mirror of
https://github.com/henrydcase/nobs.git
synced 2024-11-25 00:21:29 +00:00
20fffc2f35
This change set modifies build metadata to add support for ppc64le (POWER9) and riscv64 (RISC-V). The arm64 and amd64 assembler implementations are architecture specific and do not support ppc64le or riscv64. On ppc64le or riscv64 a generic implementation is chosen. The drbg/internal/aes/cipher_noasm.go file was written by @mixmasala and myself. The csidh and sidh tests are extremely slow (>30m) on RISC-V using the sifive,u54-mc (HiFive Unleashed) development board. The test timeout is set to infinity on RISC-V by the top level Makefile as at least one test does not finish within the default 10 minutes on RISC-V. On RISC-V the csidh test finishes after around 30 minutes, the sidh test finishes after around 71 minutes. These changes were tested with amd64 (Intel Core i7), arm64 (Raspberry Pi 4b), ppc64le (Talos POWER9, PowerNV T2P9D01 REV 1.00), and riscv64 (HighFive Unleashed, rv64imafdc,sifive,u54-mc). The kernel versions of those systems follows: Linux rpi4 5.13.0-1009-raspi #10-Ubuntu SMP PREEMPT Mon Oct 25 13:58:43 UTC 2021 aarch64 aarch64 aarch64 GNU/Linux Linux i7 5.8.0-63-generic #71-Ubuntu SMP Tue Jul 13 15:59:12 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux Linux power9 5.11.0-34-generic #36-Ubuntu SMP Thu Aug 26 19:19:54 UTC 2021 ppc64le ppc64le ppc64le GNU/Linux Linux risc-v-unleashed-000 5.11.0-1022-generic #23~20.04.1-Ubuntu SMP Thu Oct 21 10:16:27 UTC 2021 riscv64 riscv64 riscv64 GNU/Linux
391 lines
11 KiB
Go
391 lines
11 KiB
Go
// Copyright 2009 The Go Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
// +build noasm amd64 arm64 ppc64le riscv64
|
|
|
|
|
|
package aes
|
|
|
|
import (
|
|
"testing"
|
|
)
|
|
|
|
// See const.go for overview of math here.
|
|
|
|
// Test that powx is initialized correctly.
|
|
// (Can adapt this code to generate it too.)
|
|
func TestPowx(t *testing.T) {
|
|
p := 1
|
|
for i := 0; i < len(powx); i++ {
|
|
if powx[i] != byte(p) {
|
|
t.Errorf("powx[%d] = %#x, want %#x", i, powx[i], p)
|
|
}
|
|
p <<= 1
|
|
if p&0x100 != 0 {
|
|
p ^= poly
|
|
}
|
|
}
|
|
}
|
|
|
|
// Multiply b and c as GF(2) polynomials modulo poly
|
|
func mul(b, c uint32) uint32 {
|
|
i := b
|
|
j := c
|
|
s := uint32(0)
|
|
for k := uint32(1); k < 0x100 && j != 0; k <<= 1 {
|
|
// Invariant: k == 1<<n, i == b * xⁿ
|
|
|
|
if j&k != 0 {
|
|
// s += i in GF(2); xor in binary
|
|
s ^= i
|
|
j ^= k // turn off bit to end loop early
|
|
}
|
|
|
|
// i *= x in GF(2) modulo the polynomial
|
|
i <<= 1
|
|
if i&0x100 != 0 {
|
|
i ^= poly
|
|
}
|
|
}
|
|
return s
|
|
}
|
|
|
|
// Test all mul inputs against bit-by-bit n² algorithm.
|
|
func TestMul(t *testing.T) {
|
|
for i := uint32(0); i < 256; i++ {
|
|
for j := uint32(0); j < 256; j++ {
|
|
// Multiply i, j bit by bit.
|
|
s := uint8(0)
|
|
for k := uint(0); k < 8; k++ {
|
|
for l := uint(0); l < 8; l++ {
|
|
if i&(1<<k) != 0 && j&(1<<l) != 0 {
|
|
s ^= powx[k+l]
|
|
}
|
|
}
|
|
}
|
|
if x := mul(i, j); x != uint32(s) {
|
|
t.Fatalf("mul(%#x, %#x) = %#x, want %#x", i, j, x, s)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Check that S-boxes are inverses of each other.
|
|
// They have more structure that we could test,
|
|
// but if this sanity check passes, we'll assume
|
|
// the cut and paste from the FIPS PDF worked.
|
|
func TestSboxes(t *testing.T) {
|
|
for i := 0; i < 256; i++ {
|
|
if j := sbox0[sbox1[i]]; j != byte(i) {
|
|
t.Errorf("sbox0[sbox1[%#x]] = %#x", i, j)
|
|
}
|
|
if j := sbox1[sbox0[i]]; j != byte(i) {
|
|
t.Errorf("sbox1[sbox0[%#x]] = %#x", i, j)
|
|
}
|
|
}
|
|
}
|
|
|
|
// Test that encryption tables are correct.
|
|
// (Can adapt this code to generate them too.)
|
|
func TestTe(t *testing.T) {
|
|
for i := 0; i < 256; i++ {
|
|
s := uint32(sbox0[i])
|
|
s2 := mul(s, 2)
|
|
s3 := mul(s, 3)
|
|
w := s2<<24 | s<<16 | s<<8 | s3
|
|
te := [][256]uint32{te0, te1, te2, te3}
|
|
for j := 0; j < 4; j++ {
|
|
if x := te[j][i]; x != w {
|
|
t.Fatalf("te[%d][%d] = %#x, want %#x", j, i, x, w)
|
|
}
|
|
w = w<<24 | w>>8
|
|
}
|
|
}
|
|
}
|
|
|
|
// Test that decryption tables are correct.
|
|
// (Can adapt this code to generate them too.)
|
|
func TestTd(t *testing.T) {
|
|
for i := 0; i < 256; i++ {
|
|
s := uint32(sbox1[i])
|
|
s9 := mul(s, 0x9)
|
|
sb := mul(s, 0xb)
|
|
sd := mul(s, 0xd)
|
|
se := mul(s, 0xe)
|
|
w := se<<24 | s9<<16 | sd<<8 | sb
|
|
td := [][256]uint32{td0, td1, td2, td3}
|
|
for j := 0; j < 4; j++ {
|
|
if x := td[j][i]; x != w {
|
|
t.Fatalf("td[%d][%d] = %#x, want %#x", j, i, x, w)
|
|
}
|
|
w = w<<24 | w>>8
|
|
}
|
|
}
|
|
}
|
|
|
|
// Test vectors are from FIPS 197:
|
|
// https://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
|
|
|
|
// Appendix A of FIPS 197: Key expansion examples
|
|
type KeyTest struct {
|
|
key []byte
|
|
enc []uint32
|
|
dec []uint32 // decryption expansion; not in FIPS 197, computed from C implementation.
|
|
}
|
|
|
|
var keyTests = []KeyTest{
|
|
{
|
|
// A.1. Expansion of a 128-bit Cipher Key
|
|
[]byte{0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c},
|
|
[]uint32{
|
|
0x2b7e1516, 0x28aed2a6, 0xabf71588, 0x09cf4f3c,
|
|
0xa0fafe17, 0x88542cb1, 0x23a33939, 0x2a6c7605,
|
|
0xf2c295f2, 0x7a96b943, 0x5935807a, 0x7359f67f,
|
|
0x3d80477d, 0x4716fe3e, 0x1e237e44, 0x6d7a883b,
|
|
0xef44a541, 0xa8525b7f, 0xb671253b, 0xdb0bad00,
|
|
0xd4d1c6f8, 0x7c839d87, 0xcaf2b8bc, 0x11f915bc,
|
|
0x6d88a37a, 0x110b3efd, 0xdbf98641, 0xca0093fd,
|
|
0x4e54f70e, 0x5f5fc9f3, 0x84a64fb2, 0x4ea6dc4f,
|
|
0xead27321, 0xb58dbad2, 0x312bf560, 0x7f8d292f,
|
|
0xac7766f3, 0x19fadc21, 0x28d12941, 0x575c006e,
|
|
0xd014f9a8, 0xc9ee2589, 0xe13f0cc8, 0xb6630ca6,
|
|
},
|
|
[]uint32{
|
|
0xd014f9a8, 0xc9ee2589, 0xe13f0cc8, 0xb6630ca6,
|
|
0xc7b5a63, 0x1319eafe, 0xb0398890, 0x664cfbb4,
|
|
0xdf7d925a, 0x1f62b09d, 0xa320626e, 0xd6757324,
|
|
0x12c07647, 0xc01f22c7, 0xbc42d2f3, 0x7555114a,
|
|
0x6efcd876, 0xd2df5480, 0x7c5df034, 0xc917c3b9,
|
|
0x6ea30afc, 0xbc238cf6, 0xae82a4b4, 0xb54a338d,
|
|
0x90884413, 0xd280860a, 0x12a12842, 0x1bc89739,
|
|
0x7c1f13f7, 0x4208c219, 0xc021ae48, 0x969bf7b,
|
|
0xcc7505eb, 0x3e17d1ee, 0x82296c51, 0xc9481133,
|
|
0x2b3708a7, 0xf262d405, 0xbc3ebdbf, 0x4b617d62,
|
|
0x2b7e1516, 0x28aed2a6, 0xabf71588, 0x9cf4f3c,
|
|
},
|
|
},
|
|
{
|
|
// A.2. Expansion of a 192-bit Cipher Key
|
|
[]byte{
|
|
0x8e, 0x73, 0xb0, 0xf7, 0xda, 0x0e, 0x64, 0x52, 0xc8, 0x10, 0xf3, 0x2b, 0x80, 0x90, 0x79, 0xe5,
|
|
0x62, 0xf8, 0xea, 0xd2, 0x52, 0x2c, 0x6b, 0x7b,
|
|
},
|
|
[]uint32{
|
|
0x8e73b0f7, 0xda0e6452, 0xc810f32b, 0x809079e5,
|
|
0x62f8ead2, 0x522c6b7b, 0xfe0c91f7, 0x2402f5a5,
|
|
0xec12068e, 0x6c827f6b, 0x0e7a95b9, 0x5c56fec2,
|
|
0x4db7b4bd, 0x69b54118, 0x85a74796, 0xe92538fd,
|
|
0xe75fad44, 0xbb095386, 0x485af057, 0x21efb14f,
|
|
0xa448f6d9, 0x4d6dce24, 0xaa326360, 0x113b30e6,
|
|
0xa25e7ed5, 0x83b1cf9a, 0x27f93943, 0x6a94f767,
|
|
0xc0a69407, 0xd19da4e1, 0xec1786eb, 0x6fa64971,
|
|
0x485f7032, 0x22cb8755, 0xe26d1352, 0x33f0b7b3,
|
|
0x40beeb28, 0x2f18a259, 0x6747d26b, 0x458c553e,
|
|
0xa7e1466c, 0x9411f1df, 0x821f750a, 0xad07d753,
|
|
0xca400538, 0x8fcc5006, 0x282d166a, 0xbc3ce7b5,
|
|
0xe98ba06f, 0x448c773c, 0x8ecc7204, 0x01002202,
|
|
},
|
|
nil,
|
|
},
|
|
{
|
|
// A.3. Expansion of a 256-bit Cipher Key
|
|
[]byte{
|
|
0x60, 0x3d, 0xeb, 0x10, 0x15, 0xca, 0x71, 0xbe, 0x2b, 0x73, 0xae, 0xf0, 0x85, 0x7d, 0x77, 0x81,
|
|
0x1f, 0x35, 0x2c, 0x07, 0x3b, 0x61, 0x08, 0xd7, 0x2d, 0x98, 0x10, 0xa3, 0x09, 0x14, 0xdf, 0xf4,
|
|
},
|
|
[]uint32{
|
|
0x603deb10, 0x15ca71be, 0x2b73aef0, 0x857d7781,
|
|
0x1f352c07, 0x3b6108d7, 0x2d9810a3, 0x0914dff4,
|
|
0x9ba35411, 0x8e6925af, 0xa51a8b5f, 0x2067fcde,
|
|
0xa8b09c1a, 0x93d194cd, 0xbe49846e, 0xb75d5b9a,
|
|
0xd59aecb8, 0x5bf3c917, 0xfee94248, 0xde8ebe96,
|
|
0xb5a9328a, 0x2678a647, 0x98312229, 0x2f6c79b3,
|
|
0x812c81ad, 0xdadf48ba, 0x24360af2, 0xfab8b464,
|
|
0x98c5bfc9, 0xbebd198e, 0x268c3ba7, 0x09e04214,
|
|
0x68007bac, 0xb2df3316, 0x96e939e4, 0x6c518d80,
|
|
0xc814e204, 0x76a9fb8a, 0x5025c02d, 0x59c58239,
|
|
0xde136967, 0x6ccc5a71, 0xfa256395, 0x9674ee15,
|
|
0x5886ca5d, 0x2e2f31d7, 0x7e0af1fa, 0x27cf73c3,
|
|
0x749c47ab, 0x18501dda, 0xe2757e4f, 0x7401905a,
|
|
0xcafaaae3, 0xe4d59b34, 0x9adf6ace, 0xbd10190d,
|
|
0xfe4890d1, 0xe6188d0b, 0x046df344, 0x706c631e,
|
|
},
|
|
nil,
|
|
},
|
|
}
|
|
|
|
// Test key expansion against FIPS 197 examples.
|
|
func TestExpandKey(t *testing.T) {
|
|
L:
|
|
for i, tt := range keyTests {
|
|
enc := make([]uint32, len(tt.enc))
|
|
var dec []uint32
|
|
if tt.dec != nil {
|
|
dec = make([]uint32, len(tt.dec))
|
|
}
|
|
// This test could only test Go version of expandKey because asm
|
|
// version might use different memory layout for expanded keys
|
|
// This is OK because we don't expose expanded keys to the outside
|
|
expandKeyGo(tt.key, enc, dec)
|
|
for j, v := range enc {
|
|
if v != tt.enc[j] {
|
|
t.Errorf("key %d: enc[%d] = %#x, want %#x", i, j, v, tt.enc[j])
|
|
continue L
|
|
}
|
|
}
|
|
for j, v := range dec {
|
|
if v != tt.dec[j] {
|
|
t.Errorf("key %d: dec[%d] = %#x, want %#x", i, j, v, tt.dec[j])
|
|
continue L
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Appendix B, C of FIPS 197: Cipher examples, Example vectors.
|
|
type CryptTest struct {
|
|
key []byte
|
|
in []byte
|
|
out []byte
|
|
}
|
|
|
|
var encryptTests = []CryptTest{
|
|
{
|
|
// Appendix B.
|
|
[]byte{0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c},
|
|
[]byte{0x32, 0x43, 0xf6, 0xa8, 0x88, 0x5a, 0x30, 0x8d, 0x31, 0x31, 0x98, 0xa2, 0xe0, 0x37, 0x07, 0x34},
|
|
[]byte{0x39, 0x25, 0x84, 0x1d, 0x02, 0xdc, 0x09, 0xfb, 0xdc, 0x11, 0x85, 0x97, 0x19, 0x6a, 0x0b, 0x32},
|
|
},
|
|
{
|
|
// Appendix C.1. AES-128
|
|
[]byte{0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f},
|
|
[]byte{0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff},
|
|
[]byte{0x69, 0xc4, 0xe0, 0xd8, 0x6a, 0x7b, 0x04, 0x30, 0xd8, 0xcd, 0xb7, 0x80, 0x70, 0xb4, 0xc5, 0x5a},
|
|
},
|
|
{
|
|
// Appendix C.2. AES-192
|
|
[]byte{0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
|
|
0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
|
|
},
|
|
[]byte{0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff},
|
|
[]byte{0xdd, 0xa9, 0x7c, 0xa4, 0x86, 0x4c, 0xdf, 0xe0, 0x6e, 0xaf, 0x70, 0xa0, 0xec, 0x0d, 0x71, 0x91},
|
|
},
|
|
{
|
|
// Appendix C.3. AES-256
|
|
[]byte{0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
|
|
0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f,
|
|
},
|
|
[]byte{0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff},
|
|
[]byte{0x8e, 0xa2, 0xb7, 0xca, 0x51, 0x67, 0x45, 0xbf, 0xea, 0xfc, 0x49, 0x90, 0x4b, 0x49, 0x60, 0x89},
|
|
},
|
|
}
|
|
|
|
// Test Cipher Encrypt method against FIPS 197 examples.
|
|
func TestCipherEncrypt(t *testing.T) {
|
|
c := NewCipher()
|
|
for i, tt := range encryptTests {
|
|
err := c.SetKey(tt.key)
|
|
if err != nil {
|
|
t.Errorf("NewCipher(%d bytes) = %s", len(tt.key), err)
|
|
continue
|
|
}
|
|
out := make([]byte, len(tt.in))
|
|
c.Encrypt(out, tt.in)
|
|
for j, v := range out {
|
|
if v != tt.out[j] {
|
|
t.Errorf("Cipher.Encrypt %d: out[%d] = %#x, want %#x", i, j, v, tt.out[j])
|
|
break
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Test Cipher Decrypt against FIPS 197 examples.
|
|
func TestCipherDecrypt(t *testing.T) {
|
|
for i, tt := range encryptTests {
|
|
c := NewCipher()
|
|
err := c.SetKey(tt.key)
|
|
if err != nil {
|
|
t.Errorf("NewCipher(%d bytes) = %s", len(tt.key), err)
|
|
continue
|
|
}
|
|
plain := make([]byte, len(tt.in))
|
|
c.Decrypt(plain, tt.out)
|
|
for j, v := range plain {
|
|
if v != tt.in[j] {
|
|
t.Errorf("decryptBlock %d: plain[%d] = %#x, want %#x", i, j, v, tt.in[j])
|
|
break
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Test short input/output.
|
|
// Assembly used to not notice.
|
|
// See issue 7928.
|
|
func TestShortBlocks(t *testing.T) {
|
|
bytes := func(n int) []byte { return make([]byte, n) }
|
|
|
|
c := NewCipher()
|
|
c.SetKey(bytes(16))
|
|
|
|
mustPanic(t, "crypto/aes: input not full block", func() { c.Encrypt(bytes(1), bytes(1)) })
|
|
mustPanic(t, "crypto/aes: input not full block", func() { c.Decrypt(bytes(1), bytes(1)) })
|
|
mustPanic(t, "crypto/aes: input not full block", func() { c.Encrypt(bytes(100), bytes(1)) })
|
|
mustPanic(t, "crypto/aes: input not full block", func() { c.Decrypt(bytes(100), bytes(1)) })
|
|
mustPanic(t, "crypto/aes: output not full block", func() { c.Encrypt(bytes(1), bytes(100)) })
|
|
mustPanic(t, "crypto/aes: output not full block", func() { c.Decrypt(bytes(1), bytes(100)) })
|
|
}
|
|
|
|
func mustPanic(t *testing.T, msg string, f func()) {
|
|
defer func() {
|
|
err := recover()
|
|
if err == nil {
|
|
t.Errorf("function did not panic, wanted %q", msg)
|
|
} else if err != msg {
|
|
t.Errorf("got panic %v, wanted %q", err, msg)
|
|
}
|
|
}()
|
|
f()
|
|
}
|
|
|
|
func BenchmarkEncrypt(b *testing.B) {
|
|
tt := encryptTests[0]
|
|
c := NewCipher()
|
|
err := c.SetKey(tt.key)
|
|
if err != nil {
|
|
b.Fatal("NewCipher:", err)
|
|
}
|
|
out := make([]byte, len(tt.in))
|
|
b.SetBytes(int64(len(out)))
|
|
b.ResetTimer()
|
|
for i := 0; i < b.N; i++ {
|
|
c.Encrypt(out, tt.in)
|
|
}
|
|
}
|
|
|
|
func BenchmarkDecrypt(b *testing.B) {
|
|
tt := encryptTests[0]
|
|
c := NewCipher()
|
|
err := c.SetKey(tt.key)
|
|
if err != nil {
|
|
b.Fatal("NewCipher:", err)
|
|
}
|
|
out := make([]byte, len(tt.out))
|
|
b.SetBytes(int64(len(out)))
|
|
b.ResetTimer()
|
|
for i := 0; i < b.N; i++ {
|
|
c.Decrypt(out, tt.out)
|
|
}
|
|
}
|
|
|
|
func BenchmarkExpand(b *testing.B) {
|
|
tt := encryptTests[0]
|
|
c := NewCipher()
|
|
c.SetKey(tt.key)
|
|
b.ResetTimer()
|
|
for i := 0; i < b.N; i++ {
|
|
expandKey(tt.key, c.enc[:], c.dec[:])
|
|
}
|
|
}
|