mirror of
https://github.com/openssl/openssl.git
synced 2025-01-06 13:26:43 +08:00
e89ffd23c3
Don't attempt to self-test DES in the FIPS provider if we have been built without FIPS support. Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11034)
194 lines
5.4 KiB
PHP
194 lines
5.4 KiB
PHP
/*
|
|
* Copyright 2019 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
typedef struct st_kat_st {
|
|
const char *desc;
|
|
const char *algorithm;
|
|
const unsigned char *pt;
|
|
size_t pt_len;
|
|
const unsigned char *expected;
|
|
size_t expected_len;
|
|
} ST_KAT;
|
|
|
|
typedef ST_KAT ST_KAT_DIGEST;
|
|
typedef struct st_kat_cipher_st {
|
|
ST_KAT base;
|
|
const unsigned char *key;
|
|
size_t key_len;
|
|
const unsigned char *iv;
|
|
size_t iv_len;
|
|
const unsigned char *aad;
|
|
size_t aad_len;
|
|
const unsigned char *tag;
|
|
size_t tag_len;
|
|
} ST_KAT_CIPHER;
|
|
|
|
typedef struct st_kat_nvp_st {
|
|
const char *name;
|
|
const char *value;
|
|
} ST_KAT_NVP;
|
|
|
|
typedef struct st_kat_kdf_st {
|
|
const char *desc;
|
|
const char *algorithm;
|
|
const ST_KAT_NVP *ctrls;
|
|
const unsigned char *expected;
|
|
size_t expected_len;
|
|
} ST_KAT_KDF;
|
|
|
|
/* Macros to build Self test data */
|
|
#define ITM(x) x, sizeof(x)
|
|
#define ITM_STR(x) x, sizeof(x) - 1
|
|
|
|
/*- DIGEST TEST DATA */
|
|
static const unsigned char sha1_pt[] = "abc";
|
|
static const unsigned char sha1_digest[] = {
|
|
0xA9, 0x99, 0x3E, 0x36, 0x47, 0x06, 0x81, 0x6A, 0xBA, 0x3E, 0x25, 0x71,
|
|
0x78, 0x50, 0xC2, 0x6C, 0x9C, 0xD0, 0xD8, 0x9D
|
|
};
|
|
|
|
static const unsigned char sha512_pt[] = "abc";
|
|
static const unsigned char sha512_digest[] = {
|
|
0xDD, 0xAF, 0x35, 0xA1, 0x93, 0x61, 0x7A, 0xBA, 0xCC, 0x41, 0x73, 0x49,
|
|
0xAE, 0x20, 0x41, 0x31, 0x12, 0xE6, 0xFA, 0x4E, 0x89, 0xA9, 0x7E, 0xA2,
|
|
0x0A, 0x9E, 0xEE, 0xE6, 0x4B, 0x55, 0xD3, 0x9A, 0x21, 0x92, 0x99, 0x2A,
|
|
0x27, 0x4F, 0xC1, 0xA8, 0x36, 0xBA, 0x3C, 0x23, 0xA3, 0xFE, 0xEB, 0xBD,
|
|
0x45, 0x4D, 0x44, 0x23, 0x64, 0x3C, 0xE8, 0x0E, 0x2A, 0x9A, 0xC9, 0x4F,
|
|
0xA5, 0x4C, 0xA4, 0x9F
|
|
};
|
|
static const unsigned char sha3_256_pt[] = { 0xe7, 0x37, 0x21, 0x05 };
|
|
static const unsigned char sha3_256_digest[] = {
|
|
0x3a, 0x42, 0xb6, 0x8a, 0xb0, 0x79, 0xf2, 0x8c, 0x4c, 0xa3, 0xc7, 0x52,
|
|
0x29, 0x6f, 0x27, 0x90, 0x06, 0xc4, 0xfe, 0x78, 0xb1, 0xeb, 0x79, 0xd9,
|
|
0x89, 0x77, 0x7f, 0x05, 0x1e, 0x40, 0x46, 0xae
|
|
};
|
|
|
|
static const ST_KAT_DIGEST st_kat_digest_tests[] =
|
|
{
|
|
{
|
|
OSSL_SELF_TEST_DESC_MD_SHA1,
|
|
"SHA1",
|
|
ITM_STR(sha1_pt),
|
|
ITM(sha1_digest),
|
|
},
|
|
{
|
|
OSSL_SELF_TEST_DESC_MD_SHA2,
|
|
"SHA512",
|
|
ITM_STR(sha512_pt),
|
|
ITM(sha512_digest),
|
|
},
|
|
{
|
|
OSSL_SELF_TEST_DESC_MD_SHA3,
|
|
"SHA3-256",
|
|
ITM(sha3_256_pt),
|
|
ITM(sha3_256_digest),
|
|
},
|
|
};
|
|
|
|
|
|
/*- CIPHER TEST DATA */
|
|
|
|
/* DES3 test data */
|
|
static const unsigned char des_ede3_cbc_pt[] = {
|
|
0x6B, 0xC1, 0xBE, 0xE2, 0x2E, 0x40, 0x9F, 0x96, 0xE9, 0x3D, 0x7E, 0x11,
|
|
0x73, 0x93, 0x17, 0x2A, 0xAE, 0x2D, 0x8A, 0x57, 0x1E, 0x03, 0xAC, 0x9C,
|
|
0x9E, 0xB7, 0x6F, 0xAC, 0x45, 0xAF, 0x8E, 0x51
|
|
};
|
|
|
|
static const unsigned char des_ede3_cbc_key[] = {
|
|
0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF,
|
|
0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF, 0x01,
|
|
0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF, 0x01, 0x23
|
|
};
|
|
static const unsigned char des_ede3_cbc_iv[] = {
|
|
0xF6, 0x9F, 0x24, 0x45, 0xDF, 0x4F, 0x9B, 0x17
|
|
};
|
|
static const unsigned char des_ede3_cbc_ct[] = {
|
|
0x20, 0x79, 0xC3, 0xD5, 0x3A, 0xA7, 0x63, 0xE1, 0x93, 0xB7, 0x9E, 0x25,
|
|
0x69, 0xAB, 0x52, 0x62, 0x51, 0x65, 0x70, 0x48, 0x1F, 0x25, 0xB5, 0x0F,
|
|
0x73, 0xC0, 0xBD, 0xA8, 0x5C, 0x8E, 0x0D, 0xA7
|
|
};
|
|
|
|
static const unsigned char aes_256_gcm_key[] = {
|
|
0x92,0xe1,0x1d,0xcd,0xaa,0x86,0x6f,0x5c,0xe7,0x90,0xfd,0x24,
|
|
0x50,0x1f,0x92,0x50,0x9a,0xac,0xf4,0xcb,0x8b,0x13,0x39,0xd5,
|
|
0x0c,0x9c,0x12,0x40,0x93,0x5d,0xd0,0x8b
|
|
};
|
|
static const unsigned char aes_256_gcm_iv[] = {
|
|
0xac,0x93,0xa1,0xa6,0x14,0x52,0x99,0xbd,0xe9,0x02,0xf2,0x1a
|
|
};
|
|
static const unsigned char aes_256_gcm_pt[] = {
|
|
0x2d,0x71,0xbc,0xfa,0x91,0x4e,0x4a,0xc0,0x45,0xb2,0xaa,0x60,
|
|
0x95,0x5f,0xad,0x24
|
|
};
|
|
static const unsigned char aes_256_gcm_aad[] = {
|
|
0x1e,0x08,0x89,0x01,0x6f,0x67,0x60,0x1c,0x8e,0xbe,0xa4,0x94,
|
|
0x3b,0xc2,0x3a,0xd6
|
|
};
|
|
static const unsigned char aes_256_gcm_ct[] = {
|
|
0x89,0x95,0xae,0x2e,0x6d,0xf3,0xdb,0xf9,0x6f,0xac,0x7b,0x71,
|
|
0x37,0xba,0xe6,0x7f
|
|
};
|
|
static const unsigned char aes_256_gcm_tag[] = {
|
|
0xec,0xa5,0xaa,0x77,0xd5,0x1d,0x4a,0x0a,0x14,0xd9,0xc5,0x1e,
|
|
0x1d,0xa4,0x74,0xab
|
|
};
|
|
|
|
static const ST_KAT_CIPHER st_kat_cipher_tests[] = {
|
|
#ifndef OPENSSL_NO_DES
|
|
{
|
|
{
|
|
OSSL_SELF_TEST_DESC_CIPHER_TDES,
|
|
"DES-EDE3-CBC",
|
|
ITM(des_ede3_cbc_pt),
|
|
ITM(des_ede3_cbc_ct)
|
|
},
|
|
ITM(des_ede3_cbc_key),
|
|
ITM(des_ede3_cbc_iv),
|
|
},
|
|
#endif
|
|
{
|
|
{
|
|
OSSL_SELF_TEST_DESC_CIPHER_AES_GCM,
|
|
"AES-256-GCM",
|
|
ITM(aes_256_gcm_pt),
|
|
ITM(aes_256_gcm_ct),
|
|
},
|
|
ITM(aes_256_gcm_key),
|
|
ITM(aes_256_gcm_iv),
|
|
ITM(aes_256_gcm_aad),
|
|
ITM(aes_256_gcm_tag)
|
|
}
|
|
};
|
|
|
|
/*- KDF TEST DATA */
|
|
|
|
static const ST_KAT_NVP hkdf_ctrl[] =
|
|
{
|
|
{ "digest", "SHA256" },
|
|
{ "key", "secret" },
|
|
{ "salt", "salt" },
|
|
{ "info", "label" },
|
|
{ NULL, NULL }
|
|
};
|
|
static const unsigned char hkdf_expected[] = {
|
|
0x2a, 0xc4, 0x36, 0x9f, 0x52, 0x59, 0x96, 0xf8, 0xde, 0x13
|
|
};
|
|
|
|
static const ST_KAT_KDF st_kat_kdf_tests[] =
|
|
{
|
|
{
|
|
OSSL_SELF_TEST_DESC_KDF_HKDF,
|
|
"HKDF",
|
|
hkdf_ctrl,
|
|
ITM(hkdf_expected)
|
|
}
|
|
};
|
|
|