forked from wolfSSL/wolfssl
Separated out the AES-GCM test as its own test case.
This commit is contained in:
@ -99,6 +99,7 @@ int rabbit_test();
|
|||||||
int des_test();
|
int des_test();
|
||||||
int des3_test();
|
int des3_test();
|
||||||
int aes_test();
|
int aes_test();
|
||||||
|
int aesgcm_test();
|
||||||
int rsa_test();
|
int rsa_test();
|
||||||
int dh_test();
|
int dh_test();
|
||||||
int dsa_test();
|
int dsa_test();
|
||||||
@ -233,6 +234,13 @@ void ctaocrypt_test(void* args)
|
|||||||
err_sys("AES test failed!\n", ret);
|
err_sys("AES test failed!\n", ret);
|
||||||
else
|
else
|
||||||
printf( "AES test passed!\n");
|
printf( "AES test passed!\n");
|
||||||
|
|
||||||
|
#ifdef HAVE_AESGCM
|
||||||
|
if ( (ret = aesgcm_test()) )
|
||||||
|
err_sys("AES-GCM test failed!\n", ret);
|
||||||
|
else
|
||||||
|
printf( "AES-GCM test passed!\n");
|
||||||
|
#endif
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
if ( (ret = random_test()) )
|
if ( (ret = random_test()) )
|
||||||
@ -1144,93 +1152,100 @@ int aes_test()
|
|||||||
}
|
}
|
||||||
#endif /* CYASSL_AES_COUNTER */
|
#endif /* CYASSL_AES_COUNTER */
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
#ifdef HAVE_AESGCM
|
#ifdef HAVE_AESGCM
|
||||||
|
int aesgcm_test()
|
||||||
|
{
|
||||||
|
Aes enc;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* This is Test Case 16 from the document Galois/
|
||||||
|
* Counter Mode of Operation (GCM) by McGrew and
|
||||||
|
* Viega.
|
||||||
|
*/
|
||||||
|
const byte k[] =
|
||||||
{
|
{
|
||||||
/*
|
0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c,
|
||||||
* This is Test Case 16 from the document Galois/
|
0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08,
|
||||||
* Counter Mode of Operation (GCM) by McGrew and
|
0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c,
|
||||||
* Viega.
|
0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08
|
||||||
*/
|
};
|
||||||
const byte k[] =
|
|
||||||
{
|
|
||||||
0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c,
|
|
||||||
0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08,
|
|
||||||
0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c,
|
|
||||||
0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08
|
|
||||||
};
|
|
||||||
|
|
||||||
const byte iv[] =
|
const byte iv[] =
|
||||||
{
|
{
|
||||||
0xca, 0xfe, 0xba, 0xbe, 0xfa, 0xce, 0xdb, 0xad,
|
0xca, 0xfe, 0xba, 0xbe, 0xfa, 0xce, 0xdb, 0xad,
|
||||||
0xde, 0xca, 0xf8, 0x88, 0x00, 0x00, 0x00, 0x00
|
0xde, 0xca, 0xf8, 0x88, 0x00, 0x00, 0x00, 0x00
|
||||||
};
|
};
|
||||||
|
|
||||||
const byte p[] =
|
const byte p[] =
|
||||||
{
|
{
|
||||||
0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,
|
0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5,
|
||||||
0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,
|
0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a,
|
||||||
0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,
|
0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda,
|
||||||
0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,
|
0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72,
|
||||||
0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,
|
0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53,
|
||||||
0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,
|
0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25,
|
||||||
0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,
|
0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57,
|
||||||
0xba, 0x63, 0x7b, 0x39
|
0xba, 0x63, 0x7b, 0x39
|
||||||
};
|
};
|
||||||
|
|
||||||
const byte a[] =
|
const byte a[] =
|
||||||
{
|
{
|
||||||
0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef,
|
0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef,
|
||||||
0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef,
|
0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef,
|
||||||
0xab, 0xad, 0xda, 0xd2
|
0xab, 0xad, 0xda, 0xd2
|
||||||
};
|
};
|
||||||
|
|
||||||
const byte c[] =
|
const byte c[] =
|
||||||
{
|
{
|
||||||
0x52, 0x2d, 0xc1, 0xf0, 0x99, 0x56, 0x7d, 0x07,
|
0x52, 0x2d, 0xc1, 0xf0, 0x99, 0x56, 0x7d, 0x07,
|
||||||
0xf4, 0x7f, 0x37, 0xa3, 0x2a, 0x84, 0x42, 0x7d,
|
0xf4, 0x7f, 0x37, 0xa3, 0x2a, 0x84, 0x42, 0x7d,
|
||||||
0x64, 0x3a, 0x8c, 0xdc, 0xbf, 0xe5, 0xc0, 0xc9,
|
0x64, 0x3a, 0x8c, 0xdc, 0xbf, 0xe5, 0xc0, 0xc9,
|
||||||
0x75, 0x98, 0xa2, 0xbd, 0x25, 0x55, 0xd1, 0xaa,
|
0x75, 0x98, 0xa2, 0xbd, 0x25, 0x55, 0xd1, 0xaa,
|
||||||
0x8c, 0xb0, 0x8e, 0x48, 0x59, 0x0d, 0xbb, 0x3d,
|
0x8c, 0xb0, 0x8e, 0x48, 0x59, 0x0d, 0xbb, 0x3d,
|
||||||
0xa7, 0xb0, 0x8b, 0x10, 0x56, 0x82, 0x88, 0x38,
|
0xa7, 0xb0, 0x8b, 0x10, 0x56, 0x82, 0x88, 0x38,
|
||||||
0xc5, 0xf6, 0x1e, 0x63, 0x93, 0xba, 0x7a, 0x0a,
|
0xc5, 0xf6, 0x1e, 0x63, 0x93, 0xba, 0x7a, 0x0a,
|
||||||
0xbc, 0xc9, 0xf6, 0x62
|
0xbc, 0xc9, 0xf6, 0x62
|
||||||
};
|
};
|
||||||
|
|
||||||
const byte t[] =
|
const byte t[] =
|
||||||
{
|
{
|
||||||
0x76, 0xfc, 0x6e, 0xce, 0x0f, 0x4e, 0x17, 0x68,
|
0x76, 0xfc, 0x6e, 0xce, 0x0f, 0x4e, 0x17, 0x68,
|
||||||
0xcd, 0xdf, 0x88, 0x53, 0xbb, 0x2d, 0x55, 0x1b
|
0xcd, 0xdf, 0x88, 0x53, 0xbb, 0x2d, 0x55, 0x1b
|
||||||
};
|
};
|
||||||
|
|
||||||
byte t2[16];
|
byte t2[16];
|
||||||
byte p2[60];
|
byte p2[60];
|
||||||
byte c2[60];
|
byte c2[60];
|
||||||
|
|
||||||
int result;
|
int result;
|
||||||
|
|
||||||
memset(t2, 0, 16);
|
memset(t2, 0, 16);
|
||||||
memset(c2, 0, 60);
|
memset(c2, 0, 60);
|
||||||
memset(p2, 0, 60);
|
memset(p2, 0, 60);
|
||||||
|
|
||||||
AesSetKey(&enc, k, sizeof(k), iv, AES_ENCRYPTION);
|
AesSetKey(&enc, k, sizeof(k), iv, AES_ENCRYPTION);
|
||||||
/* AES-GCM encrypt and decrypt both use AES encrypt internally */
|
/* AES-GCM encrypt and decrypt both use AES encrypt internally */
|
||||||
AesGcmEncrypt(&enc, c2, p, sizeof(c2), t2, sizeof(t2), a, sizeof(a));
|
AesGcmEncrypt(&enc, c2, p, sizeof(c2), t2, sizeof(t2), a, sizeof(a));
|
||||||
if (memcmp(c, c2, sizeof(c2)))
|
if (memcmp(c, c2, sizeof(c2)))
|
||||||
return -68;
|
return -68;
|
||||||
if (memcmp(t, t2, sizeof(t2)))
|
if (memcmp(t, t2, sizeof(t2)))
|
||||||
return -69;
|
return -69;
|
||||||
|
|
||||||
result = AesGcmDecrypt(&enc,
|
result = AesGcmDecrypt(&enc,
|
||||||
p2, c2, sizeof(p2), t2, sizeof(t2), a, sizeof(a));
|
p2, c2, sizeof(p2), t2, sizeof(t2), a, sizeof(a));
|
||||||
if (result != 0)
|
if (result != 0)
|
||||||
return -70;
|
return -70;
|
||||||
if (memcmp(p, p2, sizeof(p2)))
|
if (memcmp(p, p2, sizeof(p2)))
|
||||||
return -71;
|
return -71;
|
||||||
}
|
|
||||||
#endif /* HAVE_AESGCM */
|
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
#endif /* HAVE_AESGCM */
|
||||||
|
|
||||||
|
|
||||||
#endif /* NO_AES */
|
#endif /* NO_AES */
|
||||||
|
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user