2014-06-20 20:00:00 +01:00
|
|
|
/* ====================================================================
|
|
|
|
* Copyright (c) 2008 The OpenSSL Project. All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
*
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in
|
|
|
|
* the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
*
|
|
|
|
* 3. All advertising materials mentioning features or use of this
|
|
|
|
* software must display the following acknowledgment:
|
|
|
|
* "This product includes software developed by the OpenSSL Project
|
|
|
|
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
|
|
|
|
*
|
|
|
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
|
|
|
* endorse or promote products derived from this software without
|
|
|
|
* prior written permission. For written permission, please contact
|
|
|
|
* openssl-core@openssl.org.
|
|
|
|
*
|
|
|
|
* 5. Products derived from this software may not be called "OpenSSL"
|
|
|
|
* nor may "OpenSSL" appear in their names without prior written
|
|
|
|
* permission of the OpenSSL Project.
|
|
|
|
*
|
|
|
|
* 6. Redistributions of any form whatsoever must retain the following
|
|
|
|
* acknowledgment:
|
|
|
|
* "This product includes software developed by the OpenSSL Project
|
|
|
|
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
|
|
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
|
|
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
|
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
|
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
* ==================================================================== */
|
|
|
|
|
2016-12-05 21:44:39 +00:00
|
|
|
/* Per C99, various stdint.h and inttypes.h macros (the latter used by
|
|
|
|
* internal.h) are unavailable in C++ unless some macros are defined. C++11
|
|
|
|
* overruled this decision, but older Android NDKs still require it. */
|
|
|
|
#if !defined(__STDC_CONSTANT_MACROS)
|
|
|
|
#define __STDC_CONSTANT_MACROS
|
|
|
|
#endif
|
|
|
|
|
2014-06-20 20:00:00 +01:00
|
|
|
#include <stdio.h>
|
2015-01-31 01:08:37 +00:00
|
|
|
#include <string.h>
|
2014-06-20 20:00:00 +01:00
|
|
|
|
|
|
|
#include <openssl/aes.h>
|
2014-09-12 00:11:15 +01:00
|
|
|
#include <openssl/crypto.h>
|
2014-06-20 20:00:00 +01:00
|
|
|
#include <openssl/mem.h>
|
|
|
|
|
|
|
|
#include "internal.h"
|
2015-07-23 03:36:57 +01:00
|
|
|
#include "../test/test_util.h"
|
2014-06-20 20:00:00 +01:00
|
|
|
|
|
|
|
|
|
|
|
struct test_case {
|
|
|
|
const char *key;
|
|
|
|
const char *plaintext;
|
|
|
|
const char *additional_data;
|
|
|
|
const char *nonce;
|
|
|
|
const char *ciphertext;
|
|
|
|
const char *tag;
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct test_case test_cases[] = {
|
|
|
|
{
|
|
|
|
"00000000000000000000000000000000",
|
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
"000000000000000000000000",
|
|
|
|
NULL,
|
|
|
|
"58e2fccefa7e3061367f1d57a4e7455a",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"00000000000000000000000000000000",
|
|
|
|
"00000000000000000000000000000000",
|
|
|
|
NULL,
|
|
|
|
"000000000000000000000000",
|
|
|
|
"0388dace60b6a392f328c2b971b2fe78",
|
|
|
|
"ab6e47d42cec13bdf53a67b21257bddf",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"feffe9928665731c6d6a8f9467308308",
|
|
|
|
"d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b391aafd255",
|
|
|
|
NULL,
|
|
|
|
"cafebabefacedbaddecaf888",
|
|
|
|
"42831ec2217774244b7221b784d0d49ce3aa212f2c02a4e035c17e2329aca12e21d514b25466931c7d8f6a5aac84aa051ba30b396a0aac973d58e091473f5985",
|
|
|
|
"4d5c2af327cd64a62cf35abd2ba6fab4",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"feffe9928665731c6d6a8f9467308308",
|
|
|
|
"d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39",
|
|
|
|
"feedfacedeadbeeffeedfacedeadbeefabaddad2",
|
|
|
|
"cafebabefacedbaddecaf888",
|
|
|
|
"42831ec2217774244b7221b784d0d49ce3aa212f2c02a4e035c17e2329aca12e21d514b25466931c7d8f6a5aac84aa051ba30b396a0aac973d58e091",
|
|
|
|
"5bc94fbc3221a5db94fae95ae7121a47",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"feffe9928665731c6d6a8f9467308308",
|
|
|
|
"d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39",
|
|
|
|
"feedfacedeadbeeffeedfacedeadbeefabaddad2",
|
|
|
|
"cafebabefacedbad",
|
|
|
|
"61353b4c2806934a777ff51fa22a4755699b2a714fcdc6f83766e5f97b6c742373806900e49f24b22b097544d4896b424989b5e1ebac0f07c23f4598",
|
|
|
|
"3612d2e79e3b0785561be14aaca2fccb",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"feffe9928665731c6d6a8f9467308308",
|
|
|
|
"d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39",
|
|
|
|
"feedfacedeadbeeffeedfacedeadbeefabaddad2",
|
|
|
|
"9313225df88406e555909c5aff5269aa6a7a9538534f7da1e4c303d2a318a728c3c0c95156809539fcf0e2429a6b525416aedbf5a0de6a57a637b39b",
|
|
|
|
"8ce24998625615b603a033aca13fb894be9112a5c3a211a8ba262a3cca7e2ca701e4a9a4fba43c90ccdcb281d48c7c6fd62875d2aca417034c34aee5",
|
|
|
|
"619cc5aefffe0bfa462af43c1699d050",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"000000000000000000000000000000000000000000000000",
|
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
"000000000000000000000000",
|
|
|
|
NULL,
|
|
|
|
"cd33b28ac773f74ba00ed1f312572435",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"000000000000000000000000000000000000000000000000",
|
|
|
|
"00000000000000000000000000000000",
|
|
|
|
NULL,
|
|
|
|
"000000000000000000000000",
|
|
|
|
"98e7247c07f0fe411c267e4384b0f600",
|
|
|
|
"2ff58d80033927ab8ef4d4587514f0fb",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"feffe9928665731c6d6a8f9467308308feffe9928665731c",
|
|
|
|
"d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b391aafd255",
|
|
|
|
NULL,
|
|
|
|
"cafebabefacedbaddecaf888",
|
|
|
|
"3980ca0b3c00e841eb06fac4872a2757859e1ceaa6efd984628593b40ca1e19c7d773d00c144c525ac619d18c84a3f4718e2448b2fe324d9ccda2710acade256",
|
|
|
|
"9924a7c8587336bfb118024db8674a14",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"feffe9928665731c6d6a8f9467308308feffe9928665731c",
|
|
|
|
"d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39",
|
|
|
|
"feedfacedeadbeeffeedfacedeadbeefabaddad2",
|
|
|
|
"cafebabefacedbaddecaf888",
|
|
|
|
"3980ca0b3c00e841eb06fac4872a2757859e1ceaa6efd984628593b40ca1e19c7d773d00c144c525ac619d18c84a3f4718e2448b2fe324d9ccda2710",
|
|
|
|
"2519498e80f1478f37ba55bd6d27618c",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"feffe9928665731c6d6a8f9467308308feffe9928665731c",
|
|
|
|
"d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39",
|
|
|
|
"feedfacedeadbeeffeedfacedeadbeefabaddad2",
|
|
|
|
"cafebabefacedbad",
|
|
|
|
"0f10f599ae14a154ed24b36e25324db8c566632ef2bbb34f8347280fc4507057fddc29df9a471f75c66541d4d4dad1c9e93a19a58e8b473fa0f062f7",
|
|
|
|
"65dcc57fcf623a24094fcca40d3533f8",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"feffe9928665731c6d6a8f9467308308feffe9928665731c",
|
|
|
|
"d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39",
|
|
|
|
"feedfacedeadbeeffeedfacedeadbeefabaddad2",
|
|
|
|
"cafebabefacedbad",
|
|
|
|
"0f10f599ae14a154ed24b36e25324db8c566632ef2bbb34f8347280fc4507057fddc29df9a471f75c66541d4d4dad1c9e93a19a58e8b473fa0f062f7",
|
|
|
|
"65dcc57fcf623a24094fcca40d3533f8",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"feffe9928665731c6d6a8f9467308308feffe9928665731c",
|
|
|
|
"d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39",
|
|
|
|
"feedfacedeadbeeffeedfacedeadbeefabaddad2",
|
|
|
|
"9313225df88406e555909c5aff5269aa6a7a9538534f7da1e4c303d2a318a728c3c0c95156809539fcf0e2429a6b525416aedbf5a0de6a57a637b39b",
|
|
|
|
"d27e88681ce3243c4830165a8fdcf9ff1de9a1d8e6b447ef6ef7b79828666e4581e79012af34ddd9e2f037589b292db3e67c036745fa22e7e9b7373b",
|
|
|
|
"dcf566ff291c25bbb8568fc3d376a6d9",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"0000000000000000000000000000000000000000000000000000000000000000",
|
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
"000000000000000000000000",
|
|
|
|
NULL,
|
|
|
|
"530f8afbc74536b9a963b4f1c4cb738b",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"0000000000000000000000000000000000000000000000000000000000000000",
|
|
|
|
"00000000000000000000000000000000",
|
|
|
|
NULL,
|
|
|
|
"000000000000000000000000",
|
|
|
|
"cea7403d4d606b6e074ec5d3baf39d18",
|
|
|
|
"d0d1c8a799996bf0265b98b5d48ab919",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"feffe9928665731c6d6a8f9467308308feffe9928665731c6d6a8f9467308308",
|
|
|
|
"d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b391aafd255",
|
|
|
|
NULL,
|
|
|
|
"cafebabefacedbaddecaf888",
|
|
|
|
"522dc1f099567d07f47f37a32a84427d643a8cdcbfe5c0c97598a2bd2555d1aa8cb08e48590dbb3da7b08b1056828838c5f61e6393ba7a0abcc9f662898015ad",
|
|
|
|
"b094dac5d93471bdec1a502270e3cc6c",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"feffe9928665731c6d6a8f9467308308feffe9928665731c6d6a8f9467308308",
|
|
|
|
"d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39",
|
|
|
|
"feedfacedeadbeeffeedfacedeadbeefabaddad2",
|
|
|
|
"cafebabefacedbaddecaf888",
|
|
|
|
"522dc1f099567d07f47f37a32a84427d643a8cdcbfe5c0c97598a2bd2555d1aa8cb08e48590dbb3da7b08b1056828838c5f61e6393ba7a0abcc9f662",
|
|
|
|
"76fc6ece0f4e1768cddf8853bb2d551b",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"feffe9928665731c6d6a8f9467308308feffe9928665731c6d6a8f9467308308",
|
|
|
|
"d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39",
|
|
|
|
"feedfacedeadbeeffeedfacedeadbeefabaddad2",
|
|
|
|
"cafebabefacedbad",
|
|
|
|
"c3762df1ca787d32ae47c13bf19844cbaf1ae14d0b976afac52ff7d79bba9de0feb582d33934a4f0954cc2363bc73f7862ac430e64abe499f47c9b1f",
|
|
|
|
"3a337dbf46a792c45e454913fe2ea8f2",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"feffe9928665731c6d6a8f9467308308feffe9928665731c6d6a8f9467308308",
|
|
|
|
"d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39",
|
|
|
|
"feedfacedeadbeeffeedfacedeadbeefabaddad2",
|
|
|
|
"9313225df88406e555909c5aff5269aa6a7a9538534f7da1e4c303d2a318a728c3c0c95156809539fcf0e2429a6b525416aedbf5a0de6a57a637b39b",
|
|
|
|
"5a8def2f0c9e53f1f75d7853659e2a20eeb2b22aafde6419a058ab4f6f746bf40fc0c3b780f244452da3ebf1c5d82cdea2418997200ef82e44ae7e3f",
|
|
|
|
"a44a8266ee1c8eb0c8b5d4cf5ae9f19a",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"00000000000000000000000000000000",
|
|
|
|
NULL,
|
|
|
|
"d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b391aafd255522dc1f099567d07f47f37a32a84427d643a8cdcbfe5c0c97598a2bd2555d1aa8cb08e48590dbb3da7b08b1056828838c5f61e6393ba7a0abcc9f662898015ad",
|
|
|
|
"000000000000000000000000",
|
|
|
|
NULL,
|
|
|
|
"5fea793a2d6f974d37e68e0cb8ff9492",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"00000000000000000000000000000000",
|
|
|
|
"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000",
|
|
|
|
NULL,
|
|
|
|
/* This nonce results in 0xfff in counter LSB. */
|
|
|
|
"ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000",
|
|
|
|
"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",
|
|
|
|
"8b307f6b33286d0ab026a9ed3fe1e85f",
|
|
|
|
},
|
|
|
|
};
|
|
|
|
|
|
|
|
static int from_hex(uint8_t *out, char in) {
|
|
|
|
if (in >= '0' && in <= '9') {
|
|
|
|
*out = in - '0';
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
if (in >= 'a' && in <= 'f') {
|
|
|
|
*out = in - 'a' + 10;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
if (in >= 'A' && in <= 'F') {
|
|
|
|
*out = in - 'A' + 10;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int decode_hex(uint8_t **out, size_t *out_len, const char *in,
|
|
|
|
unsigned test_num, const char *description) {
|
|
|
|
if (in == NULL) {
|
|
|
|
*out = NULL;
|
|
|
|
*out_len = 0;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t len = strlen(in);
|
|
|
|
if (len & 1) {
|
|
|
|
fprintf(stderr, "%u: Odd-length %s input.\n", test_num, description);
|
2016-09-05 17:47:25 +01:00
|
|
|
return 0;
|
2014-06-20 20:00:00 +01:00
|
|
|
}
|
|
|
|
|
2016-09-14 17:30:54 +01:00
|
|
|
uint8_t *buf = reinterpret_cast<uint8_t *>(OPENSSL_malloc(len / 2));
|
2014-06-20 20:00:00 +01:00
|
|
|
if (buf == NULL) {
|
|
|
|
fprintf(stderr, "%u: malloc failure.\n", test_num);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2016-09-05 17:47:25 +01:00
|
|
|
for (size_t i = 0; i < len; i += 2) {
|
2014-06-20 20:00:00 +01:00
|
|
|
uint8_t v, v2;
|
|
|
|
if (!from_hex(&v, in[i]) ||
|
|
|
|
!from_hex(&v2, in[i+1])) {
|
2016-05-02 17:57:01 +01:00
|
|
|
fprintf(stderr, "%u: invalid hex digit in %s around offset %zu.\n",
|
Fix build when using Visual Studio 2015 Update 1.
Many of the compatibility issues are described at
https://msdn.microsoft.com/en-us/library/mt612856.aspx. The macros
that suppressed warnings on a per-function basis no longer work in
Update 1, so replace them with #pragmas. Update 1 warns when |size_t|
arguments to |printf| are casted, so stop doing that casting.
Unfortunately, this requires an ugly hack to continue working in
MSVC 2013 as MSVC 2013 doesn't support "%zu". Finally, Update 1 has new
warnings, some of which need to be suppressed.
---
Updated by davidben to give up on suppressing warnings in crypto/x509 and
crypto/x509v3 as those directories aren't changed much from upstream. In each
of these cases, upstream opted just blindly initialize the variable, so do the
same. Also switch C4265 to level 4, per Microsoft's recommendation and work
around a bug in limits.h that happens to get fixed by Google include order
style.
(limits.h is sensitive to whether corecrt.h, pulled in by stddef.h and some
other headers, is included before it. The reason it affected just one file is
we often put the file's header first, which means base.h is pulling in
stddef.h. Relying on this is ugly, but it's no worse than what everything else
is doing and this doesn't seem worth making something as tame as limits.h so
messy to use.)
Change-Id: I02d1f935356899f424d3525d03eca401bfa3e6cd
Reviewed-on: https://boringssl-review.googlesource.com/7480
Reviewed-by: David Benjamin <davidben@google.com>
2016-01-18 08:21:42 +00:00
|
|
|
test_num, description, i);
|
2014-06-20 20:00:00 +01:00
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
buf[i/2] = (v << 4) | v2;
|
|
|
|
}
|
|
|
|
|
|
|
|
*out = buf;
|
|
|
|
*out_len = len/2;
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
err:
|
2015-04-22 21:09:09 +01:00
|
|
|
OPENSSL_free(buf);
|
2014-06-20 20:00:00 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int run_test_case(unsigned test_num, const struct test_case *test) {
|
|
|
|
size_t key_len, plaintext_len, additional_data_len, nonce_len, ciphertext_len,
|
|
|
|
tag_len;
|
|
|
|
uint8_t *key = NULL, *plaintext = NULL, *additional_data = NULL,
|
|
|
|
*nonce = NULL, *ciphertext = NULL, *tag = NULL, *out = NULL;
|
|
|
|
int ret = 0;
|
|
|
|
AES_KEY aes_key;
|
|
|
|
GCM128_CONTEXT ctx;
|
|
|
|
|
|
|
|
if (!decode_hex(&key, &key_len, test->key, test_num, "key") ||
|
|
|
|
!decode_hex(&plaintext, &plaintext_len, test->plaintext, test_num,
|
|
|
|
"plaintext") ||
|
|
|
|
!decode_hex(&additional_data, &additional_data_len, test->additional_data,
|
|
|
|
test_num, "additional_data") ||
|
|
|
|
!decode_hex(&nonce, &nonce_len, test->nonce, test_num, "nonce") ||
|
|
|
|
!decode_hex(&ciphertext, &ciphertext_len, test->ciphertext, test_num,
|
|
|
|
"ciphertext") ||
|
|
|
|
!decode_hex(&tag, &tag_len, test->tag, test_num, "tag")) {
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (plaintext_len != ciphertext_len) {
|
|
|
|
fprintf(stderr, "%u: plaintext and ciphertext have differing lengths.\n",
|
|
|
|
test_num);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (key_len != 16 && key_len != 24 && key_len != 32) {
|
|
|
|
fprintf(stderr, "%u: bad key length.\n", test_num);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tag_len != 16) {
|
|
|
|
fprintf(stderr, "%u: bad tag length.\n", test_num);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2016-09-14 17:30:54 +01:00
|
|
|
out = reinterpret_cast<uint8_t *>(OPENSSL_malloc(plaintext_len));
|
2016-02-12 16:15:35 +00:00
|
|
|
if (plaintext_len != 0 && out == NULL) {
|
2015-05-16 00:11:57 +01:00
|
|
|
goto out;
|
|
|
|
}
|
2014-06-20 20:00:00 +01:00
|
|
|
if (AES_set_encrypt_key(key, key_len*8, &aes_key)) {
|
|
|
|
fprintf(stderr, "%u: AES_set_encrypt_key failed.\n", test_num);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
CRYPTO_gcm128_init(&ctx, &aes_key, (block128_f) AES_encrypt);
|
2015-09-27 07:12:01 +01:00
|
|
|
CRYPTO_gcm128_setiv(&ctx, &aes_key, nonce, nonce_len);
|
2014-06-20 20:00:00 +01:00
|
|
|
memset(out, 0, plaintext_len);
|
|
|
|
if (additional_data) {
|
|
|
|
CRYPTO_gcm128_aad(&ctx, additional_data, additional_data_len);
|
|
|
|
}
|
|
|
|
if (plaintext) {
|
2015-09-27 07:12:01 +01:00
|
|
|
CRYPTO_gcm128_encrypt(&ctx, &aes_key, plaintext, out, plaintext_len);
|
2014-06-20 20:00:00 +01:00
|
|
|
}
|
|
|
|
if (!CRYPTO_gcm128_finish(&ctx, tag, tag_len) ||
|
|
|
|
(ciphertext && memcmp(out, ciphertext, plaintext_len) != 0)) {
|
|
|
|
fprintf(stderr, "%u: encrypt failed.\n", test_num);
|
2015-07-23 03:36:57 +01:00
|
|
|
hexdump(stderr, "got :", out, plaintext_len);
|
|
|
|
hexdump(stderr, "want:", ciphertext, plaintext_len);
|
2014-06-20 20:00:00 +01:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2015-09-27 07:12:01 +01:00
|
|
|
CRYPTO_gcm128_setiv(&ctx, &aes_key, nonce, nonce_len);
|
2014-06-20 20:00:00 +01:00
|
|
|
memset(out, 0, plaintext_len);
|
|
|
|
if (additional_data) {
|
|
|
|
CRYPTO_gcm128_aad(&ctx, additional_data, additional_data_len);
|
|
|
|
}
|
|
|
|
if (ciphertext) {
|
2015-09-27 07:12:01 +01:00
|
|
|
CRYPTO_gcm128_decrypt(&ctx, &aes_key, ciphertext, out, plaintext_len);
|
2014-06-20 20:00:00 +01:00
|
|
|
}
|
|
|
|
if (!CRYPTO_gcm128_finish(&ctx, tag, tag_len)) {
|
|
|
|
fprintf(stderr, "%u: decrypt failed.\n", test_num);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (plaintext && memcmp(out, plaintext, plaintext_len)) {
|
|
|
|
fprintf(stderr, "%u: plaintext doesn't match.\n", test_num);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 1;
|
|
|
|
|
|
|
|
out:
|
2015-04-22 21:09:09 +01:00
|
|
|
OPENSSL_free(key);
|
|
|
|
OPENSSL_free(plaintext);
|
|
|
|
OPENSSL_free(additional_data);
|
|
|
|
OPENSSL_free(nonce);
|
|
|
|
OPENSSL_free(ciphertext);
|
|
|
|
OPENSSL_free(tag);
|
|
|
|
OPENSSL_free(out);
|
2014-06-20 20:00:00 +01:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-11-30 22:53:50 +00:00
|
|
|
static bool TestByteSwap() {
|
|
|
|
return CRYPTO_bswap4(0x01020304) == 0x04030201 &&
|
|
|
|
CRYPTO_bswap8(UINT64_C(0x0102030405060708)) ==
|
|
|
|
UINT64_C(0x0807060504030201);
|
|
|
|
}
|
|
|
|
|
2014-08-20 21:24:00 +01:00
|
|
|
int main(void) {
|
2014-06-20 20:00:00 +01:00
|
|
|
int ret = 0;
|
|
|
|
unsigned i;
|
|
|
|
|
2014-09-12 00:11:15 +01:00
|
|
|
CRYPTO_library_init();
|
|
|
|
|
2016-11-30 22:53:50 +00:00
|
|
|
if (!TestByteSwap()) {
|
|
|
|
ret = 1;
|
|
|
|
}
|
|
|
|
|
2014-06-20 20:00:00 +01:00
|
|
|
for (i = 0; i < sizeof(test_cases) / sizeof(struct test_case); i++) {
|
|
|
|
if (!run_test_case(i, &test_cases[i])) {
|
|
|
|
ret = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ret == 0) {
|
|
|
|
printf("PASS\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|