| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193 | /* *  Copyright 2014-2022 The GmSSL Project. All Rights Reserved. * *  Licensed under the Apache License, Version 2.0 (the License); you may *  not use this file except in compliance with the License. * *  http://www.apache.org/licenses/LICENSE-2.0 */#include <stdio.h>#include <string.h>#include <stdlib.h>#include <gmssl/gcm.h>#include <gmssl/hex.h>#include <gmssl/rand.h>#include <gmssl/block_cipher.h>#include <gmssl/error.h>struct {	char *H;	char *A;	char *C;	char *T;} ghash_tests[] = {	// test 1	{		"66e94bd4ef8a2c3b884cfa59ca342b2e",		"",		"",		"00000000000000000000000000000000",	},	// test 2	{		"66e94bd4ef8a2c3b884cfa59ca342b2e",		"",		"0388dace60b6a392f328c2b971b2fe78",		"f38cbb1ad69223dcc3457ae5b6b0f885",	},	// test 3	{		"b83b533708bf535d0aa6e52980d53b78",		"",		"42831ec2217774244b7221b784d0d49c"		"e3aa212f2c02a4e035c17e2329aca12e"		"21d514b25466931c7d8f6a5aac84aa05"		"1ba30b396a0aac973d58e091473f5985",		"7f1b32b81b820d02614f8895ac1d4eac",	},	// test 4	{		"b83b533708bf535d0aa6e52980d53b78",		"feedfacedeadbeeffeedfacedeadbeef"		"abaddad2",		"42831ec2217774244b7221b784d0d49c"		"e3aa212f2c02a4e035c17e2329aca12e"		"21d514b25466931c7d8f6a5aac84aa05"		"1ba30b396a0aac973d58e091",		"698e57f70e6ecc7fd9463b7260a9ae5f",	},	// test 5	{		"b83b533708bf535d0aa6e52980d53b78",		"feedfacedeadbeeffeedfacedeadbeef"		"abaddad2",		"61353b4c2806934a777ff51fa22a4755"		"699b2a714fcdc6f83766e5f97b6c7423"		"73806900e49f24b22b097544d4896b42"		"4989b5e1ebac0f07c23f4598",		"df586bb4c249b92cb6922877e444d37b",	},	// test 6	{		"b83b533708bf535d0aa6e52980d53b78",		"feedfacedeadbeeffeedfacedeadbeef"		"abaddad2",		"8ce24998625615b603a033aca13fb894"		"be9112a5c3a211a8ba262a3cca7e2ca7"		"01e4a9a4fba43c90ccdcb281d48c7c6f"		"d62875d2aca417034c34aee5",		"1c5afe9760d3932f3c9a878aac3dc3de",	},};int test_ghash(void){	uint8_t H[16];	uint8_t A[32];	uint8_t C[64];	uint8_t T[16];	uint8_t out[16];	size_t Hlen, Alen, Clen, Tlen;	int i;	for (i = 0; i < sizeof(ghash_tests)/sizeof(ghash_tests[0]); i++) {		hex_to_bytes(ghash_tests[i].H, strlen(ghash_tests[i].H), H, &Hlen);		hex_to_bytes(ghash_tests[i].A, strlen(ghash_tests[i].A), A, &Alen);		hex_to_bytes(ghash_tests[i].C, strlen(ghash_tests[i].C), C, &Clen);		hex_to_bytes(ghash_tests[i].T, strlen(ghash_tests[i].T), T, &Tlen);		ghash(H, A, Alen, C, Clen, out);		if (memcmp(out, T, Tlen) != 0) {			format_print(stderr, 0, 0, "test %d failed\n", i + 1);			format_print(stderr, 0, 2, "H = %s\n", ghash_tests[i].H);			format_print(stderr, 0, 2, "A = %s\n", ghash_tests[i].A);			format_print(stderr, 0, 2, "C = %s\n", ghash_tests[i].C);			format_bytes(stderr, 0, 2, "GHASH(H,A,C) = ", out, 16);			format_print(stderr, 0, 2, "             = %s\n\n", ghash_tests[i].T);		}	}	printf("%s() ok\n", __FUNCTION__);	return 1;}int test_gcm(void){	BLOCK_CIPHER_KEY block_key;	uint8_t key[16];	uint8_t iv[12];	uint8_t aad[64];	uint8_t in[100];	uint8_t out[sizeof(in)];	uint8_t buf[sizeof(in)];	uint8_t tag[16];	rand_bytes(key, sizeof(key));	rand_bytes(iv, sizeof(iv));	rand_bytes(aad, sizeof(aad));	rand_bytes(in, sizeof(in));	memset(out, 0, sizeof(out));	memset(buf, 0, sizeof(buf));	memset(tag, 0, sizeof(tag));	if (block_cipher_set_encrypt_key(&block_key, BLOCK_CIPHER_aes128(), key) != 1) {		error_print();		return -1;	}	if (gcm_encrypt(&block_key, iv, sizeof(iv), aad, sizeof(aad), in, sizeof(in), out, sizeof(tag), tag) != 1) {		error_print();		return -1;	}	if (gcm_decrypt(&block_key, iv, sizeof(iv), aad, sizeof(aad), out, sizeof(out), tag, sizeof(tag), buf) != 1) {		error_print();		return -1;	}	if (memcmp(buf, in, sizeof(in)) != 0) {		error_print();		return -1;	}	memset(out, 0, sizeof(out));	memset(buf, 0, sizeof(buf));	memset(tag, 0, sizeof(tag));	if (block_cipher_set_encrypt_key(&block_key, BLOCK_CIPHER_sm4(), key) != 1) {		error_print();		return -1;	}	if (gcm_encrypt(&block_key, iv, sizeof(iv), aad, sizeof(aad), in, sizeof(in), out, sizeof(tag), tag) != 1) {		error_print();		return -1;	}	if (gcm_decrypt(&block_key, iv, sizeof(iv), aad, sizeof(aad), out, sizeof(out), tag, sizeof(tag), buf) != 1) {		error_print();		return -1;	}	if (memcmp(buf, in, sizeof(in)) != 0) {		error_print();		return -1;	}	printf("%s() ok\n", __FUNCTION__);	return 1;}int main(int argc, char **argv){	if (test_ghash() != 1) goto err;	if (test_gcm() != 1) goto err;	printf("%s all tests passed\n", __FILE__);	return 0;err:	error_print();	return -1;}
 |