X-Git-Url: http://wagner.pp.ru/gitweb/?a=blobdiff_plain;f=test_grasshopper.c;h=0134c67e53d8f76cef89fab160f03106998b286c;hb=a430c355a1d2eff5df6c96c7b6f928a609c2dd73;hp=db2c3e16e79bc67f8b29aac580df54f38745b260;hpb=07c957df13588802781cb36d1539e22fba7e071e;p=openssl-gost%2Fengine.git diff --git a/test_grasshopper.c b/test_grasshopper.c index db2c3e1..0134c67 100644 --- a/test_grasshopper.c +++ b/test_grasshopper.c @@ -33,7 +33,7 @@ printf(cGREEN "Test passed\n" cNORM);} /* Test key from both GOST R 34.12-2015 and GOST R 34.13-2015. */ -static const unsigned char K[] = { +static const unsigned char K[32] = { 0x88,0x99,0xaa,0xbb,0xcc,0xdd,0xee,0xff,0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77, 0xfe,0xdc,0xba,0x98,0x76,0x54,0x32,0x10,0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef, }; @@ -56,6 +56,19 @@ static const unsigned char P_acpkm[] = { 0x44,0x55,0x66,0x77,0x88,0x99,0xAA,0xBB,0xCC,0xEE,0xFF,0x0A,0x00,0x11,0x22,0x33, 0x55,0x66,0x77,0x88,0x99,0xAA,0xBB,0xCC,0xEE,0xFF,0x0A,0x00,0x11,0x22,0x33,0x44, }; +/* OMAC-ACPKM test vector from R 1323565.1.017-2018 A.4.1 */ +static const unsigned char P_omac_acpkm1[] = { + 0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x00,0xFF,0xEE,0xDD,0xCC,0xBB,0xAA,0x99,0x88, + 0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77, +}; +/* OMAC-ACPKM test vector from R 1323565.1.017-2018 A.4.2 */ +static const unsigned char P_omac_acpkm2[] = { + 0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x00,0xFF,0xEE,0xDD,0xCC,0xBB,0xAA,0x99,0x88, + 0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x99,0xAA,0xBB,0xCC,0xEE,0xFF,0x0A, + 0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x99,0xAA,0xBB,0xCC,0xEE,0xFF,0x0A,0x00, + 0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x99,0xAA,0xBB,0xCC,0xEE,0xFF,0x0A,0x00,0x11, + 0x33,0x44,0x55,0x66,0x77,0x88,0x99,0xAA,0xBB,0xCC,0xEE,0xFF,0x0A,0x00,0x11,0x22, +}; static const unsigned char E_ecb[] = { /* ECB test vectors from GOST R 34.13-2015 A.1.1 */ /* first 16 bytes is vector (b) from GOST R 34.12-2015 A.1 */ @@ -80,6 +93,20 @@ static const unsigned char E_acpkm[] = { 0xDF,0xFD,0x07,0xEC,0x81,0x36,0x36,0x46,0x0C,0x4F,0x3B,0x74,0x34,0x23,0x16,0x3E, 0x64,0x09,0xA9,0xC2,0x82,0xFA,0xC8,0xD4,0x69,0xD2,0x21,0xE7,0xFB,0xD6,0xDE,0x5D, }; +/* Test vector from R 23565.1.017-2018 A.4.2. + * Key material from ACPKM-Master(K,768,3) for OMAC-ACPKM. */ +static const unsigned char E_acpkm_master[] = { + 0x0C,0xAB,0xF1,0xF2,0xEF,0xBC,0x4A,0xC1,0x60,0x48,0xDF,0x1A,0x24,0xC6,0x05,0xB2, + 0xC0,0xD1,0x67,0x3D,0x75,0x86,0xA8,0xEC,0x0D,0xD4,0x2C,0x45,0xA4,0xF9,0x5B,0xAE, + 0x0F,0x2E,0x26,0x17,0xE4,0x71,0x48,0x68,0x0F,0xC3,0xE6,0x17,0x8D,0xF2,0xC1,0x37, + 0xC9,0xDD,0xA8,0x9C,0xFF,0xA4,0x91,0xFE,0xAD,0xD9,0xB3,0xEA,0xB7,0x03,0xBB,0x31, + 0xBC,0x7E,0x92,0x7F,0x04,0x94,0x72,0x9F,0x51,0xB4,0x9D,0x3D,0xF9,0xC9,0x46,0x08, + 0x00,0xFB,0xBC,0xF5,0xED,0xEE,0x61,0x0E,0xA0,0x2F,0x01,0x09,0x3C,0x7B,0xC7,0x42, + 0xD7,0xD6,0x27,0x15,0x01,0xB1,0x77,0x77,0x52,0x63,0xC2,0xA3,0x49,0x5A,0x83,0x18, + 0xA8,0x1C,0x79,0xA0,0x4F,0x29,0x66,0x0E,0xA3,0xFD,0xA8,0x74,0xC6,0x30,0x79,0x9E, + 0x14,0x2C,0x57,0x79,0x14,0xFE,0xA9,0x0D,0x3B,0xC2,0x50,0x2E,0x83,0x36,0x85,0xD9, +}; +static const unsigned char P_acpkm_master[sizeof(E_acpkm_master)] = { 0 }; /* * Other modes (ofb, cbc, cfb) is impossible to test to match GOST R * 34.13-2015 test vectors exactly, due to these vectors having exceeding @@ -112,10 +139,22 @@ static const unsigned char E_cfb[] = { 0xe1,0xc8,0x52,0xe9,0xa8,0x56,0x71,0x62,0xdb,0xb5,0xda,0x7f,0x66,0xde,0xa9,0x26, }; -static const unsigned char iv_ctr[] = { 0x12,0x34,0x56,0x78,0x90,0xab,0xce,0xf0, 0,0,0,0,0,0,0,0 }; -/* truncated to 128-bits IV */ +static const unsigned char iv_ctr[] = { 0x12,0x34,0x56,0x78,0x90,0xab,0xce,0xf0, + 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00 }; +/* Truncated to 128-bits IV from GOST examples. */ static const unsigned char iv_128bit[] = { 0x12,0x34,0x56,0x78,0x90,0xab,0xce,0xf0, 0xa1,0xb2,0xc3,0xd4,0xe5,0xf0,0x01,0x12 }; +/* Universal IV for ACPKM-Master. */ +static const unsigned char iv_acpkm_m[] = { 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, + 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00 }; +static const unsigned char MAC_omac[] = { 0x33,0x6f,0x4d,0x29,0x60,0x59,0xfb,0xe3 }; +static const unsigned char MAC_omac_acpkm1[] = { + 0xB5,0x36,0x7F,0x47,0xB6,0x2B,0x99,0x5E,0xEB,0x2A,0x64,0x8C,0x58,0x43,0x14,0x5E, +}; +static const unsigned char MAC_omac_acpkm2[] = { + 0xFB,0xB8,0xDC,0xEE,0x45,0xBE,0xA6,0x7C,0x35,0xF5,0x8C,0x57,0x00,0x89,0x8E,0x5D, +}; + struct testcase { const char *name; const EVP_CIPHER *(*type)(void); @@ -132,6 +171,8 @@ static struct testcase testcases[] = { { "ctr", cipher_gost_grasshopper_ctr, 1, P, E_ctr, sizeof(P), iv_ctr, sizeof(iv_ctr), 0 }, { "ctr-no-acpkm", cipher_gost_grasshopper_ctracpkm, 1, P, E_ctr, sizeof(P), iv_ctr, sizeof(iv_ctr), 0 }, { "ctracpkm", cipher_gost_grasshopper_ctracpkm, 1, P_acpkm, E_acpkm, sizeof(P_acpkm), iv_ctr, sizeof(iv_ctr), 256 / 8 }, + { "acpkm-Master", cipher_gost_grasshopper_ctracpkm, 0, P_acpkm_master, E_acpkm_master, sizeof(P_acpkm_master), + iv_acpkm_m, sizeof(iv_acpkm_m), 768 / 8 }, { "ofb", cipher_gost_grasshopper_ofb, 1, P, E_ofb, sizeof(P), iv_128bit, sizeof(iv_128bit), 0 }, { "cbc", cipher_gost_grasshopper_cbc, 0, P, E_cbc, sizeof(P), iv_128bit, sizeof(iv_128bit), 0 }, { "cfb", cipher_gost_grasshopper_cfb, 0, P, E_cfb, sizeof(P), iv_128bit, sizeof(iv_128bit), 0 }, @@ -155,12 +196,13 @@ static int test_block(const EVP_CIPHER *type, const char *name, const unsigned char *iv, size_t iv_size, int acpkm) { EVP_CIPHER_CTX *ctx = EVP_CIPHER_CTX_new(); + const char *standard = acpkm? "R 23565.1.017-2018" : "GOST R 34.13-2015"; unsigned char c[size]; int outlen, tmplen; int ret = 0, test; OPENSSL_assert(ctx); - printf("Encryption test from GOST R 34.13-2015 [%s] \n", name); + printf("Encryption test from %s [%s] \n", standard, name); /* test with single big chunk */ EVP_CIPHER_CTX_init(ctx); T(EVP_CipherInit_ex(ctx, type, NULL, K, iv, 1)); @@ -178,7 +220,7 @@ static int test_block(const EVP_CIPHER *type, const char *name, ret |= test; /* test with small chunks of block size */ - printf("Chunked encryption test from GOST R 34.13-2015 [%s] \n", name); + printf("Chunked encryption test from %s [%s] \n", standard, name); int blocks = size / GRASSHOPPER_BLOCK_SIZE; int z; EVP_CIPHER_CTX_init(ctx); @@ -203,7 +245,7 @@ static int test_block(const EVP_CIPHER *type, const char *name, ret |= test; /* test with single big chunk */ - printf("Decryption test from GOST R 34.13-2015 [%s] \n", name); + printf("Decryption test from %s [%s] \n", standard, name); EVP_CIPHER_CTX_init(ctx); T(EVP_CipherInit_ex(ctx, type, NULL, K, iv, 0)); T(EVP_CIPHER_CTX_set_padding(ctx, 0)); @@ -228,12 +270,13 @@ static int test_stream(const EVP_CIPHER *type, const char *name, const unsigned char *iv, size_t iv_size, int acpkm) { EVP_CIPHER_CTX *ctx = EVP_CIPHER_CTX_new(); + const char *standard = acpkm? "R 23565.1.017-2018" : "GOST R 34.13-2015"; int ret = 0, test; int z; OPENSSL_assert(ctx); /* Cycle through all lengths from 1 upto maximum size */ - printf("Stream encryption test from GOST R 34.13-2015 [%s] \n", name); + printf("Stream encryption test from %s [%s] \n", standard, name); for (z = 1; z <= size; z++) { unsigned char c[size]; int outlen, tmplen; @@ -269,34 +312,37 @@ static int test_stream(const EVP_CIPHER *type, const char *name, return ret; } -static int test_omac() +static int test_mac(const char *name, const char *from, + const EVP_MD *type, int acpkm, int acpkm_t, + const unsigned char *pt, size_t pt_size, + const unsigned char *mac, size_t mac_size) { EVP_MD_CTX *ctx = EVP_MD_CTX_new(); - unsigned char mac[] = { 0x33,0x6f,0x4d,0x29,0x60,0x59,0xfb,0xe3 }; unsigned char md_value[EVP_MAX_MD_SIZE]; unsigned int md_len; int test; OPENSSL_assert(ctx); - printf("OMAC test from GOST R 34.13-2015\n"); + printf("%s test from %s\n", name, from); EVP_MD_CTX_init(ctx); - /* preload cbc cipher for omac set key */ - EVP_add_cipher(cipher_gost_grasshopper_cbc()); - T(EVP_DigestInit_ex(ctx, grasshopper_omac(), NULL)); - if (EVP_MD_CTX_size(ctx) != sizeof(mac)) { + T(EVP_DigestInit_ex(ctx, type, NULL)); + if (EVP_MD_CTX_size(ctx) != mac_size) { /* strip const out of EVP_MD_CTX_md() to * overwrite output size, as test vector is 8 bytes */ - printf("Resize result size from %d to %zu\n", EVP_MD_CTX_size(ctx), sizeof(mac)); - T(EVP_MD_meth_set_result_size((EVP_MD *)EVP_MD_CTX_md(ctx), sizeof(mac))); + printf("Resize result size from %d to %zu\n", EVP_MD_CTX_size(ctx), mac_size); + T(EVP_MD_meth_set_result_size((EVP_MD *)EVP_MD_CTX_md(ctx), mac_size)); } T(EVP_MD_meth_get_ctrl(EVP_MD_CTX_md(ctx))(ctx, EVP_MD_CTRL_SET_KEY, sizeof(K), (void *)K)); - T(EVP_DigestUpdate(ctx, P, sizeof(P))); + if (acpkm) + T(EVP_MD_meth_get_ctrl(EVP_MD_CTX_md(ctx))(ctx, + EVP_CTRL_KEY_MESH, acpkm, acpkm_t ? &acpkm_t : NULL)); + T(EVP_DigestUpdate(ctx, pt, pt_size)); T(EVP_DigestFinal_ex(ctx, md_value, &md_len)); EVP_MD_CTX_free(ctx); printf(" MAC[%u] = ", md_len); hexdump(md_value, md_len); - TEST_ASSERT(md_len != sizeof(mac) || + TEST_ASSERT(md_len != mac_size || memcmp(mac, md_value, md_len)); return test; @@ -317,7 +363,19 @@ int main(int argc, char **argv) t->iv, t->iv_size, t->acpkm); } - ret |= test_omac(); + /* preload cbc cipher for omac set key */ + EVP_add_cipher(cipher_gost_grasshopper_cbc()); + + ret |= test_mac("OMAC", "GOST R 34.13-2015", grasshopper_omac(), 0, 0, + P, sizeof(P), MAC_omac, sizeof(MAC_omac)); + ret |= test_mac("OMAC-ACPKM", "R 1323565.1.017-2018 A.4.1", + grasshopper_omac_acpkm(), 32, 768 / 8, + P_omac_acpkm1, sizeof(P_omac_acpkm1), + MAC_omac_acpkm1, sizeof(MAC_omac_acpkm1)); + ret |= test_mac("OMAC-ACPKM", "R 1323565.1.017-2018 A.4.2", + grasshopper_omac_acpkm(), 32, 768 / 8, + P_omac_acpkm2, sizeof(P_omac_acpkm2), + MAC_omac_acpkm2, sizeof(MAC_omac_acpkm2)); if (ret) printf(cDRED "= Some tests FAILED!\n" cNORM);