Mirror of BoringSSL (grpc依赖)
https://boringssl.googlesource.com/boringssl
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
166 lines
5.0 KiB
166 lines
5.0 KiB
/* Copyright (c) 2017, Google Inc. |
|
* |
|
* Permission to use, copy, modify, and/or distribute this software for any |
|
* purpose with or without fee is hereby granted, provided that the above |
|
* copyright notice and this permission notice appear in all copies. |
|
* |
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY |
|
* SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION |
|
* OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN |
|
* CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ |
|
|
|
// cavp_aes_gcm_test processes a NIST CAVP AES GCM test vector request file and |
|
// emits the corresponding response. |
|
|
|
#include <stdlib.h> |
|
|
|
#include <openssl/aead.h> |
|
#include <openssl/cipher.h> |
|
#include <openssl/crypto.h> |
|
#include <openssl/err.h> |
|
|
|
#include "../crypto/test/file_test.h" |
|
#include "../crypto/test/test_util.h" |
|
#include "cavp_test_util.h" |
|
|
|
|
|
namespace { |
|
|
|
struct TestCtx { |
|
const EVP_AEAD *aead; |
|
}; |
|
|
|
} |
|
|
|
static const EVP_AEAD *GetAEAD(const std::string &name, const bool enc) { |
|
if (name == "aes-128-gcm") { |
|
return EVP_aead_aes_128_gcm(); |
|
} else if (name == "aes-192-gcm") { |
|
return EVP_aead_aes_192_gcm(); |
|
} else if (name == "aes-256-gcm") { |
|
return EVP_aead_aes_256_gcm(); |
|
} |
|
return nullptr; |
|
} |
|
|
|
static bool TestAEADEncrypt(FileTest *t, void *arg) { |
|
TestCtx *ctx = reinterpret_cast<TestCtx *>(arg); |
|
|
|
std::string key_len_str, iv_len_str, pt_len_str, aad_len_str, tag_len_str; |
|
if (!t->GetInstruction(&key_len_str, "Keylen") || |
|
!t->GetInstruction(&iv_len_str, "IVlen") || |
|
!t->GetInstruction(&pt_len_str, "PTlen") || |
|
!t->GetInstruction(&aad_len_str, "AADlen") || |
|
!t->GetInstruction(&tag_len_str, "Taglen")) { |
|
return false; |
|
} |
|
|
|
std::string count; |
|
std::vector<uint8_t> key, iv, pt, aad, tag, ct; |
|
if (!t->GetAttribute(&count, "Count") || |
|
!t->GetBytes(&key, "Key") || |
|
!t->GetBytes(&iv, "IV") || |
|
!t->GetBytes(&pt, "PT") || |
|
!t->GetBytes(&aad, "AAD") || |
|
key.size() * 8 != strtoul(key_len_str.c_str(), nullptr, 0) || |
|
iv.size() * 8 != strtoul(iv_len_str.c_str(), nullptr, 0) || |
|
pt.size() * 8 != strtoul(pt_len_str.c_str(), nullptr, 0) || |
|
aad.size() * 8 != strtoul(aad_len_str.c_str(), nullptr, 0) || |
|
iv.size() != 12) { |
|
return false; |
|
} |
|
|
|
const size_t tag_len = strtoul(tag_len_str.c_str(), nullptr, 0) / 8; |
|
if (!AEADEncrypt(ctx->aead, &ct, &tag, tag_len, key, pt, aad, iv)) { |
|
return false; |
|
} |
|
printf("%s", t->CurrentTestToString().c_str()); |
|
printf("CT = %s\r\n", EncodeHex(ct).c_str()); |
|
printf("Tag = %s\r\n\r\n", EncodeHex(tag).c_str()); |
|
|
|
return true; |
|
} |
|
|
|
static bool TestAEADDecrypt(FileTest *t, void *arg) { |
|
TestCtx *ctx = reinterpret_cast<TestCtx *>(arg); |
|
|
|
std::string key_len, iv_len, pt_len_str, aad_len_str, tag_len; |
|
if (!t->GetInstruction(&key_len, "Keylen") || |
|
!t->GetInstruction(&iv_len, "IVlen") || |
|
!t->GetInstruction(&pt_len_str, "PTlen") || |
|
!t->GetInstruction(&aad_len_str, "AADlen") || |
|
!t->GetInstruction(&tag_len, "Taglen")) { |
|
t->PrintLine("Invalid instruction block."); |
|
return false; |
|
} |
|
size_t aad_len = strtoul(aad_len_str.c_str(), nullptr, 0) / 8; |
|
size_t pt_len = strtoul(pt_len_str.c_str(), nullptr, 0) / 8; |
|
|
|
std::string count; |
|
std::vector<uint8_t> key, iv, ct, aad, tag, pt; |
|
if (!t->GetAttribute(&count, "Count") || |
|
!t->GetBytes(&key, "Key") || |
|
!t->GetBytes(&aad, "AAD") || |
|
!t->GetBytes(&tag, "Tag") || |
|
!t->GetBytes(&iv, "IV") || |
|
!t->GetBytes(&ct, "CT") || |
|
key.size() * 8 != strtoul(key_len.c_str(), nullptr, 0) || |
|
iv.size() * 8 != strtoul(iv_len.c_str(), nullptr, 0) || |
|
ct.size() != pt_len || |
|
aad.size() != aad_len || |
|
tag.size() * 8 != strtoul(tag_len.c_str(), nullptr, 0)) { |
|
t->PrintLine("Invalid test case"); |
|
return false; |
|
} |
|
|
|
printf("%s", t->CurrentTestToString().c_str()); |
|
bool aead_result = |
|
AEADDecrypt(ctx->aead, &pt, pt_len, key, aad, ct, tag, iv); |
|
if (aead_result) { |
|
printf("PT = %s\r\n\r\n", EncodeHex(pt).c_str()); |
|
} else { |
|
printf("FAIL\r\n\r\n"); |
|
} |
|
|
|
return true; |
|
} |
|
|
|
static int usage(char *arg) { |
|
fprintf(stderr, "usage: %s (enc|dec) <cipher> <test file>\n", arg); |
|
return 1; |
|
} |
|
|
|
int cavp_aes_gcm_test_main(int argc, char **argv) { |
|
if (argc != 4) { |
|
return usage(argv[0]); |
|
} |
|
|
|
const std::string mode(argv[1]); |
|
bool (*test_fn)(FileTest * t, void *arg); |
|
if (mode == "enc") { |
|
test_fn = &TestAEADEncrypt; |
|
} else if (mode == "dec") { |
|
test_fn = &TestAEADDecrypt; |
|
} else { |
|
return usage(argv[0]); |
|
} |
|
|
|
const EVP_AEAD *aead = GetAEAD(argv[2], mode == "enc"); |
|
if (aead == nullptr) { |
|
fprintf(stderr, "invalid aead: %s\n", argv[2]); |
|
return 1; |
|
} |
|
|
|
TestCtx ctx = {aead}; |
|
|
|
FileTest::Options opts; |
|
opts.path = argv[3]; |
|
opts.callback = test_fn; |
|
opts.arg = &ctx; |
|
opts.silent = true; |
|
opts.comment_callback = EchoComment; |
|
return FileTestMain(opts); |
|
}
|
|
|