Add a driver for Wycheproof CMAC tests.
Change-Id: Iafe81d22647c99167ab27a5345cfa970755112ac Reviewed-on: https://boringssl-review.googlesource.com/28465 Commit-Queue: David Benjamin <davidben@google.com> CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org> Reviewed-by: Adam Langley <agl@google.com>
This commit is contained in:
parent
370bb35627
commit
62abcebb01
@ -15,6 +15,7 @@
|
||||
#include <stdio.h>
|
||||
|
||||
#include <algorithm>
|
||||
#include <vector>
|
||||
|
||||
#include <gtest/gtest.h>
|
||||
|
||||
@ -22,7 +23,9 @@
|
||||
#include <openssl/cmac.h>
|
||||
#include <openssl/mem.h>
|
||||
|
||||
#include "../test/file_test.h"
|
||||
#include "../test/test_util.h"
|
||||
#include "../test/wycheproof_util.h"
|
||||
|
||||
|
||||
static void test(const char *name, const uint8_t *key, size_t key_len,
|
||||
@ -116,3 +119,67 @@ TEST(CMACTest, RFC4493TestVectors) {
|
||||
test("RFC 4493 #3", kKey, sizeof(kKey), kMsg3, sizeof(kMsg3), kOut3);
|
||||
test("RFC 4493 #4", kKey, sizeof(kKey), kMsg4, sizeof(kMsg4), kOut4);
|
||||
}
|
||||
|
||||
TEST(CMACTest, Wycheproof) {
|
||||
FileTestGTest("third_party/wycheproof_testvectors/aes_cmac_test.txt",
|
||||
[](FileTest *t) {
|
||||
std::string key_size, tag_size;
|
||||
ASSERT_TRUE(t->GetInstruction(&key_size, "keySize"));
|
||||
ASSERT_TRUE(t->GetInstruction(&tag_size, "tagSize"));
|
||||
WycheproofResult result;
|
||||
ASSERT_TRUE(GetWycheproofResult(t, &result));
|
||||
std::vector<uint8_t> key, msg, tag;
|
||||
ASSERT_TRUE(t->GetBytes(&key, "key"));
|
||||
ASSERT_TRUE(t->GetBytes(&msg, "msg"));
|
||||
ASSERT_TRUE(t->GetBytes(&tag, "tag"));
|
||||
|
||||
const EVP_CIPHER *cipher;
|
||||
switch (atoi(key_size.c_str())) {
|
||||
case 128:
|
||||
cipher = EVP_aes_128_cbc();
|
||||
break;
|
||||
case 192:
|
||||
cipher = EVP_aes_192_cbc();
|
||||
break;
|
||||
case 256:
|
||||
cipher = EVP_aes_256_cbc();
|
||||
break;
|
||||
default:
|
||||
// Some test vectors intentionally give the wrong key size. Our API
|
||||
// requires the caller pick the sized CBC primitive, so these tests
|
||||
// aren't useful for us.
|
||||
EXPECT_EQ(WycheproofResult::kInvalid, result);
|
||||
return;
|
||||
}
|
||||
|
||||
size_t tag_len = static_cast<size_t>(atoi(tag_size.c_str())) / 8;
|
||||
|
||||
uint8_t out[16];
|
||||
bssl::UniquePtr<CMAC_CTX> ctx(CMAC_CTX_new());
|
||||
ASSERT_TRUE(ctx);
|
||||
ASSERT_TRUE(CMAC_Init(ctx.get(), key.data(), key.size(), cipher, NULL));
|
||||
ASSERT_TRUE(CMAC_Update(ctx.get(), msg.data(), msg.size()));
|
||||
size_t out_len;
|
||||
ASSERT_TRUE(CMAC_Final(ctx.get(), out, &out_len));
|
||||
// Truncate the tag, if requested.
|
||||
out_len = std::min(out_len, tag_len);
|
||||
|
||||
if (result == WycheproofResult::kValid) {
|
||||
EXPECT_EQ(Bytes(tag), Bytes(out, out_len));
|
||||
|
||||
// Test the streaming API as well.
|
||||
ASSERT_TRUE(CMAC_Reset(ctx.get()));
|
||||
for (uint8_t b : msg) {
|
||||
ASSERT_TRUE(CMAC_Update(ctx.get(), &b, 1));
|
||||
}
|
||||
ASSERT_TRUE(CMAC_Final(ctx.get(), out, &out_len));
|
||||
out_len = std::min(out_len, tag_len);
|
||||
EXPECT_EQ(Bytes(tag), Bytes(out, out_len));
|
||||
} else {
|
||||
// Wycheproof's invalid tests assume the implementation internally does
|
||||
// the comparison, whereas our API only computes the tag. Check that
|
||||
// they're not equal, but these tests are mostly not useful for us.
|
||||
EXPECT_NE(Bytes(tag), Bytes(out, out_len));
|
||||
}
|
||||
});
|
||||
}
|
||||
|
@ -60,6 +60,7 @@ set(
|
||||
crypto/x509/some_names2.pem
|
||||
crypto/x509/some_names3.pem
|
||||
third_party/wycheproof_testvectors/aes_cbc_pkcs5_test.txt
|
||||
third_party/wycheproof_testvectors/aes_cmac_test.txt
|
||||
third_party/wycheproof_testvectors/aes_gcm_siv_test.txt
|
||||
third_party/wycheproof_testvectors/aes_gcm_test.txt
|
||||
third_party/wycheproof_testvectors/chacha20_poly1305_test.txt
|
||||
|
2069
third_party/wycheproof_testvectors/aes_cmac_test.txt
vendored
Normal file
2069
third_party/wycheproof_testvectors/aes_cmac_test.txt
vendored
Normal file
File diff suppressed because it is too large
Load Diff
@ -228,6 +228,7 @@ func convertWycheproof(jsonPath, txtPath string) error {
|
||||
func main() {
|
||||
jsonPaths := []string{
|
||||
"aes_cbc_pkcs5_test.json",
|
||||
"aes_cmac_test.json",
|
||||
"aes_gcm_siv_test.json",
|
||||
"aes_gcm_test.json",
|
||||
"chacha20_poly1305_test.json",
|
||||
|
Loading…
Reference in New Issue
Block a user