Add a driver for Wycheproof CMAC tests.
Change-Id: Iafe81d22647c99167ab27a5345cfa970755112ac Reviewed-on: https://boringssl-review.googlesource.com/28465 Commit-Queue: David Benjamin <davidben@google.com> CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org> Reviewed-by: Adam Langley <agl@google.com>
This commit is contained in:
parent
370bb35627
commit
62abcebb01
@ -15,6 +15,7 @@
|
|||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
|
|
||||||
#include <algorithm>
|
#include <algorithm>
|
||||||
|
#include <vector>
|
||||||
|
|
||||||
#include <gtest/gtest.h>
|
#include <gtest/gtest.h>
|
||||||
|
|
||||||
@ -22,7 +23,9 @@
|
|||||||
#include <openssl/cmac.h>
|
#include <openssl/cmac.h>
|
||||||
#include <openssl/mem.h>
|
#include <openssl/mem.h>
|
||||||
|
|
||||||
|
#include "../test/file_test.h"
|
||||||
#include "../test/test_util.h"
|
#include "../test/test_util.h"
|
||||||
|
#include "../test/wycheproof_util.h"
|
||||||
|
|
||||||
|
|
||||||
static void test(const char *name, const uint8_t *key, size_t key_len,
|
static void test(const char *name, const uint8_t *key, size_t key_len,
|
||||||
@ -116,3 +119,67 @@ TEST(CMACTest, RFC4493TestVectors) {
|
|||||||
test("RFC 4493 #3", kKey, sizeof(kKey), kMsg3, sizeof(kMsg3), kOut3);
|
test("RFC 4493 #3", kKey, sizeof(kKey), kMsg3, sizeof(kMsg3), kOut3);
|
||||||
test("RFC 4493 #4", kKey, sizeof(kKey), kMsg4, sizeof(kMsg4), kOut4);
|
test("RFC 4493 #4", kKey, sizeof(kKey), kMsg4, sizeof(kMsg4), kOut4);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
TEST(CMACTest, Wycheproof) {
|
||||||
|
FileTestGTest("third_party/wycheproof_testvectors/aes_cmac_test.txt",
|
||||||
|
[](FileTest *t) {
|
||||||
|
std::string key_size, tag_size;
|
||||||
|
ASSERT_TRUE(t->GetInstruction(&key_size, "keySize"));
|
||||||
|
ASSERT_TRUE(t->GetInstruction(&tag_size, "tagSize"));
|
||||||
|
WycheproofResult result;
|
||||||
|
ASSERT_TRUE(GetWycheproofResult(t, &result));
|
||||||
|
std::vector<uint8_t> key, msg, tag;
|
||||||
|
ASSERT_TRUE(t->GetBytes(&key, "key"));
|
||||||
|
ASSERT_TRUE(t->GetBytes(&msg, "msg"));
|
||||||
|
ASSERT_TRUE(t->GetBytes(&tag, "tag"));
|
||||||
|
|
||||||
|
const EVP_CIPHER *cipher;
|
||||||
|
switch (atoi(key_size.c_str())) {
|
||||||
|
case 128:
|
||||||
|
cipher = EVP_aes_128_cbc();
|
||||||
|
break;
|
||||||
|
case 192:
|
||||||
|
cipher = EVP_aes_192_cbc();
|
||||||
|
break;
|
||||||
|
case 256:
|
||||||
|
cipher = EVP_aes_256_cbc();
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
// Some test vectors intentionally give the wrong key size. Our API
|
||||||
|
// requires the caller pick the sized CBC primitive, so these tests
|
||||||
|
// aren't useful for us.
|
||||||
|
EXPECT_EQ(WycheproofResult::kInvalid, result);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
size_t tag_len = static_cast<size_t>(atoi(tag_size.c_str())) / 8;
|
||||||
|
|
||||||
|
uint8_t out[16];
|
||||||
|
bssl::UniquePtr<CMAC_CTX> ctx(CMAC_CTX_new());
|
||||||
|
ASSERT_TRUE(ctx);
|
||||||
|
ASSERT_TRUE(CMAC_Init(ctx.get(), key.data(), key.size(), cipher, NULL));
|
||||||
|
ASSERT_TRUE(CMAC_Update(ctx.get(), msg.data(), msg.size()));
|
||||||
|
size_t out_len;
|
||||||
|
ASSERT_TRUE(CMAC_Final(ctx.get(), out, &out_len));
|
||||||
|
// Truncate the tag, if requested.
|
||||||
|
out_len = std::min(out_len, tag_len);
|
||||||
|
|
||||||
|
if (result == WycheproofResult::kValid) {
|
||||||
|
EXPECT_EQ(Bytes(tag), Bytes(out, out_len));
|
||||||
|
|
||||||
|
// Test the streaming API as well.
|
||||||
|
ASSERT_TRUE(CMAC_Reset(ctx.get()));
|
||||||
|
for (uint8_t b : msg) {
|
||||||
|
ASSERT_TRUE(CMAC_Update(ctx.get(), &b, 1));
|
||||||
|
}
|
||||||
|
ASSERT_TRUE(CMAC_Final(ctx.get(), out, &out_len));
|
||||||
|
out_len = std::min(out_len, tag_len);
|
||||||
|
EXPECT_EQ(Bytes(tag), Bytes(out, out_len));
|
||||||
|
} else {
|
||||||
|
// Wycheproof's invalid tests assume the implementation internally does
|
||||||
|
// the comparison, whereas our API only computes the tag. Check that
|
||||||
|
// they're not equal, but these tests are mostly not useful for us.
|
||||||
|
EXPECT_NE(Bytes(tag), Bytes(out, out_len));
|
||||||
|
}
|
||||||
|
});
|
||||||
|
}
|
||||||
|
@ -60,6 +60,7 @@ set(
|
|||||||
crypto/x509/some_names2.pem
|
crypto/x509/some_names2.pem
|
||||||
crypto/x509/some_names3.pem
|
crypto/x509/some_names3.pem
|
||||||
third_party/wycheproof_testvectors/aes_cbc_pkcs5_test.txt
|
third_party/wycheproof_testvectors/aes_cbc_pkcs5_test.txt
|
||||||
|
third_party/wycheproof_testvectors/aes_cmac_test.txt
|
||||||
third_party/wycheproof_testvectors/aes_gcm_siv_test.txt
|
third_party/wycheproof_testvectors/aes_gcm_siv_test.txt
|
||||||
third_party/wycheproof_testvectors/aes_gcm_test.txt
|
third_party/wycheproof_testvectors/aes_gcm_test.txt
|
||||||
third_party/wycheproof_testvectors/chacha20_poly1305_test.txt
|
third_party/wycheproof_testvectors/chacha20_poly1305_test.txt
|
||||||
|
2069
third_party/wycheproof_testvectors/aes_cmac_test.txt
vendored
Normal file
2069
third_party/wycheproof_testvectors/aes_cmac_test.txt
vendored
Normal file
File diff suppressed because it is too large
Load Diff
@ -228,6 +228,7 @@ func convertWycheproof(jsonPath, txtPath string) error {
|
|||||||
func main() {
|
func main() {
|
||||||
jsonPaths := []string{
|
jsonPaths := []string{
|
||||||
"aes_cbc_pkcs5_test.json",
|
"aes_cbc_pkcs5_test.json",
|
||||||
|
"aes_cmac_test.json",
|
||||||
"aes_gcm_siv_test.json",
|
"aes_gcm_siv_test.json",
|
||||||
"aes_gcm_test.json",
|
"aes_gcm_test.json",
|
||||||
"chacha20_poly1305_test.json",
|
"chacha20_poly1305_test.json",
|
||||||
|
Loading…
Reference in New Issue
Block a user