |
|
|
|
#include <algorithm> |
|
|
|
#include <openssl/bn.h> |
|
#include <openssl/digest.h> |
|
#include <openssl/ec.h> |
|
#include <openssl/nid.h> |
|
|
|
#include "./file_test.h" |
|
|
|
|
|
bool WycheproofResult::IsValid( |
|
const std::vector<std::string> &acceptable_flags) const { |
|
switch (raw_result) { |
|
case WycheproofRawResult::kValid: |
|
return true; |
|
case WycheproofRawResult::kInvalid: |
|
return false; |
|
case WycheproofRawResult::kAcceptable: |
|
for (const auto &flag : flags) { |
|
if (std::find(acceptable_flags.begin(), acceptable_flags.end(), flag) == |
|
acceptable_flags.end()) { |
|
return false; |
|
} |
|
} |
|
return true; |
|
} |
|
|
|
abort(); |
|
} |
|
|
|
bool GetWycheproofResult(FileTest *t, WycheproofResult *out) { |
|
std::string result; |
|
if (!t->GetAttribute(&result, "result")) { |
|
return false; |
|
} |
|
if (result == "valid") { |
|
out->raw_result = WycheproofRawResult::kValid; |
|
} else if (result == "invalid") { |
|
out->raw_result = WycheproofRawResult::kInvalid; |
|
} else if (result == "acceptable") { |
|
out->raw_result = WycheproofRawResult::kAcceptable; |
|
} else { |
|
t->PrintLine("Bad result string '%s'", result.c_str()); |
|
return false; |
|
} |
|
|
|
out->flags.clear(); |
|
if (t->HasAttribute("flags")) { |
|
std::string flags = t->GetAttributeOrDie("flags"); |
|
size_t idx = 0; |
|
while (idx < flags.size()) { |
|
size_t comma = flags.find(',', idx); |
|
if (comma == std::string::npos) { |
|
comma = flags.size(); |
|
} |
|
out->flags.push_back(flags.substr(idx, comma - idx)); |
|
idx = comma + 1; |
|
} |
|
} |
|
return true; |
|
} |
|
|
|
const EVP_MD *GetWycheproofDigest(FileTest *t, const char *key, |
|
bool instruction) { |
|
std::string name; |
|
bool ok = |
|
instruction ? t->GetInstruction(&name, key) : t->GetAttribute(&name, key); |
|
if (!ok) { |
|
return nullptr; |
|
} |
|
if (name == "SHA-1") { |
|
return EVP_sha1(); |
|
} |
|
if (name == "SHA-224") { |
|
return EVP_sha224(); |
|
} |
|
if (name == "SHA-256") { |
|
return EVP_sha256(); |
|
} |
|
if (name == "SHA-384") { |
|
return EVP_sha384(); |
|
} |
|
if (name == "SHA-512") { |
|
return EVP_sha512(); |
|
} |
|
t->PrintLine("Unknown digest '%s'", name.c_str()); |
|
return nullptr; |
|
} |
|
|
|
bssl::UniquePtr<EC_GROUP> GetWycheproofCurve(FileTest *t, const char *key, |
|
bool instruction) { |
|
std::string name; |
|
bool ok = |
|
instruction ? t->GetInstruction(&name, key) : t->GetAttribute(&name, key); |
|
if (!ok) { |
|
return nullptr; |
|
} |
|
int nid; |
|
if (name == "secp224r1") { |
|
nid = NID_secp224r1; |
|
} else if (name == "secp256r1") { |
|
nid = NID_X9_62_prime256v1; |
|
} else if (name == "secp384r1") { |
|
nid = NID_secp384r1; |
|
} else if (name == "secp521r1") { |
|
nid = NID_secp521r1; |
|
} else { |
|
t->PrintLine("Unknown curve '%s'", name.c_str()); |
|
return nullptr; |
|
} |
|
return bssl::UniquePtr<EC_GROUP>(EC_GROUP_new_by_curve_name(nid)); |
|
} |
|
|
|
bssl::UniquePtr<BIGNUM> GetWycheproofBIGNUM(FileTest *t, const char *key, |
|
bool instruction) { |
|
std::string value; |
|
bool ok = instruction ? t->GetInstruction(&value, key) |
|
: t->GetAttribute(&value, key); |
|
if (!ok) { |
|
return nullptr; |
|
} |
|
BIGNUM *bn = nullptr; |
|
if (BN_hex2bn(&bn, value.c_str()) != static_cast<int>(value.size())) { |
|
BN_free(bn); |
|
t->PrintLine("Could not decode value '%s'", value.c_str()); |
|
return nullptr; |
|
} |
|
bssl::UniquePtr<BIGNUM> ret(bn); |
|
if (!value.empty()) { |
|
// If the high bit is one, this is a negative number in Wycheproof. |
|
// Wycheproof's tests generally mimic Java APIs, including all their |
|
// mistakes. See |
|
// https://github.com/google/wycheproof/blob/0329f5b751ef102bd6b7b7181b6e049522a887f5/java/com/google/security/wycheproof/JsonUtil.java#L62. |
|
if ('0' > value[0] || value[0] > '7') { |
|
bssl::UniquePtr<BIGNUM> tmp(BN_new()); |
|
if (!tmp || |
|
!BN_set_bit(tmp.get(), value.size() * 4) || |
|
!BN_sub(ret.get(), ret.get(), tmp.get())) { |
|
return nullptr; |
|
} |
|
} |
|
} |
|
return ret; |
|
}
|
|
|