/* Copyright (c) 2017, Google Inc. * * Permission to use, copy, modify, and/or distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ // cavp_keywrap_test processes a NIST CAVP AES test vector request file and // emits the corresponding response. #include #include #include #include "../crypto/test/file_test.h" #include "../crypto/test/test_util.h" #include "cavp_test_util.h" namespace { struct TestCtx { bool encrypt; bool padding; }; } // namespace static bool AESKeyWrap(std::vector *out, bool encrypt, const std::vector &key, const std::vector &in) { size_t key_bits = key.size() * 8; if (key_bits != 128 && key_bits != 192 && key_bits != 256) { return false; } AES_KEY aes_key; if (encrypt) { out->resize(in.size() + 8); if (AES_set_encrypt_key(key.data(), key_bits, &aes_key) || AES_wrap_key(&aes_key, nullptr, out->data(), in.data(), in.size()) == -1) { return false; } } else { out->resize(in.size() - 8); if (AES_set_decrypt_key(key.data(), key_bits, &aes_key) || AES_unwrap_key(&aes_key, nullptr, out->data(), in.data(), in.size()) == -1) { return false; } } return true; } static bool AESKeyWrapWithPadding(std::vector *out, bool encrypt, const std::vector &key, const std::vector &in) { const size_t key_bits = key.size() * 8; if (key_bits != 128 && key_bits != 192 && key_bits != 256) { return false; } AES_KEY aes_key; size_t out_len; if (encrypt) { out->resize(in.size() + 15); if (AES_set_encrypt_key(key.data(), key_bits, &aes_key) || !AES_wrap_key_padded(&aes_key, out->data(), &out_len, out->size(), in.data(), in.size())) { return false; } } else { out->resize(in.size()); if (AES_set_decrypt_key(key.data(), key_bits, &aes_key) || !AES_unwrap_key_padded(&aes_key, out->data(), &out_len, out->size(), in.data(), in.size())) { return false; } } out->resize(out_len); return true; } static bool TestCipher(FileTest *t, void *arg) { TestCtx *ctx = reinterpret_cast(arg); std::string count, unused, in_label = ctx->encrypt ? "P" : "C", result_label = ctx->encrypt ? "C" : "P"; std::vector key, in, result; // clang-format off if (!t->GetInstruction(&unused, "PLAINTEXT LENGTH") || !t->GetAttribute(&count, "COUNT") || !t->GetBytes(&key, "K") || !t->GetBytes(&in, in_label)) { return false; } // clang-format on auto wrap_function = AESKeyWrap; if (ctx->padding) { wrap_function = AESKeyWrapWithPadding; } printf("%s", t->CurrentTestToString().c_str()); if (!wrap_function(&result, ctx->encrypt, key, in)) { if (ctx->encrypt) { return false; } else { printf("FAIL\r\n\r\n"); } } else { printf("%s = %s\r\n\r\n", result_label.c_str(), EncodeHex(result).c_str()); } return true; } static int usage(char *arg) { fprintf( stderr, "usage: %s (enc|dec|enc-pad|dec-pad) (128|192|256) \n", arg); return 1; } int cavp_keywrap_test_main(int argc, char **argv) { if (argc != 4) { return usage(argv[0]); } const std::string op(argv[1]); bool encrypt = false; bool padding = false; if (op == "enc") { encrypt = true; } else if (op == "dec") { } else if (op == "enc-pad") { encrypt = true; padding = true; } else if (op == "dec-pad") { padding = true; } else { return usage(argv[0]); } TestCtx ctx = {encrypt, padding}; FileTest::Options opts; opts.path = argv[3]; opts.callback = TestCipher; opts.arg = &ctx; opts.silent = true; opts.comment_callback = EchoComment; return FileTestMain(opts); }