mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-07-31 11:17:29 +02:00
test.c:pkcs7authenveloped_run_vectors(): small stack refactor, and reenable for WOLFSSL_LINUXKM.
This commit is contained in:
@ -27004,17 +27004,16 @@ typedef struct {
|
|||||||
} pkcs7AuthEnvelopedVector;
|
} pkcs7AuthEnvelopedVector;
|
||||||
|
|
||||||
|
|
||||||
#ifndef WOLFSSL_LINUXKM
|
|
||||||
static int pkcs7authenveloped_run_vectors(byte* rsaCert, word32 rsaCertSz,
|
static int pkcs7authenveloped_run_vectors(byte* rsaCert, word32 rsaCertSz,
|
||||||
byte* rsaPrivKey, word32 rsaPrivKeySz,
|
byte* rsaPrivKey, word32 rsaPrivKeySz,
|
||||||
byte* eccCert, word32 eccCertSz,
|
byte* eccCert, word32 eccCertSz,
|
||||||
byte* eccPrivKey, word32 eccPrivKeySz)
|
byte* eccPrivKey, word32 eccPrivKeySz)
|
||||||
{
|
{
|
||||||
int ret = 0, testSz, i;
|
int ret = 0, testSz = 0, i;
|
||||||
int envelopedSz, decodedSz;
|
int envelopedSz, decodedSz;
|
||||||
|
|
||||||
byte *enveloped;
|
byte *enveloped = NULL;
|
||||||
byte *decoded;
|
byte *decoded = NULL;
|
||||||
WC_RNG rng;
|
WC_RNG rng;
|
||||||
PKCS7* pkcs7;
|
PKCS7* pkcs7;
|
||||||
#ifdef PKCS7_OUTPUT_TEST_BUNDLES
|
#ifdef PKCS7_OUTPUT_TEST_BUNDLES
|
||||||
@ -27027,7 +27026,7 @@ static int pkcs7authenveloped_run_vectors(byte* rsaCert, word32 rsaCertSz,
|
|||||||
};
|
};
|
||||||
byte senderNonce[PKCS7_NONCE_SZ + 2];
|
byte senderNonce[PKCS7_NONCE_SZ + 2];
|
||||||
#ifdef HAVE_ECC
|
#ifdef HAVE_ECC
|
||||||
byte senderNonceOid[] =
|
static const byte senderNonceOid[] =
|
||||||
{ 0x06, 0x0a, 0x60, 0x86, 0x48, 0x01, 0x86, 0xF8, 0x45, 0x01,
|
{ 0x06, 0x0a, 0x60, 0x86, 0x48, 0x01, 0x86, 0xF8, 0x45, 0x01,
|
||||||
0x09, 0x05 };
|
0x09, 0x05 };
|
||||||
|
|
||||||
@ -27040,20 +27039,20 @@ static int pkcs7authenveloped_run_vectors(byte* rsaCert, word32 rsaCertSz,
|
|||||||
|
|
||||||
#if !defined(NO_AES) && defined(WOLFSSL_AES_256) && defined(HAVE_ECC) && \
|
#if !defined(NO_AES) && defined(WOLFSSL_AES_256) && defined(HAVE_ECC) && \
|
||||||
defined(WOLFSSL_SHA512)
|
defined(WOLFSSL_SHA512)
|
||||||
byte optionalUkm[] = {
|
static const byte optionalUkm[] = {
|
||||||
0x00,0x01,0x02,0x03,0x04,0x05,0x06,0x07
|
0x00,0x01,0x02,0x03,0x04,0x05,0x06,0x07
|
||||||
};
|
};
|
||||||
#endif /* NO_AES */
|
#endif /* NO_AES */
|
||||||
|
|
||||||
#if !defined(NO_AES) && !defined(NO_SHA) && defined(WOLFSSL_AES_128)
|
#if !defined(NO_AES) && !defined(NO_SHA) && defined(WOLFSSL_AES_128)
|
||||||
/* encryption key for kekri recipient types */
|
/* encryption key for kekri recipient types */
|
||||||
byte secretKey[] = {
|
static const byte secretKey[] = {
|
||||||
0x00,0x01,0x02,0x03,0x04,0x05,0x06,0x07,
|
0x00,0x01,0x02,0x03,0x04,0x05,0x06,0x07,
|
||||||
0x00,0x01,0x02,0x03,0x04,0x05,0x06,0x07
|
0x00,0x01,0x02,0x03,0x04,0x05,0x06,0x07
|
||||||
};
|
};
|
||||||
|
|
||||||
/* encryption key identifier */
|
/* encryption key identifier */
|
||||||
byte secretKeyId[] = {
|
static const byte secretKeyId[] = {
|
||||||
0x02,0x02,0x03,0x04
|
0x02,0x02,0x03,0x04
|
||||||
};
|
};
|
||||||
#endif
|
#endif
|
||||||
@ -27062,58 +27061,76 @@ static int pkcs7authenveloped_run_vectors(byte* rsaCert, word32 rsaCertSz,
|
|||||||
!defined(NO_SHA) && defined(WOLFSSL_AES_128)
|
!defined(NO_SHA) && defined(WOLFSSL_AES_128)
|
||||||
|
|
||||||
#ifndef HAVE_FIPS
|
#ifndef HAVE_FIPS
|
||||||
char password[] = "password";
|
static const char password[] = "password";
|
||||||
#else
|
#else
|
||||||
char password[] = "passwordFIPS_MODE";
|
static const char password[] = "passwordFIPS_MODE";
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
byte salt[] = {
|
static const byte salt[] = {
|
||||||
0x12, 0x34, 0x56, 0x78, 0x78, 0x56, 0x34, 0x12
|
0x12, 0x34, 0x56, 0x78, 0x78, 0x56, 0x34, 0x12
|
||||||
};
|
};
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
const pkcs7AuthEnvelopedVector testVectors[] =
|
pkcs7AuthEnvelopedVector *testVectors = NULL;
|
||||||
|
|
||||||
{
|
{
|
||||||
|
#define ADD_PKCS7_TEST_VEC(...) { \
|
||||||
|
const pkcs7AuthEnvelopedVector vec = __VA_ARGS__; \
|
||||||
|
testVectors = (pkcs7AuthEnvelopedVector *) \
|
||||||
|
XREALLOC(testVectors, \
|
||||||
|
sizeof *testVectors * (testSz + 1), \
|
||||||
|
HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER); \
|
||||||
|
if (testVectors == NULL) \
|
||||||
|
ERROR_OUT(-12233, out); \
|
||||||
|
XMEMCPY(&testVectors[testSz++], &vec, sizeof *testVectors); \
|
||||||
|
}
|
||||||
|
|
||||||
/* key transport key encryption technique */
|
/* key transport key encryption technique */
|
||||||
#ifndef NO_RSA
|
#ifndef NO_RSA
|
||||||
#if !defined(NO_AES) && defined(HAVE_AESGCM)
|
#if !defined(NO_AES) && defined(HAVE_AESGCM)
|
||||||
#ifdef WOLFSSL_AES_128
|
#ifdef WOLFSSL_AES_128
|
||||||
|
ADD_PKCS7_TEST_VEC(
|
||||||
{data, (word32)sizeof(data), DATA, AES128GCMb, 0, 0, rsaCert, rsaCertSz,
|
{data, (word32)sizeof(data), DATA, AES128GCMb, 0, 0, rsaCert, rsaCertSz,
|
||||||
rsaPrivKey, rsaPrivKeySz, NULL, 0, NULL, 0, NULL, 0, 0, 0, NULL, 0,
|
rsaPrivKey, rsaPrivKeySz, NULL, 0, NULL, 0, NULL, 0, 0, 0, NULL, 0,
|
||||||
NULL, 0, NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0, 0,
|
NULL, 0, NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0, 0,
|
||||||
0, 0, "pkcs7authEnvelopedDataAES128GCM.der"},
|
0, 0, "pkcs7authEnvelopedDataAES128GCM.der"});
|
||||||
#endif
|
#endif
|
||||||
#ifdef WOLFSSL_AES_192
|
#ifdef WOLFSSL_AES_192
|
||||||
|
ADD_PKCS7_TEST_VEC(
|
||||||
{data, (word32)sizeof(data), DATA, AES192GCMb, 0, 0, rsaCert, rsaCertSz,
|
{data, (word32)sizeof(data), DATA, AES192GCMb, 0, 0, rsaCert, rsaCertSz,
|
||||||
rsaPrivKey, rsaPrivKeySz, NULL, 0, NULL, 0, NULL, 0, 0, 0, NULL, 0,
|
rsaPrivKey, rsaPrivKeySz, NULL, 0, NULL, 0, NULL, 0, 0, 0, NULL, 0,
|
||||||
NULL, 0, NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0, 0,
|
NULL, 0, NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0, 0,
|
||||||
0, 0, "pkcs7authEnvelopedDataAES192GCM.der"},
|
0, 0, "pkcs7authEnvelopedDataAES192GCM.der"});
|
||||||
#endif
|
#endif
|
||||||
#ifdef WOLFSSL_AES_256
|
#ifdef WOLFSSL_AES_256
|
||||||
|
ADD_PKCS7_TEST_VEC(
|
||||||
{data, (word32)sizeof(data), DATA, AES256GCMb, 0, 0, rsaCert, rsaCertSz,
|
{data, (word32)sizeof(data), DATA, AES256GCMb, 0, 0, rsaCert, rsaCertSz,
|
||||||
rsaPrivKey, rsaPrivKeySz, NULL, 0, NULL, 0, NULL, 0, 0, 0, NULL, 0,
|
rsaPrivKey, rsaPrivKeySz, NULL, 0, NULL, 0, NULL, 0, 0, 0, NULL, 0,
|
||||||
NULL, 0, NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0, 0,
|
NULL, 0, NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0, 0,
|
||||||
0, 0, "pkcs7authEnvelopedDataAES256GCM.der"},
|
0, 0, "pkcs7authEnvelopedDataAES256GCM.der"});
|
||||||
|
|
||||||
/* test with contentType set to FirmwarePkgData */
|
/* test with contentType set to FirmwarePkgData */
|
||||||
|
ADD_PKCS7_TEST_VEC(
|
||||||
{data, (word32)sizeof(data), FIRMWARE_PKG_DATA, AES256GCMb, 0, 0,
|
{data, (word32)sizeof(data), FIRMWARE_PKG_DATA, AES256GCMb, 0, 0,
|
||||||
rsaCert, rsaCertSz, rsaPrivKey, rsaPrivKeySz, NULL, 0, NULL, 0, NULL,
|
rsaCert, rsaCertSz, rsaPrivKey, rsaPrivKeySz, NULL, 0, NULL, 0, NULL,
|
||||||
0, 0, 0, NULL, 0, NULL, 0, NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL,
|
0, 0, 0, NULL, 0, NULL, 0, NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL,
|
||||||
0, 0, 0, 0, 0, 0, 0, 0,
|
0, 0, 0, 0, 0, 0, 0, 0,
|
||||||
"pkcs7authEnvelopedDataAES256GCM_firmwarePkgData.der"},
|
"pkcs7authEnvelopedDataAES256GCM_firmwarePkgData.der"});
|
||||||
|
|
||||||
/* explicitly using SKID for SubjectKeyIdentifier */
|
/* explicitly using SKID for SubjectKeyIdentifier */
|
||||||
|
ADD_PKCS7_TEST_VEC(
|
||||||
{data, (word32)sizeof(data), DATA, AES256GCMb, 0, 0, rsaCert, rsaCertSz,
|
{data, (word32)sizeof(data), DATA, AES256GCMb, 0, 0, rsaCert, rsaCertSz,
|
||||||
rsaPrivKey, rsaPrivKeySz, NULL, 0, NULL, 0, NULL, 0, CMS_SKID, 0,
|
rsaPrivKey, rsaPrivKeySz, NULL, 0, NULL, 0, NULL, 0, CMS_SKID, 0,
|
||||||
NULL, 0, NULL, 0, NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0,
|
NULL, 0, NULL, 0, NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0,
|
||||||
0, 0, 0, 0, 0, "pkcs7authEnvelopedDataAES256GCM_SKID.der"},
|
0, 0, 0, 0, 0, "pkcs7authEnvelopedDataAES256GCM_SKID.der"});
|
||||||
|
|
||||||
/* explicitly using IssuerAndSerialNumber for SubjectKeyIdentifier */
|
/* explicitly using IssuerAndSerialNumber for SubjectKeyIdentifier */
|
||||||
|
ADD_PKCS7_TEST_VEC(
|
||||||
{data, (word32)sizeof(data), DATA, AES256GCMb, 0, 0, rsaCert, rsaCertSz,
|
{data, (word32)sizeof(data), DATA, AES256GCMb, 0, 0, rsaCert, rsaCertSz,
|
||||||
rsaPrivKey, rsaPrivKeySz, NULL, 0, NULL, 0, NULL, 0,
|
rsaPrivKey, rsaPrivKeySz, NULL, 0, NULL, 0, NULL, 0,
|
||||||
CMS_ISSUER_AND_SERIAL_NUMBER, 0, NULL, 0, NULL, 0, NULL, NULL, 0,
|
CMS_ISSUER_AND_SERIAL_NUMBER, 0, NULL, 0, NULL, 0, NULL, NULL, 0,
|
||||||
NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0, 0, 0, 0,
|
NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0, 0, 0, 0,
|
||||||
"pkcs7authEnvelopedDataAES256GCM_IANDS.der"},
|
"pkcs7authEnvelopedDataAES256GCM_IANDS.der"});
|
||||||
#endif
|
#endif
|
||||||
#endif /* NO_AES */
|
#endif /* NO_AES */
|
||||||
#endif
|
#endif
|
||||||
@ -27122,72 +27139,80 @@ static int pkcs7authenveloped_run_vectors(byte* rsaCert, word32 rsaCertSz,
|
|||||||
#ifdef HAVE_ECC
|
#ifdef HAVE_ECC
|
||||||
#if !defined(NO_AES) && defined(HAVE_AESGCM)
|
#if !defined(NO_AES) && defined(HAVE_AESGCM)
|
||||||
#if !defined(NO_SHA) && defined(WOLFSSL_AES_128)
|
#if !defined(NO_SHA) && defined(WOLFSSL_AES_128)
|
||||||
|
ADD_PKCS7_TEST_VEC(
|
||||||
{data, (word32)sizeof(data), DATA, AES128GCMb, AES128_WRAP,
|
{data, (word32)sizeof(data), DATA, AES128GCMb, AES128_WRAP,
|
||||||
dhSinglePass_stdDH_sha1kdf_scheme, eccCert, eccCertSz, eccPrivKey,
|
dhSinglePass_stdDH_sha1kdf_scheme, eccCert, eccCertSz, eccPrivKey,
|
||||||
eccPrivKeySz, NULL, 0, NULL, 0, NULL, 0, 0, 0, NULL, 0, NULL, 0,
|
eccPrivKeySz, NULL, 0, NULL, 0, NULL, 0, 0, 0, NULL, 0, NULL, 0,
|
||||||
NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0, 0, 0, 0,
|
NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0, 0, 0, 0,
|
||||||
"pkcs7authEnvelopedDataAES128GCM_ECDH_SHA1KDF.der"},
|
"pkcs7authEnvelopedDataAES128GCM_ECDH_SHA1KDF.der"});
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if !defined(NO_SHA256) && defined(WOLFSSL_AES_256)
|
#if !defined(NO_SHA256) && defined(WOLFSSL_AES_256)
|
||||||
|
ADD_PKCS7_TEST_VEC(
|
||||||
{data, (word32)sizeof(data), DATA, AES256GCMb, AES256_WRAP,
|
{data, (word32)sizeof(data), DATA, AES256GCMb, AES256_WRAP,
|
||||||
dhSinglePass_stdDH_sha256kdf_scheme, eccCert, eccCertSz, eccPrivKey,
|
dhSinglePass_stdDH_sha256kdf_scheme, eccCert, eccCertSz, eccPrivKey,
|
||||||
eccPrivKeySz, NULL, 0, NULL, 0, NULL, 0, 0, 0, NULL, 0, NULL, 0,
|
eccPrivKeySz, NULL, 0, NULL, 0, NULL, 0, 0, 0, NULL, 0, NULL, 0,
|
||||||
NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0, 0, 0, 0,
|
NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0, 0, 0, 0,
|
||||||
"pkcs7authEnvelopedDataAES256GCM_ECDH_SHA256KDF.der"},
|
"pkcs7authEnvelopedDataAES256GCM_ECDH_SHA256KDF.der"});
|
||||||
|
|
||||||
/* with authenticated attributes */
|
/* with authenticated attributes */
|
||||||
|
ADD_PKCS7_TEST_VEC(
|
||||||
{data, (word32)sizeof(data), DATA, AES256GCMb, AES256_WRAP,
|
{data, (word32)sizeof(data), DATA, AES256GCMb, AES256_WRAP,
|
||||||
dhSinglePass_stdDH_sha256kdf_scheme, eccCert, eccCertSz, eccPrivKey,
|
dhSinglePass_stdDH_sha256kdf_scheme, eccCert, eccCertSz, eccPrivKey,
|
||||||
eccPrivKeySz, attribs, (sizeof(attribs) / sizeof(PKCS7Attrib)),
|
eccPrivKeySz, attribs, (sizeof(attribs) / sizeof(PKCS7Attrib)),
|
||||||
NULL, 0, NULL, 0, 0, 0, NULL, 0,
|
NULL, 0, NULL, 0, 0, 0, NULL, 0,
|
||||||
NULL, 0, NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0,
|
NULL, 0, NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0,
|
||||||
0, 0, 0,
|
0, 0, 0,
|
||||||
"pkcs7authEnvelopedDataAES256GCM_ECDH_SHA256KDF_authAttribs.der"},
|
"pkcs7authEnvelopedDataAES256GCM_ECDH_SHA256KDF_authAttribs.der"});
|
||||||
|
|
||||||
/* with unauthenticated attributes */
|
/* with unauthenticated attributes */
|
||||||
|
ADD_PKCS7_TEST_VEC(
|
||||||
{data, (word32)sizeof(data), DATA, AES256GCMb, AES256_WRAP,
|
{data, (word32)sizeof(data), DATA, AES256GCMb, AES256_WRAP,
|
||||||
dhSinglePass_stdDH_sha256kdf_scheme, eccCert, eccCertSz, eccPrivKey,
|
dhSinglePass_stdDH_sha256kdf_scheme, eccCert, eccCertSz, eccPrivKey,
|
||||||
eccPrivKeySz, NULL, 0, attribs,
|
eccPrivKeySz, NULL, 0, attribs,
|
||||||
(sizeof(attribs) / sizeof(PKCS7Attrib)), NULL, 0, 0, 0, NULL, 0,
|
(sizeof(attribs) / sizeof(PKCS7Attrib)), NULL, 0, 0, 0, NULL, 0,
|
||||||
NULL, 0, NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0,
|
NULL, 0, NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0,
|
||||||
0, 0, 0,
|
0, 0, 0,
|
||||||
"pkcs7authEnvelopedDataAES256GCM_ECDH_SHA256KDF_unauthAttribs.der"},
|
"pkcs7authEnvelopedDataAES256GCM_ECDH_SHA256KDF_unauthAttribs.der"});
|
||||||
|
|
||||||
/* with authenticated AND unauthenticated attributes */
|
/* with authenticated AND unauthenticated attributes */
|
||||||
|
ADD_PKCS7_TEST_VEC(
|
||||||
{data, (word32)sizeof(data), DATA, AES256GCMb, AES256_WRAP,
|
{data, (word32)sizeof(data), DATA, AES256GCMb, AES256_WRAP,
|
||||||
dhSinglePass_stdDH_sha256kdf_scheme, eccCert, eccCertSz, eccPrivKey,
|
dhSinglePass_stdDH_sha256kdf_scheme, eccCert, eccCertSz, eccPrivKey,
|
||||||
eccPrivKeySz, attribs, (sizeof(attribs) / sizeof(PKCS7Attrib)),
|
eccPrivKeySz, attribs, (sizeof(attribs) / sizeof(PKCS7Attrib)),
|
||||||
attribs, (sizeof(attribs) / sizeof(PKCS7Attrib)), NULL, 0, 0, 0,
|
attribs, (sizeof(attribs) / sizeof(PKCS7Attrib)), NULL, 0, 0, 0,
|
||||||
NULL, 0, NULL, 0, NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0,
|
NULL, 0, NULL, 0, NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0,
|
||||||
0, 0, 0, 0, 0, 0,
|
0, 0, 0, 0, 0, 0,
|
||||||
"pkcs7authEnvelopedDataAES256GCM_ECDH_SHA256KDF_bothAttribs.der"},
|
"pkcs7authEnvelopedDataAES256GCM_ECDH_SHA256KDF_bothAttribs.der"});
|
||||||
|
|
||||||
/* with authenticated AND unauthenticated attributes AND
|
/* with authenticated AND unauthenticated attributes AND
|
||||||
* contentType of FirmwarePkgData */
|
* contentType of FirmwarePkgData */
|
||||||
|
ADD_PKCS7_TEST_VEC(
|
||||||
{data, (word32)sizeof(data), FIRMWARE_PKG_DATA, AES256GCMb, AES256_WRAP,
|
{data, (word32)sizeof(data), FIRMWARE_PKG_DATA, AES256GCMb, AES256_WRAP,
|
||||||
dhSinglePass_stdDH_sha256kdf_scheme, eccCert, eccCertSz, eccPrivKey,
|
dhSinglePass_stdDH_sha256kdf_scheme, eccCert, eccCertSz, eccPrivKey,
|
||||||
eccPrivKeySz, attribs, (sizeof(attribs) / sizeof(PKCS7Attrib)),
|
eccPrivKeySz, attribs, (sizeof(attribs) / sizeof(PKCS7Attrib)),
|
||||||
attribs, (sizeof(attribs) / sizeof(PKCS7Attrib)), NULL, 0, 0, 0,
|
attribs, (sizeof(attribs) / sizeof(PKCS7Attrib)), NULL, 0, 0, 0,
|
||||||
NULL, 0, NULL, 0, NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0,
|
NULL, 0, NULL, 0, NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0,
|
||||||
0, 0, 0, 0, 0, 0,
|
0, 0, 0, 0, 0, 0,
|
||||||
"pkcs7authEnvelopedDataAES256GCM_ECDH_SHA256KDF_fw_bothAttribs.der"},
|
"pkcs7authEnvelopedDataAES256GCM_ECDH_SHA256KDF_fw_bothAttribs.der"});
|
||||||
#endif /* NO_SHA256 && WOLFSSL_AES_256 */
|
#endif /* NO_SHA256 && WOLFSSL_AES_256 */
|
||||||
|
|
||||||
#if defined(WOLFSSL_SHA512) && defined(WOLFSSL_AES_256)
|
#if defined(WOLFSSL_SHA512) && defined(WOLFSSL_AES_256)
|
||||||
|
ADD_PKCS7_TEST_VEC(
|
||||||
{data, (word32)sizeof(data), DATA, AES256GCMb, AES256_WRAP,
|
{data, (word32)sizeof(data), DATA, AES256GCMb, AES256_WRAP,
|
||||||
dhSinglePass_stdDH_sha512kdf_scheme, eccCert, eccCertSz, eccPrivKey,
|
dhSinglePass_stdDH_sha512kdf_scheme, eccCert, eccCertSz, eccPrivKey,
|
||||||
eccPrivKeySz, NULL, 0, NULL, 0, NULL, 0, 0, 0, NULL, 0, NULL, 0, NULL,
|
eccPrivKeySz, NULL, 0, NULL, 0, NULL, 0, 0, 0, NULL, 0, NULL, 0, NULL,
|
||||||
NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0, 0, 0, 0,
|
NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0, 0, 0, 0,
|
||||||
"pkcs7authEnvelopedDataAES256GCM_ECDH_SHA512KDF.der"},
|
"pkcs7authEnvelopedDataAES256GCM_ECDH_SHA512KDF.der"});
|
||||||
|
|
||||||
/* with optional user keying material (ukm) */
|
/* with optional user keying material (ukm) */
|
||||||
|
ADD_PKCS7_TEST_VEC(
|
||||||
{data, (word32)sizeof(data), DATA, AES256GCMb, AES256_WRAP,
|
{data, (word32)sizeof(data), DATA, AES256GCMb, AES256_WRAP,
|
||||||
dhSinglePass_stdDH_sha512kdf_scheme, eccCert, eccCertSz, eccPrivKey,
|
dhSinglePass_stdDH_sha512kdf_scheme, eccCert, eccCertSz, eccPrivKey,
|
||||||
eccPrivKeySz, NULL, 0, NULL, 0, optionalUkm, sizeof(optionalUkm), 0,
|
eccPrivKeySz, NULL, 0, NULL, 0, (byte *)optionalUkm, sizeof(optionalUkm), 0,
|
||||||
0, NULL, 0, NULL, 0, NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0,
|
0, NULL, 0, NULL, 0, NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0,
|
||||||
0, 0, 0, 0, 0, 0,
|
0, 0, 0, 0, 0, 0,
|
||||||
"pkcs7authEnvelopedDataAES256GCM_ECDH_SHA512KDF_ukm.der"},
|
"pkcs7authEnvelopedDataAES256GCM_ECDH_SHA512KDF_ukm.der"});
|
||||||
#endif /* WOLFSSL_SHA512 && WOLFSSL_AES_256 */
|
#endif /* WOLFSSL_SHA512 && WOLFSSL_AES_256 */
|
||||||
#endif /* NO_AES */
|
#endif /* NO_AES */
|
||||||
#endif
|
#endif
|
||||||
@ -27195,35 +27220,38 @@ static int pkcs7authenveloped_run_vectors(byte* rsaCert, word32 rsaCertSz,
|
|||||||
/* kekri (KEKRecipientInfo) recipient types */
|
/* kekri (KEKRecipientInfo) recipient types */
|
||||||
#if !defined(NO_AES) && defined(HAVE_AESGCM)
|
#if !defined(NO_AES) && defined(HAVE_AESGCM)
|
||||||
#if !defined(NO_SHA) && defined(WOLFSSL_AES_128)
|
#if !defined(NO_SHA) && defined(WOLFSSL_AES_128)
|
||||||
|
ADD_PKCS7_TEST_VEC(
|
||||||
{data, (word32)sizeof(data), DATA, AES128GCMb, AES128_WRAP, 0,
|
{data, (word32)sizeof(data), DATA, AES128GCMb, AES128_WRAP, 0,
|
||||||
NULL, 0, NULL, 0, NULL, 0, NULL, 0, NULL, 0, 0, 0,
|
NULL, 0, NULL, 0, NULL, 0, NULL, 0, NULL, 0, 0, 0,
|
||||||
secretKey, sizeof(secretKey), secretKeyId, sizeof(secretKeyId),
|
(byte *)secretKey, sizeof(secretKey), (byte *)secretKeyId, sizeof(secretKeyId),
|
||||||
NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0, 0, 0, 0,
|
NULL, NULL, 0, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0, 0, 0, 0,
|
||||||
"pkcs7authEnvelopedDataAES128GCM_KEKRI.der"},
|
"pkcs7authEnvelopedDataAES128GCM_KEKRI.der"});
|
||||||
#endif
|
#endif
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
/* pwri (PasswordRecipientInfo) recipient types */
|
/* pwri (PasswordRecipientInfo) recipient types */
|
||||||
#if !defined(NO_PWDBASED) && !defined(NO_AES) && defined(HAVE_AESGCM)
|
#if !defined(NO_PWDBASED) && !defined(NO_AES) && defined(HAVE_AESGCM)
|
||||||
#if !defined(NO_SHA) && defined(WOLFSSL_AES_128)
|
#if !defined(NO_SHA) && defined(WOLFSSL_AES_128)
|
||||||
|
ADD_PKCS7_TEST_VEC(
|
||||||
{data, (word32)sizeof(data), DATA, AES128GCMb, 0, 0,
|
{data, (word32)sizeof(data), DATA, AES128GCMb, 0, 0,
|
||||||
NULL, 0, NULL, 0, NULL, 0, NULL, 0, NULL, 0, 0, 0, NULL, 0,
|
NULL, 0, NULL, 0, NULL, 0, NULL, 0, NULL, 0, 0, 0, NULL, 0,
|
||||||
NULL, 0, NULL, NULL, 0, NULL, 0, 0, password,
|
NULL, 0, NULL, NULL, 0, NULL, 0, 0, (char *)password,
|
||||||
(word32)XSTRLEN(password), salt, sizeof(salt), PBKDF2_OID, WC_SHA, 5,
|
(word32)XSTRLEN(password), (byte *)salt, sizeof(salt), PBKDF2_OID, WC_SHA, 5,
|
||||||
AES128CBCb, 0, 0, 0, "pkcs7authEnvelopedDataAES128GCM_PWRI.der"},
|
AES128CBCb, 0, 0, 0, "pkcs7authEnvelopedDataAES128GCM_PWRI.der"});
|
||||||
#endif
|
#endif
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if !defined(NO_AES) && defined(HAVE_AESGCM)
|
#if !defined(NO_AES) && defined(HAVE_AESGCM)
|
||||||
#ifdef WOLFSSL_AES_128
|
#ifdef WOLFSSL_AES_128
|
||||||
/* ori (OtherRecipientInfo) recipient types */
|
/* ori (OtherRecipientInfo) recipient types */
|
||||||
|
ADD_PKCS7_TEST_VEC(
|
||||||
{data, (word32)sizeof(data), DATA, AES128GCMb, 0, 0, NULL, 0, NULL, 0,
|
{data, (word32)sizeof(data), DATA, AES128GCMb, 0, 0, NULL, 0, NULL, 0,
|
||||||
NULL, 0, NULL, 0, NULL, 0, 0, 0, NULL, 0, NULL, 0, NULL, NULL, 0,
|
NULL, 0, NULL, 0, NULL, 0, 0, 0, NULL, 0, NULL, 0, NULL, NULL, 0,
|
||||||
NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0, 0, 1, 0,
|
NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 0, 0, 1, 0,
|
||||||
"pkcs7authEnvelopedDataAES128GCM_ORI.der"},
|
"pkcs7authEnvelopedDataAES128GCM_ORI.der"});
|
||||||
#endif
|
#endif
|
||||||
#endif
|
#endif
|
||||||
};
|
}
|
||||||
|
|
||||||
enveloped = (byte *)XMALLOC(PKCS7_BUF_SIZE, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
enveloped = (byte *)XMALLOC(PKCS7_BUF_SIZE, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
decoded = (byte *)XMALLOC(PKCS7_BUF_SIZE, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
decoded = (byte *)XMALLOC(PKCS7_BUF_SIZE, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
@ -27231,9 +27259,6 @@ static int pkcs7authenveloped_run_vectors(byte* rsaCert, word32 rsaCertSz,
|
|||||||
ERROR_OUT(-12210, out);
|
ERROR_OUT(-12210, out);
|
||||||
}
|
}
|
||||||
|
|
||||||
testSz = sizeof(testVectors) / sizeof(pkcs7AuthEnvelopedVector);
|
|
||||||
|
|
||||||
|
|
||||||
/* generate senderNonce */
|
/* generate senderNonce */
|
||||||
{
|
{
|
||||||
#ifndef HAVE_FIPS
|
#ifndef HAVE_FIPS
|
||||||
@ -27510,6 +27535,8 @@ static int pkcs7authenveloped_run_vectors(byte* rsaCert, word32 rsaCertSz,
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
out:
|
out:
|
||||||
|
if (testVectors)
|
||||||
|
XFREE(testVectors, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
if (enveloped)
|
if (enveloped)
|
||||||
XFREE(enveloped, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
XFREE(enveloped, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
if (decoded)
|
if (decoded)
|
||||||
@ -27517,7 +27544,6 @@ static int pkcs7authenveloped_run_vectors(byte* rsaCert, word32 rsaCertSz,
|
|||||||
|
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
#endif /* ! WOLFSSL_LINUXKM */
|
|
||||||
|
|
||||||
static int pkcs7authenveloped_test(void)
|
static int pkcs7authenveloped_test(void)
|
||||||
{
|
{
|
||||||
@ -27590,12 +27616,10 @@ static int pkcs7authenveloped_test(void)
|
|||||||
return -12304;
|
return -12304;
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifndef WOLFSSL_LINUXKM
|
|
||||||
ret = pkcs7authenveloped_run_vectors(rsaCert, (word32)rsaCertSz,
|
ret = pkcs7authenveloped_run_vectors(rsaCert, (word32)rsaCertSz,
|
||||||
rsaPrivKey, (word32)rsaPrivKeySz,
|
rsaPrivKey, (word32)rsaPrivKeySz,
|
||||||
eccCert, (word32)eccCertSz,
|
eccCert, (word32)eccCertSz,
|
||||||
eccPrivKey, (word32)eccPrivKeySz);
|
eccPrivKey, (word32)eccPrivKeySz);
|
||||||
#endif
|
|
||||||
|
|
||||||
#ifndef NO_RSA
|
#ifndef NO_RSA
|
||||||
XFREE(rsaCert, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
XFREE(rsaCert, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
|
Reference in New Issue
Block a user