mirror of
https://github.com/SerenityOS/serenity.git
synced 2025-01-23 09:51:57 -05:00
LibCrypto+LibTLS+Kernel: Switch the Cipher::Mode interface to use Span
This shaves 2.5 more runtime seconds off 'disasm /bin/id', and makes the Mode<T> interface a lot more allocation-friendly.
This commit is contained in:
parent
caedd05bd8
commit
bc7a149039
11 changed files with 182 additions and 153 deletions
|
@ -68,12 +68,13 @@ public:
|
||||||
|
|
||||||
typename CipherType::CTRMode cipher(m_key, KeySize);
|
typename CipherType::CTRMode cipher(m_key, KeySize);
|
||||||
|
|
||||||
auto wrapped_buffer = ByteBuffer::wrap(buffer, n);
|
Bytes buffer_span { buffer, n };
|
||||||
m_counter = cipher.key_stream(wrapped_buffer, m_counter).value();
|
auto counter_span = m_counter.span();
|
||||||
|
cipher.key_stream(buffer_span, counter_span, &counter_span);
|
||||||
|
|
||||||
// Extract a new key from the prng stream.
|
// Extract a new key from the prng stream.
|
||||||
|
|
||||||
m_counter = cipher.key_stream(m_key, m_counter).value();
|
cipher.key_stream(buffer_span, counter_span, &counter_span);
|
||||||
}
|
}
|
||||||
|
|
||||||
template<typename T>
|
template<typename T>
|
||||||
|
|
|
@ -68,8 +68,11 @@ public:
|
||||||
m_inner_hasher.update(message, length);
|
m_inner_hasher.update(message, length);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
TagType process(const ReadonlyBytes& span) { return process(span.data(), span.size()); }
|
||||||
TagType process(const ByteBuffer& buffer) { return process(buffer.data(), buffer.size()); }
|
TagType process(const ByteBuffer& buffer) { return process(buffer.data(), buffer.size()); }
|
||||||
TagType process(const StringView& string) { return process((const u8*)string.characters_without_null_termination(), string.length()); }
|
TagType process(const StringView& string) { return process((const u8*)string.characters_without_null_termination(), string.length()); }
|
||||||
|
|
||||||
|
void update(const ReadonlyBytes& span) { return update(span.data(), span.size()); }
|
||||||
void update(const ByteBuffer& buffer) { return update(buffer.data(), buffer.size()); }
|
void update(const ByteBuffer& buffer) { return update(buffer.data(), buffer.size()); }
|
||||||
void update(const StringView& string) { return update((const u8*)string.characters_without_null_termination(), string.length()); }
|
void update(const StringView& string) { return update((const u8*)string.characters_without_null_termination(), string.length()); }
|
||||||
|
|
||||||
|
|
|
@ -396,13 +396,11 @@ void AESCipher::decrypt_block(const AESCipherBlock& in, AESCipherBlock& out)
|
||||||
// clang-format on
|
// clang-format on
|
||||||
}
|
}
|
||||||
|
|
||||||
void AESCipherBlock::overwrite(const ByteBuffer& buffer)
|
void AESCipherBlock::overwrite(const ReadonlyBytes& span)
|
||||||
{
|
{
|
||||||
overwrite(buffer.data(), buffer.size());
|
auto data = span.data();
|
||||||
}
|
auto length = span.size();
|
||||||
|
|
||||||
void AESCipherBlock::overwrite(const u8* data, size_t length)
|
|
||||||
{
|
|
||||||
ASSERT(length <= m_data.size());
|
ASSERT(length <= m_data.size());
|
||||||
m_data.overwrite(0, data, length);
|
m_data.overwrite(0, data, length);
|
||||||
if (length < m_data.size()) {
|
if (length < m_data.size()) {
|
||||||
|
|
|
@ -46,7 +46,7 @@ public:
|
||||||
AESCipherBlock(const u8* data, size_t length, PaddingMode mode = PaddingMode::CMS)
|
AESCipherBlock(const u8* data, size_t length, PaddingMode mode = PaddingMode::CMS)
|
||||||
: AESCipherBlock(mode)
|
: AESCipherBlock(mode)
|
||||||
{
|
{
|
||||||
overwrite(data, length);
|
CipherBlock::overwrite(data, length);
|
||||||
}
|
}
|
||||||
|
|
||||||
static size_t block_size() { return BlockSizeInBits / 8; };
|
static size_t block_size() { return BlockSizeInBits / 8; };
|
||||||
|
@ -54,8 +54,9 @@ public:
|
||||||
virtual ByteBuffer get() const override { return m_data; };
|
virtual ByteBuffer get() const override { return m_data; };
|
||||||
virtual const ByteBuffer& data() const override { return m_data; };
|
virtual const ByteBuffer& data() const override { return m_data; };
|
||||||
|
|
||||||
virtual void overwrite(const ByteBuffer&) override;
|
virtual void overwrite(const ReadonlyBytes&) override;
|
||||||
virtual void overwrite(const u8* data, size_t length) override;
|
virtual void overwrite(const ByteBuffer& buffer) override { overwrite(buffer.span()); }
|
||||||
|
virtual void overwrite(const u8* data, size_t size) override { overwrite({ data, size }); }
|
||||||
|
|
||||||
virtual void apply_initialization_vector(const u8* ivec) override
|
virtual void apply_initialization_vector(const u8* ivec) override
|
||||||
{
|
{
|
||||||
|
|
|
@ -64,12 +64,14 @@ public:
|
||||||
virtual ByteBuffer get() const = 0;
|
virtual ByteBuffer get() const = 0;
|
||||||
virtual const ByteBuffer& data() const = 0;
|
virtual const ByteBuffer& data() const = 0;
|
||||||
|
|
||||||
virtual void overwrite(const ByteBuffer&) = 0;
|
virtual void overwrite(const ReadonlyBytes&) = 0;
|
||||||
virtual void overwrite(const u8*, size_t) = 0;
|
virtual void overwrite(const ByteBuffer& buffer) { overwrite(buffer.span()); }
|
||||||
|
virtual void overwrite(const u8* data, size_t size) { overwrite({ data, size }); }
|
||||||
|
|
||||||
virtual void apply_initialization_vector(const u8* ivec) = 0;
|
virtual void apply_initialization_vector(const u8* ivec) = 0;
|
||||||
|
|
||||||
PaddingMode padding_mode() const { return m_padding_mode; }
|
PaddingMode padding_mode() const { return m_padding_mode; }
|
||||||
|
void set_padding_mode(PaddingMode mode) { m_padding_mode = mode; }
|
||||||
|
|
||||||
template<typename T>
|
template<typename T>
|
||||||
void put(size_t offset, T value)
|
void put(size_t offset, T value)
|
||||||
|
|
|
@ -27,8 +27,8 @@
|
||||||
#pragma once
|
#pragma once
|
||||||
|
|
||||||
#include <AK/String.h>
|
#include <AK/String.h>
|
||||||
#include <AK/StringView.h>
|
|
||||||
#include <AK/StringBuilder.h>
|
#include <AK/StringBuilder.h>
|
||||||
|
#include <AK/StringView.h>
|
||||||
#include <LibCrypto/Cipher/Mode/Mode.h>
|
#include <LibCrypto/Cipher/Mode/Mode.h>
|
||||||
|
|
||||||
namespace Crypto {
|
namespace Crypto {
|
||||||
|
@ -56,44 +56,7 @@ public:
|
||||||
|
|
||||||
virtual size_t IV_length() const override { return IVSizeInBits / 8; }
|
virtual size_t IV_length() const override { return IVSizeInBits / 8; }
|
||||||
|
|
||||||
virtual Optional<ByteBuffer> encrypt(const ByteBuffer& in, ByteBuffer& out, Optional<ByteBuffer> ivec = {}) override
|
virtual void encrypt(const ReadonlyBytes& in, Bytes& out, const Bytes& ivec = {}, Bytes* ivec_out = nullptr) override
|
||||||
{
|
|
||||||
auto length = in.size();
|
|
||||||
if (length == 0)
|
|
||||||
return {};
|
|
||||||
|
|
||||||
auto& cipher = this->cipher();
|
|
||||||
|
|
||||||
// FIXME: We should have two of these encrypt/decrypt functions that
|
|
||||||
// we SFINAE out based on whether the Cipher mode needs an ivec
|
|
||||||
ASSERT(ivec.has_value());
|
|
||||||
const auto* iv = ivec.value().data();
|
|
||||||
|
|
||||||
typename T::BlockType block { cipher.padding_mode() };
|
|
||||||
size_t offset { 0 };
|
|
||||||
auto block_size = cipher.block_size();
|
|
||||||
|
|
||||||
while (length >= block_size) {
|
|
||||||
block.overwrite(in.slice_view(offset, block_size));
|
|
||||||
block.apply_initialization_vector(iv);
|
|
||||||
cipher.encrypt_block(block, block);
|
|
||||||
out.overwrite(offset, block.get().data(), block_size);
|
|
||||||
iv = out.offset_pointer(offset);
|
|
||||||
length -= block_size;
|
|
||||||
offset += block_size;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (length > 0) {
|
|
||||||
block.overwrite(in.slice_view(offset, length));
|
|
||||||
block.apply_initialization_vector(iv);
|
|
||||||
cipher.encrypt_block(block, block);
|
|
||||||
out.overwrite(offset, block.get().data(), block_size);
|
|
||||||
iv = out.offset_pointer(offset);
|
|
||||||
}
|
|
||||||
|
|
||||||
return ByteBuffer::copy(iv, block_size);
|
|
||||||
}
|
|
||||||
virtual void decrypt(const ByteBuffer& in, ByteBuffer& out, Optional<ByteBuffer> ivec = {}) override
|
|
||||||
{
|
{
|
||||||
auto length = in.size();
|
auto length = in.size();
|
||||||
if (length == 0)
|
if (length == 0)
|
||||||
|
@ -101,8 +64,49 @@ public:
|
||||||
|
|
||||||
auto& cipher = this->cipher();
|
auto& cipher = this->cipher();
|
||||||
|
|
||||||
ASSERT(ivec.has_value());
|
// FIXME: We should have two of these encrypt/decrypt functions that
|
||||||
const auto* iv = ivec.value().data();
|
// we SFINAE out based on whether the Cipher mode needs an ivec
|
||||||
|
ASSERT(!ivec.is_empty());
|
||||||
|
const auto* iv = ivec.data();
|
||||||
|
|
||||||
|
m_cipher_block.set_padding_mode(cipher.padding_mode());
|
||||||
|
size_t offset { 0 };
|
||||||
|
auto block_size = cipher.block_size();
|
||||||
|
|
||||||
|
while (length >= block_size) {
|
||||||
|
m_cipher_block.overwrite(in.slice(offset, block_size));
|
||||||
|
m_cipher_block.apply_initialization_vector(iv);
|
||||||
|
cipher.encrypt_block(m_cipher_block, m_cipher_block);
|
||||||
|
ASSERT(offset + block_size <= out.size());
|
||||||
|
__builtin_memcpy(out.offset(offset), m_cipher_block.get().data(), block_size);
|
||||||
|
iv = out.offset(offset);
|
||||||
|
length -= block_size;
|
||||||
|
offset += block_size;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (length > 0) {
|
||||||
|
m_cipher_block.overwrite(in.slice(offset, length));
|
||||||
|
m_cipher_block.apply_initialization_vector(iv);
|
||||||
|
cipher.encrypt_block(m_cipher_block, m_cipher_block);
|
||||||
|
ASSERT(offset + block_size <= out.size());
|
||||||
|
__builtin_memcpy(out.offset(offset), m_cipher_block.get().data(), block_size);
|
||||||
|
iv = out.offset(offset);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (ivec_out)
|
||||||
|
__builtin_memcpy(ivec_out->data(), iv, min(IV_length(), ivec_out->size()));
|
||||||
|
}
|
||||||
|
|
||||||
|
virtual void decrypt(const ReadonlyBytes& in, Bytes& out, const Bytes& ivec = {}) override
|
||||||
|
{
|
||||||
|
auto length = in.size();
|
||||||
|
if (length == 0)
|
||||||
|
return;
|
||||||
|
|
||||||
|
auto& cipher = this->cipher();
|
||||||
|
|
||||||
|
ASSERT(!ivec.is_empty());
|
||||||
|
const auto* iv = ivec.data();
|
||||||
|
|
||||||
auto block_size = cipher.block_size();
|
auto block_size = cipher.block_size();
|
||||||
|
|
||||||
|
@ -110,23 +114,27 @@ public:
|
||||||
// FIXME (ponder): Should we simply decrypt as much as we can?
|
// FIXME (ponder): Should we simply decrypt as much as we can?
|
||||||
ASSERT(length % block_size == 0);
|
ASSERT(length % block_size == 0);
|
||||||
|
|
||||||
typename T::BlockType block { cipher.padding_mode() };
|
m_cipher_block.set_padding_mode(cipher.padding_mode());
|
||||||
size_t offset { 0 };
|
size_t offset { 0 };
|
||||||
|
|
||||||
while (length > 0) {
|
while (length > 0) {
|
||||||
auto* slice = in.offset_pointer(offset);
|
auto* slice = in.offset(offset);
|
||||||
block.overwrite(slice, block_size);
|
m_cipher_block.overwrite(slice, block_size);
|
||||||
cipher.decrypt_block(block, block);
|
cipher.decrypt_block(m_cipher_block, m_cipher_block);
|
||||||
block.apply_initialization_vector(iv);
|
m_cipher_block.apply_initialization_vector(iv);
|
||||||
auto decrypted = block.get();
|
auto decrypted = m_cipher_block.get();
|
||||||
out.overwrite(offset, decrypted.data(), decrypted.size());
|
ASSERT(offset + decrypted.size() <= out.size());
|
||||||
|
__builtin_memcpy(out.offset(offset), decrypted.data(), decrypted.size());
|
||||||
iv = slice;
|
iv = slice;
|
||||||
length -= block_size;
|
length -= block_size;
|
||||||
offset += block_size;
|
offset += block_size;
|
||||||
}
|
}
|
||||||
out.trim(offset);
|
out = out.slice(0, offset);
|
||||||
this->prune_padding(out);
|
this->prune_padding(out);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private:
|
||||||
|
typename T::BlockType m_cipher_block {};
|
||||||
};
|
};
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -98,8 +98,8 @@ public:
|
||||||
// Must intercept `Intent`, because AES must always be set to
|
// Must intercept `Intent`, because AES must always be set to
|
||||||
// Encryption, even when decrypting AES-CTR.
|
// Encryption, even when decrypting AES-CTR.
|
||||||
// TODO: How to deal with ciphers that take different arguments?
|
// TODO: How to deal with ciphers that take different arguments?
|
||||||
template<typename... Args>
|
template<typename KeyType, typename... Args>
|
||||||
explicit constexpr CTR<T>(const ByteBuffer& user_key, size_t key_bits, Intent = Intent::Encryption, Args... args)
|
explicit constexpr CTR<T>(const KeyType& user_key, size_t key_bits, Intent = Intent::Encryption, Args... args)
|
||||||
: Mode<T>(user_key, key_bits, args...)
|
: Mode<T>(user_key, key_bits, args...)
|
||||||
{
|
{
|
||||||
}
|
}
|
||||||
|
@ -114,26 +114,29 @@ public:
|
||||||
|
|
||||||
virtual size_t IV_length() const override { return IVSizeInBits / 8; }
|
virtual size_t IV_length() const override { return IVSizeInBits / 8; }
|
||||||
|
|
||||||
virtual Optional<ByteBuffer> encrypt(const ByteBuffer& in, ByteBuffer& out, Optional<ByteBuffer> ivec = {}) override
|
virtual void encrypt(const ReadonlyBytes& in, Bytes& out, const Bytes& ivec = {}, Bytes* ivec_out = nullptr) override
|
||||||
{
|
{
|
||||||
// Our interpretation of "ivec" is what AES-CTR
|
// Our interpretation of "ivec" is what AES-CTR
|
||||||
// would define as nonce + IV + 4 zero bytes.
|
// would define as nonce + IV + 4 zero bytes.
|
||||||
return this->encrypt_or_stream(&in, out, ivec);
|
this->encrypt_or_stream(&in, out, ivec, ivec_out);
|
||||||
}
|
}
|
||||||
|
|
||||||
Optional<ByteBuffer> key_stream(ByteBuffer& out, Optional<ByteBuffer> ivec = {})
|
void key_stream(Bytes& out, const Bytes& ivec = {}, Bytes* ivec_out = nullptr)
|
||||||
{
|
{
|
||||||
return this->encrypt_or_stream(nullptr, out, ivec);
|
this->encrypt_or_stream(nullptr, out, ivec, ivec_out);
|
||||||
}
|
}
|
||||||
|
|
||||||
virtual void decrypt(const ByteBuffer& in, ByteBuffer& out, Optional<ByteBuffer> ivec = {}) override
|
virtual void decrypt(const ReadonlyBytes& in, Bytes& out, const Bytes& ivec = {}) override
|
||||||
{
|
{
|
||||||
// XOR (and thus CTR) is the most symmetric mode.
|
// XOR (and thus CTR) is the most symmetric mode.
|
||||||
(void)this->encrypt(in, out, ivec);
|
this->encrypt(in, out, ivec);
|
||||||
}
|
}
|
||||||
|
|
||||||
private:
|
private:
|
||||||
static void increment_inplace(ByteBuffer& in)
|
u8 m_ivec_storage[IVSizeInBits / 8];
|
||||||
|
typename T::BlockType m_cipher_block {};
|
||||||
|
|
||||||
|
static void increment_inplace(Bytes& in)
|
||||||
{
|
{
|
||||||
for (size_t i = in.size(); i > 0;) {
|
for (size_t i = in.size(); i > 0;) {
|
||||||
--i;
|
--i;
|
||||||
|
@ -146,14 +149,14 @@ private:
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
Optional<ByteBuffer> encrypt_or_stream(const ByteBuffer* in, ByteBuffer& out, Optional<ByteBuffer> ivec)
|
void encrypt_or_stream(const ReadonlyBytes* in, Bytes& out, const Bytes& ivec, Bytes* ivec_out = nullptr)
|
||||||
{
|
{
|
||||||
size_t length;
|
size_t length;
|
||||||
if (in) {
|
if (in) {
|
||||||
ASSERT(in->size() <= out.size());
|
ASSERT(in->size() <= out.size());
|
||||||
length = in->size();
|
length = in->size();
|
||||||
if (length == 0)
|
if (length == 0)
|
||||||
return {};
|
return;
|
||||||
} else {
|
} else {
|
||||||
length = out.size();
|
length = out.size();
|
||||||
}
|
}
|
||||||
|
@ -162,29 +165,36 @@ private:
|
||||||
|
|
||||||
// FIXME: We should have two of these encrypt/decrypt functions that
|
// FIXME: We should have two of these encrypt/decrypt functions that
|
||||||
// we SFINAE out based on whether the Cipher mode needs an ivec
|
// we SFINAE out based on whether the Cipher mode needs an ivec
|
||||||
ASSERT(ivec.has_value());
|
ASSERT(!ivec.is_empty());
|
||||||
auto iv = ivec.value();
|
ASSERT(ivec.size() >= IV_length());
|
||||||
|
|
||||||
|
m_cipher_block.set_padding_mode(cipher.padding_mode());
|
||||||
|
|
||||||
|
__builtin_memcpy(m_ivec_storage, ivec.data(), IV_length());
|
||||||
|
Bytes iv { m_ivec_storage, IV_length() };
|
||||||
|
|
||||||
typename T::BlockType block { cipher.padding_mode() };
|
|
||||||
size_t offset { 0 };
|
size_t offset { 0 };
|
||||||
auto block_size = cipher.block_size();
|
auto block_size = cipher.block_size();
|
||||||
|
|
||||||
while (length > 0) {
|
while (length > 0) {
|
||||||
block.overwrite(iv.slice_view(0, block_size));
|
m_cipher_block.overwrite(iv.slice(0, block_size));
|
||||||
|
|
||||||
cipher.encrypt_block(block, block);
|
cipher.encrypt_block(m_cipher_block, m_cipher_block);
|
||||||
if (in) {
|
if (in) {
|
||||||
block.apply_initialization_vector(in->data() + offset);
|
m_cipher_block.apply_initialization_vector(in->data() + offset);
|
||||||
}
|
}
|
||||||
auto write_size = min(block_size, length);
|
auto write_size = min(block_size, length);
|
||||||
out.overwrite(offset, block.get().data(), write_size);
|
|
||||||
|
ASSERT(offset + write_size <= out.size());
|
||||||
|
__builtin_memcpy(out.offset(offset), m_cipher_block.get().data(), write_size);
|
||||||
|
|
||||||
increment_inplace(iv);
|
increment_inplace(iv);
|
||||||
length -= write_size;
|
length -= write_size;
|
||||||
offset += write_size;
|
offset += write_size;
|
||||||
}
|
}
|
||||||
|
|
||||||
return iv;
|
if (ivec_out)
|
||||||
|
__builtin_memcpy(ivec_out->data(), iv.data(), min(ivec_out->size(), IV_length()));
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -27,6 +27,8 @@
|
||||||
#pragma once
|
#pragma once
|
||||||
|
|
||||||
#include <AK/ByteBuffer.h>
|
#include <AK/ByteBuffer.h>
|
||||||
|
#include <AK/Span.h>
|
||||||
|
#include <AK/StdLibExtras.h>
|
||||||
#include <LibCrypto/Cipher/Cipher.h>
|
#include <LibCrypto/Cipher/Cipher.h>
|
||||||
|
|
||||||
namespace Crypto {
|
namespace Crypto {
|
||||||
|
@ -37,9 +39,8 @@ class Mode {
|
||||||
public:
|
public:
|
||||||
virtual ~Mode() { }
|
virtual ~Mode() { }
|
||||||
|
|
||||||
// FIXME: Somehow communicate that encrypt returns the last initialization vector (if the mode supports it)
|
virtual void encrypt(const ReadonlyBytes& in, Bytes& out, const Bytes& ivec = {}, Bytes* ivec_out = nullptr) = 0;
|
||||||
virtual Optional<ByteBuffer> encrypt(const ByteBuffer& in, ByteBuffer& out, Optional<ByteBuffer> ivec = {}) = 0;
|
virtual void decrypt(const ReadonlyBytes& in, Bytes& out, const Bytes& ivec = {}) = 0;
|
||||||
virtual void decrypt(const ByteBuffer& in, ByteBuffer& out, Optional<ByteBuffer> ivec = {}) = 0;
|
|
||||||
|
|
||||||
virtual size_t IV_length() const = 0;
|
virtual size_t IV_length() const = 0;
|
||||||
|
|
||||||
|
@ -58,7 +59,7 @@ public:
|
||||||
T& cipher() { return m_cipher; }
|
T& cipher() { return m_cipher; }
|
||||||
|
|
||||||
protected:
|
protected:
|
||||||
virtual void prune_padding(ByteBuffer& data)
|
virtual void prune_padding(Bytes& data)
|
||||||
{
|
{
|
||||||
auto size = data.size();
|
auto size = data.size();
|
||||||
switch (m_cipher.padding_mode()) {
|
switch (m_cipher.padding_mode()) {
|
||||||
|
@ -74,7 +75,7 @@ protected:
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
data.trim(size - maybe_padding_length);
|
data = data.slice(0, size - maybe_padding_length);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
case PaddingMode::RFC5246: {
|
case PaddingMode::RFC5246: {
|
||||||
|
@ -86,13 +87,13 @@ protected:
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
data.trim(size - maybe_padding_length - 1);
|
data = data.slice(0, size - maybe_padding_length - 1);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
case PaddingMode::Null: {
|
case PaddingMode::Null: {
|
||||||
while (data[size - 1] == 0)
|
while (data[size - 1] == 0)
|
||||||
--size;
|
--size;
|
||||||
data.trim(size);
|
data = data.slice(0, size);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
default:
|
default:
|
||||||
|
|
|
@ -92,7 +92,7 @@ void TLSv12::update_packet(ByteBuffer& packet)
|
||||||
buffer_position += packet.size() - header_size;
|
buffer_position += packet.size() - header_size;
|
||||||
|
|
||||||
// get the appropricate HMAC value for the entire packet
|
// get the appropricate HMAC value for the entire packet
|
||||||
auto mac = hmac_message(packet, {}, mac_size, true);
|
auto mac = hmac_message(packet.span(), {}, mac_size, true);
|
||||||
|
|
||||||
// write the MAC
|
// write the MAC
|
||||||
buffer.overwrite(buffer_position, mac.data(), mac.size());
|
buffer.overwrite(buffer_position, mac.data(), mac.size());
|
||||||
|
@ -114,10 +114,8 @@ void TLSv12::update_packet(ByteBuffer& packet)
|
||||||
ASSERT(length % block_size == 0);
|
ASSERT(length % block_size == 0);
|
||||||
|
|
||||||
// get a block to encrypt into
|
// get a block to encrypt into
|
||||||
auto view = ct.slice_view(header_size + iv_size, length);
|
auto view = ct.span().slice(header_size + iv_size, length);
|
||||||
|
m_aes_local->encrypt(buffer.span(), view, iv.span());
|
||||||
// encrypt the message
|
|
||||||
(void)m_aes_local->encrypt(buffer, view, iv);
|
|
||||||
|
|
||||||
// store the correct ciphertext length into the packet
|
// store the correct ciphertext length into the packet
|
||||||
u16 ct_length = (u16)ct.size() - header_size;
|
u16 ct_length = (u16)ct.size() - header_size;
|
||||||
|
@ -137,17 +135,17 @@ void TLSv12::update_hash(const ByteBuffer& message)
|
||||||
m_context.handshake_hash.update(message);
|
m_context.handshake_hash.update(message);
|
||||||
}
|
}
|
||||||
|
|
||||||
ByteBuffer TLSv12::hmac_message(const ByteBuffer& buf, const Optional<ByteBuffer> buf2, size_t mac_length, bool local)
|
ByteBuffer TLSv12::hmac_message(const ReadonlyBytes& buf, const Optional<ReadonlyBytes> buf2, size_t mac_length, bool local)
|
||||||
{
|
{
|
||||||
u64 sequence_number = convert_between_host_and_network(local ? m_context.local_sequence_number : m_context.remote_sequence_number);
|
u64 sequence_number = convert_between_host_and_network(local ? m_context.local_sequence_number : m_context.remote_sequence_number);
|
||||||
ensure_hmac(mac_length, local);
|
ensure_hmac(mac_length, local);
|
||||||
auto& hmac = local ? *m_hmac_local : *m_hmac_remote;
|
auto& hmac = local ? *m_hmac_local : *m_hmac_remote;
|
||||||
#ifdef TLS_DEBUG
|
#ifndef TLS_DEBUG
|
||||||
dbg() << "========================= PACKET DATA ==========================";
|
dbg() << "========================= PACKET DATA ==========================";
|
||||||
print_buffer((const u8*)&sequence_number, sizeof(u64));
|
print_buffer((const u8*)&sequence_number, sizeof(u64));
|
||||||
print_buffer(buf);
|
print_buffer(buf.data(), buf.size());
|
||||||
if (buf2.has_value())
|
if (buf2.has_value())
|
||||||
print_buffer(buf2.value());
|
print_buffer(buf2.value().data(), buf2.value().size());
|
||||||
dbg() << "========================= PACKET DATA ==========================";
|
dbg() << "========================= PACKET DATA ==========================";
|
||||||
#endif
|
#endif
|
||||||
hmac.update((const u8*)&sequence_number, sizeof(u64));
|
hmac.update((const u8*)&sequence_number, sizeof(u64));
|
||||||
|
@ -217,9 +215,10 @@ ssize_t TLSv12::handle_message(const ByteBuffer& buffer)
|
||||||
auto decrypted = m_aes_remote->create_aligned_buffer(length - iv_size);
|
auto decrypted = m_aes_remote->create_aligned_buffer(length - iv_size);
|
||||||
auto iv = buffer.slice_view(header_size, iv_size);
|
auto iv = buffer.slice_view(header_size, iv_size);
|
||||||
|
|
||||||
m_aes_remote->decrypt(buffer.slice_view(header_size + iv_size, length - iv_size), decrypted, iv);
|
Bytes decrypted_span = decrypted.span();
|
||||||
|
m_aes_remote->decrypt(buffer.span().slice(header_size + iv_size, length - iv_size), decrypted_span, iv.span());
|
||||||
|
|
||||||
length = decrypted.size();
|
length = decrypted_span.size();
|
||||||
|
|
||||||
#ifdef TLS_DEBUG
|
#ifdef TLS_DEBUG
|
||||||
dbg() << "Decrypted: ";
|
dbg() << "Decrypted: ";
|
||||||
|
@ -234,11 +233,11 @@ ssize_t TLSv12::handle_message(const ByteBuffer& buffer)
|
||||||
return (i8)Error::BrokenPacket;
|
return (i8)Error::BrokenPacket;
|
||||||
}
|
}
|
||||||
|
|
||||||
const u8* message_hmac = decrypted.offset_pointer(length - mac_size);
|
const u8* message_hmac = decrypted_span.offset(length - mac_size);
|
||||||
u8 temp_buf[5];
|
u8 temp_buf[5];
|
||||||
memcpy(temp_buf, buffer.offset_pointer(0), 3);
|
memcpy(temp_buf, buffer.offset_pointer(0), 3);
|
||||||
*(u16*)(temp_buf + 3) = convert_between_host_and_network(length);
|
*(u16*)(temp_buf + 3) = convert_between_host_and_network(length);
|
||||||
auto hmac = hmac_message(ByteBuffer::wrap(temp_buf, 5), decrypted, mac_size);
|
auto hmac = hmac_message({ temp_buf, 5 }, decrypted_span, mac_size);
|
||||||
auto message_mac = ByteBuffer::wrap(const_cast<u8*>(message_hmac), mac_size);
|
auto message_mac = ByteBuffer::wrap(const_cast<u8*>(message_hmac), mac_size);
|
||||||
if (hmac != message_mac) {
|
if (hmac != message_mac) {
|
||||||
dbg() << "integrity check failed (mac length " << length << ")";
|
dbg() << "integrity check failed (mac length " << length << ")";
|
||||||
|
|
|
@ -366,7 +366,7 @@ private:
|
||||||
|
|
||||||
void consume(const ByteBuffer& record);
|
void consume(const ByteBuffer& record);
|
||||||
|
|
||||||
ByteBuffer hmac_message(const ByteBuffer& buf, const Optional<ByteBuffer> buf2, size_t mac_length, bool local = false);
|
ByteBuffer hmac_message(const ReadonlyBytes& buf, const Optional<ReadonlyBytes> buf2, size_t mac_length, bool local = false);
|
||||||
void ensure_hmac(size_t digest_size, bool local);
|
void ensure_hmac(size_t digest_size, bool local);
|
||||||
|
|
||||||
void update_packet(ByteBuffer& packet);
|
void update_packet(ByteBuffer& packet);
|
||||||
|
|
|
@ -99,7 +99,7 @@ int crc32_tests();
|
||||||
|
|
||||||
// stop listing tests
|
// stop listing tests
|
||||||
|
|
||||||
void print_buffer(const ByteBuffer& buffer, int split)
|
void print_buffer(const ReadonlyBytes& buffer, int split)
|
||||||
{
|
{
|
||||||
for (size_t i = 0; i < buffer.size(); ++i) {
|
for (size_t i = 0; i < buffer.size(); ++i) {
|
||||||
if (split > 0) {
|
if (split > 0) {
|
||||||
|
@ -200,20 +200,22 @@ void aes_cbc(const char* message, size_t len)
|
||||||
Crypto::Cipher::Intent::Encryption);
|
Crypto::Cipher::Intent::Encryption);
|
||||||
|
|
||||||
auto enc = cipher.create_aligned_buffer(buffer.size());
|
auto enc = cipher.create_aligned_buffer(buffer.size());
|
||||||
(void)cipher.encrypt(buffer, enc, iv);
|
auto enc_span = enc.span();
|
||||||
|
cipher.encrypt(buffer.span(), enc_span, iv.span());
|
||||||
|
|
||||||
if (binary)
|
if (binary)
|
||||||
printf("%.*s", (int)enc.size(), enc.data());
|
printf("%.*s", (int)enc_span.size(), enc_span.data());
|
||||||
else
|
else
|
||||||
print_buffer(enc, Crypto::Cipher::AESCipher::block_size());
|
print_buffer(enc_span, Crypto::Cipher::AESCipher::block_size());
|
||||||
} else {
|
} else {
|
||||||
Crypto::Cipher::AESCipher::CBCMode cipher(
|
Crypto::Cipher::AESCipher::CBCMode cipher(
|
||||||
ByteBuffer::wrap(const_cast<char*>(secret_key), strlen(secret_key)),
|
ByteBuffer::wrap(const_cast<char*>(secret_key), strlen(secret_key)),
|
||||||
key_bits,
|
key_bits,
|
||||||
Crypto::Cipher::Intent::Decryption);
|
Crypto::Cipher::Intent::Decryption);
|
||||||
auto dec = cipher.create_aligned_buffer(buffer.size());
|
auto dec = cipher.create_aligned_buffer(buffer.size());
|
||||||
cipher.decrypt(buffer, dec, iv);
|
auto dec_span = dec.span();
|
||||||
printf("%.*s\n", (int)dec.size(), dec.data());
|
cipher.decrypt(buffer.span(), dec_span, iv.span());
|
||||||
|
printf("%.*s\n", (int)dec_span.size(), dec_span.data());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -235,7 +237,7 @@ void md5(const char* message, size_t len)
|
||||||
if (binary)
|
if (binary)
|
||||||
printf("%.*s", (int)Crypto::Hash::MD5::digest_size(), digest.data);
|
printf("%.*s", (int)Crypto::Hash::MD5::digest_size(), digest.data);
|
||||||
else
|
else
|
||||||
print_buffer(ByteBuffer::wrap(digest.data, Crypto::Hash::MD5::digest_size()), -1);
|
print_buffer({ digest.data, Crypto::Hash::MD5::digest_size() }, -1);
|
||||||
}
|
}
|
||||||
|
|
||||||
void hmac_md5(const char* message, size_t len)
|
void hmac_md5(const char* message, size_t len)
|
||||||
|
@ -245,7 +247,7 @@ void hmac_md5(const char* message, size_t len)
|
||||||
if (binary)
|
if (binary)
|
||||||
printf("%.*s", (int)hmac.digest_size(), mac.data);
|
printf("%.*s", (int)hmac.digest_size(), mac.data);
|
||||||
else
|
else
|
||||||
print_buffer(ByteBuffer::wrap(mac.data, hmac.digest_size()), -1);
|
print_buffer({ mac.data, hmac.digest_size() }, -1);
|
||||||
}
|
}
|
||||||
|
|
||||||
void sha1(const char* message, size_t len)
|
void sha1(const char* message, size_t len)
|
||||||
|
@ -254,7 +256,7 @@ void sha1(const char* message, size_t len)
|
||||||
if (binary)
|
if (binary)
|
||||||
printf("%.*s", (int)Crypto::Hash::SHA1::digest_size(), digest.data);
|
printf("%.*s", (int)Crypto::Hash::SHA1::digest_size(), digest.data);
|
||||||
else
|
else
|
||||||
print_buffer(ByteBuffer::wrap(digest.data, Crypto::Hash::SHA1::digest_size()), -1);
|
print_buffer({ digest.data, Crypto::Hash::SHA1::digest_size() }, -1);
|
||||||
}
|
}
|
||||||
|
|
||||||
void sha256(const char* message, size_t len)
|
void sha256(const char* message, size_t len)
|
||||||
|
@ -263,7 +265,7 @@ void sha256(const char* message, size_t len)
|
||||||
if (binary)
|
if (binary)
|
||||||
printf("%.*s", (int)Crypto::Hash::SHA256::digest_size(), digest.data);
|
printf("%.*s", (int)Crypto::Hash::SHA256::digest_size(), digest.data);
|
||||||
else
|
else
|
||||||
print_buffer(ByteBuffer::wrap(digest.data, Crypto::Hash::SHA256::digest_size()), -1);
|
print_buffer({ digest.data, Crypto::Hash::SHA256::digest_size() }, -1);
|
||||||
}
|
}
|
||||||
|
|
||||||
void hmac_sha256(const char* message, size_t len)
|
void hmac_sha256(const char* message, size_t len)
|
||||||
|
@ -273,7 +275,7 @@ void hmac_sha256(const char* message, size_t len)
|
||||||
if (binary)
|
if (binary)
|
||||||
printf("%.*s", (int)hmac.digest_size(), mac.data);
|
printf("%.*s", (int)hmac.digest_size(), mac.data);
|
||||||
else
|
else
|
||||||
print_buffer(ByteBuffer::wrap(mac.data, hmac.digest_size()), -1);
|
print_buffer({ mac.data, hmac.digest_size() }, -1);
|
||||||
}
|
}
|
||||||
|
|
||||||
void sha512(const char* message, size_t len)
|
void sha512(const char* message, size_t len)
|
||||||
|
@ -282,7 +284,7 @@ void sha512(const char* message, size_t len)
|
||||||
if (binary)
|
if (binary)
|
||||||
printf("%.*s", (int)Crypto::Hash::SHA512::digest_size(), digest.data);
|
printf("%.*s", (int)Crypto::Hash::SHA512::digest_size(), digest.data);
|
||||||
else
|
else
|
||||||
print_buffer(ByteBuffer::wrap(digest.data, Crypto::Hash::SHA512::digest_size()), -1);
|
print_buffer({ digest.data, Crypto::Hash::SHA512::digest_size() }, -1);
|
||||||
}
|
}
|
||||||
|
|
||||||
void hmac_sha512(const char* message, size_t len)
|
void hmac_sha512(const char* message, size_t len)
|
||||||
|
@ -292,7 +294,7 @@ void hmac_sha512(const char* message, size_t len)
|
||||||
if (binary)
|
if (binary)
|
||||||
printf("%.*s", (int)hmac.digest_size(), mac.data);
|
printf("%.*s", (int)hmac.digest_size(), mac.data);
|
||||||
else
|
else
|
||||||
print_buffer(ByteBuffer::wrap(mac.data, hmac.digest_size()), -1);
|
print_buffer({ mac.data, hmac.digest_size() }, -1);
|
||||||
}
|
}
|
||||||
|
|
||||||
auto main(int argc, char** argv) -> int
|
auto main(int argc, char** argv) -> int
|
||||||
|
@ -585,12 +587,13 @@ void aes_cbc_test_encrypt()
|
||||||
auto in = "This is a test! This is another test!"_b;
|
auto in = "This is a test! This is another test!"_b;
|
||||||
auto out = cipher.create_aligned_buffer(in.size());
|
auto out = cipher.create_aligned_buffer(in.size());
|
||||||
auto iv = ByteBuffer::create_zeroed(Crypto::Cipher::AESCipher::block_size());
|
auto iv = ByteBuffer::create_zeroed(Crypto::Cipher::AESCipher::block_size());
|
||||||
(void)cipher.encrypt(in, out, iv);
|
auto out_span = out.span();
|
||||||
|
cipher.encrypt(in.span(), out_span, iv.span());
|
||||||
if (out.size() != sizeof(result))
|
if (out.size() != sizeof(result))
|
||||||
FAIL(size mismatch);
|
FAIL(size mismatch);
|
||||||
else if (memcmp(out.data(), result, out.size()) != 0) {
|
else if (memcmp(out_span.data(), result, out_span.size()) != 0) {
|
||||||
FAIL(invalid data);
|
FAIL(invalid data);
|
||||||
print_buffer(out, Crypto::Cipher::AESCipher::block_size());
|
print_buffer(out_span, Crypto::Cipher::AESCipher::block_size());
|
||||||
} else
|
} else
|
||||||
PASS;
|
PASS;
|
||||||
};
|
};
|
||||||
|
@ -648,13 +651,14 @@ void aes_cbc_test_decrypt()
|
||||||
auto in = ByteBuffer::copy(result, result_len);
|
auto in = ByteBuffer::copy(result, result_len);
|
||||||
auto out = cipher.create_aligned_buffer(in.size());
|
auto out = cipher.create_aligned_buffer(in.size());
|
||||||
auto iv = ByteBuffer::create_zeroed(Crypto::Cipher::AESCipher::block_size());
|
auto iv = ByteBuffer::create_zeroed(Crypto::Cipher::AESCipher::block_size());
|
||||||
cipher.decrypt(in, out, iv);
|
auto out_span = out.span();
|
||||||
if (out.size() != strlen(true_value)) {
|
cipher.decrypt(in.span(), out_span, iv.span());
|
||||||
|
if (out_span.size() != strlen(true_value)) {
|
||||||
FAIL(size mismatch);
|
FAIL(size mismatch);
|
||||||
printf("Expected %zu bytes but got %zu\n", strlen(true_value), out.size());
|
printf("Expected %zu bytes but got %zu\n", strlen(true_value), out_span.size());
|
||||||
} else if (memcmp(out.data(), true_value, strlen(true_value)) != 0) {
|
} else if (memcmp(out_span.data(), true_value, strlen(true_value)) != 0) {
|
||||||
FAIL(invalid data);
|
FAIL(invalid data);
|
||||||
print_buffer(out, Crypto::Cipher::AESCipher::block_size());
|
print_buffer(out_span, Crypto::Cipher::AESCipher::block_size());
|
||||||
} else
|
} else
|
||||||
PASS;
|
PASS;
|
||||||
};
|
};
|
||||||
|
@ -723,14 +727,15 @@ void aes_ctr_test_encrypt()
|
||||||
// nonce is already included in ivec.
|
// nonce is already included in ivec.
|
||||||
Crypto::Cipher::AESCipher::CTRMode cipher(key, 8 * key.size(), Crypto::Cipher::Intent::Encryption);
|
Crypto::Cipher::AESCipher::CTRMode cipher(key, 8 * key.size(), Crypto::Cipher::Intent::Encryption);
|
||||||
ByteBuffer out_actual = ByteBuffer::create_zeroed(in.size());
|
ByteBuffer out_actual = ByteBuffer::create_zeroed(in.size());
|
||||||
ByteBuffer final_ivec = cipher.encrypt(in, out_actual, ivec).value();
|
Bytes out_span = out_actual.span();
|
||||||
|
cipher.encrypt(in.span(), out_span, ivec.span());
|
||||||
if (out_expected.size() != out_actual.size()) {
|
if (out_expected.size() != out_actual.size()) {
|
||||||
FAIL(size mismatch);
|
FAIL(size mismatch);
|
||||||
printf("Expected %zu bytes but got %zu\n", out_expected.size(), out_actual.size());
|
printf("Expected %zu bytes but got %zu\n", out_expected.size(), out_span.size());
|
||||||
print_buffer(out_actual, Crypto::Cipher::AESCipher::block_size());
|
print_buffer(out_span, Crypto::Cipher::AESCipher::block_size());
|
||||||
} else if (memcmp(out_expected.data(), out_actual.data(), out_expected.size()) != 0) {
|
} else if (memcmp(out_expected.data(), out_span.data(), out_expected.size()) != 0) {
|
||||||
FAIL(invalid data);
|
FAIL(invalid data);
|
||||||
print_buffer(out_actual, Crypto::Cipher::AESCipher::block_size());
|
print_buffer(out_span, Crypto::Cipher::AESCipher::block_size());
|
||||||
} else
|
} else
|
||||||
PASS;
|
PASS;
|
||||||
};
|
};
|
||||||
|
@ -917,14 +922,15 @@ void aes_ctr_test_decrypt()
|
||||||
// nonce is already included in ivec.
|
// nonce is already included in ivec.
|
||||||
Crypto::Cipher::AESCipher::CTRMode cipher(key, 8 * key.size(), Crypto::Cipher::Intent::Decryption);
|
Crypto::Cipher::AESCipher::CTRMode cipher(key, 8 * key.size(), Crypto::Cipher::Intent::Decryption);
|
||||||
ByteBuffer out_actual = ByteBuffer::create_zeroed(in.size());
|
ByteBuffer out_actual = ByteBuffer::create_zeroed(in.size());
|
||||||
cipher.decrypt(in, out_actual, ivec);
|
auto out_span = out_actual.span();
|
||||||
if (out_expected.size() != out_actual.size()) {
|
cipher.decrypt(in.span(), out_span, ivec.span());
|
||||||
|
if (out_expected.size() != out_span.size()) {
|
||||||
FAIL(size mismatch);
|
FAIL(size mismatch);
|
||||||
printf("Expected %zu bytes but got %zu\n", out_expected.size(), out_actual.size());
|
printf("Expected %zu bytes but got %zu\n", out_expected.size(), out_span.size());
|
||||||
print_buffer(out_actual, Crypto::Cipher::AESCipher::block_size());
|
print_buffer(out_span, Crypto::Cipher::AESCipher::block_size());
|
||||||
} else if (memcmp(out_expected.data(), out_actual.data(), out_expected.size()) != 0) {
|
} else if (memcmp(out_expected.data(), out_span.data(), out_expected.size()) != 0) {
|
||||||
FAIL(invalid data);
|
FAIL(invalid data);
|
||||||
print_buffer(out_actual, Crypto::Cipher::AESCipher::block_size());
|
print_buffer(out_span, Crypto::Cipher::AESCipher::block_size());
|
||||||
} else
|
} else
|
||||||
PASS;
|
PASS;
|
||||||
};
|
};
|
||||||
|
@ -978,7 +984,7 @@ void md5_test_hash()
|
||||||
|
|
||||||
if (memcmp(result, digest.data, Crypto::Hash::MD5::digest_size()) != 0) {
|
if (memcmp(result, digest.data, Crypto::Hash::MD5::digest_size()) != 0) {
|
||||||
FAIL(Invalid hash);
|
FAIL(Invalid hash);
|
||||||
print_buffer(ByteBuffer::wrap(digest.data, Crypto::Hash::MD5::digest_size()), -1);
|
print_buffer({ digest.data, Crypto::Hash::MD5::digest_size() }, -1);
|
||||||
} else {
|
} else {
|
||||||
PASS;
|
PASS;
|
||||||
}
|
}
|
||||||
|
@ -993,7 +999,7 @@ void md5_test_hash()
|
||||||
|
|
||||||
if (memcmp(result, digest.data, Crypto::Hash::MD5::digest_size()) != 0) {
|
if (memcmp(result, digest.data, Crypto::Hash::MD5::digest_size()) != 0) {
|
||||||
FAIL(Invalid hash);
|
FAIL(Invalid hash);
|
||||||
print_buffer(ByteBuffer::wrap(digest.data, Crypto::Hash::MD5::digest_size()), -1);
|
print_buffer({ digest.data, Crypto::Hash::MD5::digest_size() }, -1);
|
||||||
} else {
|
} else {
|
||||||
PASS;
|
PASS;
|
||||||
}
|
}
|
||||||
|
@ -1007,7 +1013,7 @@ void md5_test_hash()
|
||||||
|
|
||||||
if (memcmp(result, digest.data, Crypto::Hash::MD5::digest_size()) != 0) {
|
if (memcmp(result, digest.data, Crypto::Hash::MD5::digest_size()) != 0) {
|
||||||
FAIL(Invalid hash);
|
FAIL(Invalid hash);
|
||||||
print_buffer(ByteBuffer::wrap(digest.data, Crypto::Hash::MD5::digest_size()), -1);
|
print_buffer({ digest.data, Crypto::Hash::MD5::digest_size() }, -1);
|
||||||
} else {
|
} else {
|
||||||
PASS;
|
PASS;
|
||||||
}
|
}
|
||||||
|
@ -1021,7 +1027,7 @@ void md5_test_hash()
|
||||||
|
|
||||||
if (memcmp(result, digest.data, Crypto::Hash::MD5::digest_size()) != 0) {
|
if (memcmp(result, digest.data, Crypto::Hash::MD5::digest_size()) != 0) {
|
||||||
FAIL(Invalid hash);
|
FAIL(Invalid hash);
|
||||||
print_buffer(ByteBuffer::wrap(digest.data, Crypto::Hash::MD5::digest_size()), -1);
|
print_buffer({ digest.data, Crypto::Hash::MD5::digest_size() }, -1);
|
||||||
} else {
|
} else {
|
||||||
PASS;
|
PASS;
|
||||||
}
|
}
|
||||||
|
@ -1035,7 +1041,7 @@ void md5_test_hash()
|
||||||
|
|
||||||
if (memcmp(result, digest.data, Crypto::Hash::MD5::digest_size()) != 0) {
|
if (memcmp(result, digest.data, Crypto::Hash::MD5::digest_size()) != 0) {
|
||||||
FAIL(Invalid hash);
|
FAIL(Invalid hash);
|
||||||
print_buffer(ByteBuffer::wrap(digest.data, Crypto::Hash::MD5::digest_size()), -1);
|
print_buffer({ digest.data, Crypto::Hash::MD5::digest_size() }, -1);
|
||||||
} else {
|
} else {
|
||||||
PASS;
|
PASS;
|
||||||
}
|
}
|
||||||
|
@ -1124,7 +1130,7 @@ void hmac_md5_test_process()
|
||||||
auto mac = hmac.process("Some bogus data");
|
auto mac = hmac.process("Some bogus data");
|
||||||
if (memcmp(result, mac.data, hmac.digest_size()) != 0) {
|
if (memcmp(result, mac.data, hmac.digest_size()) != 0) {
|
||||||
FAIL(Invalid mac);
|
FAIL(Invalid mac);
|
||||||
print_buffer(ByteBuffer::wrap(mac.data, hmac.digest_size()), -1);
|
print_buffer({ mac.data, hmac.digest_size() }, -1);
|
||||||
} else
|
} else
|
||||||
PASS;
|
PASS;
|
||||||
}
|
}
|
||||||
|
@ -1170,7 +1176,7 @@ void sha1_test_hash()
|
||||||
auto digest = Crypto::Hash::SHA1::hash("");
|
auto digest = Crypto::Hash::SHA1::hash("");
|
||||||
if (memcmp(result, digest.data, Crypto::Hash::SHA1::digest_size()) != 0) {
|
if (memcmp(result, digest.data, Crypto::Hash::SHA1::digest_size()) != 0) {
|
||||||
FAIL(Invalid hash);
|
FAIL(Invalid hash);
|
||||||
print_buffer(ByteBuffer::wrap(digest.data, Crypto::Hash::SHA1::digest_size()), -1);
|
print_buffer({ digest.data, Crypto::Hash::SHA1::digest_size() }, -1);
|
||||||
} else
|
} else
|
||||||
PASS;
|
PASS;
|
||||||
}
|
}
|
||||||
|
@ -1182,7 +1188,7 @@ void sha1_test_hash()
|
||||||
auto digest = Crypto::Hash::SHA1::hash("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa");
|
auto digest = Crypto::Hash::SHA1::hash("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa");
|
||||||
if (memcmp(result, digest.data, Crypto::Hash::SHA1::digest_size()) != 0) {
|
if (memcmp(result, digest.data, Crypto::Hash::SHA1::digest_size()) != 0) {
|
||||||
FAIL(Invalid hash);
|
FAIL(Invalid hash);
|
||||||
print_buffer(ByteBuffer::wrap(digest.data, Crypto::Hash::SHA1::digest_size()), -1);
|
print_buffer({ digest.data, Crypto::Hash::SHA1::digest_size() }, -1);
|
||||||
} else
|
} else
|
||||||
PASS;
|
PASS;
|
||||||
}
|
}
|
||||||
|
@ -1208,7 +1214,7 @@ void sha1_test_hash()
|
||||||
auto digest = hasher.digest();
|
auto digest = hasher.digest();
|
||||||
if (memcmp(result, digest.data, Crypto::Hash::SHA1::digest_size()) != 0) {
|
if (memcmp(result, digest.data, Crypto::Hash::SHA1::digest_size()) != 0) {
|
||||||
FAIL(Invalid hash);
|
FAIL(Invalid hash);
|
||||||
print_buffer(ByteBuffer::wrap(digest.data, Crypto::Hash::SHA1::digest_size()), -1);
|
print_buffer({ digest.data, Crypto::Hash::SHA1::digest_size() }, -1);
|
||||||
} else
|
} else
|
||||||
PASS;
|
PASS;
|
||||||
}
|
}
|
||||||
|
@ -1242,7 +1248,7 @@ void sha256_test_hash()
|
||||||
auto digest = Crypto::Hash::SHA256::hash("Well hello friends");
|
auto digest = Crypto::Hash::SHA256::hash("Well hello friends");
|
||||||
if (memcmp(result, digest.data, Crypto::Hash::SHA256::digest_size()) != 0) {
|
if (memcmp(result, digest.data, Crypto::Hash::SHA256::digest_size()) != 0) {
|
||||||
FAIL(Invalid hash);
|
FAIL(Invalid hash);
|
||||||
print_buffer(ByteBuffer::wrap(digest.data, Crypto::Hash::SHA256::digest_size()), -1);
|
print_buffer({ digest.data, Crypto::Hash::SHA256::digest_size() }, -1);
|
||||||
} else
|
} else
|
||||||
PASS;
|
PASS;
|
||||||
}
|
}
|
||||||
|
@ -1254,7 +1260,7 @@ void sha256_test_hash()
|
||||||
auto digest = Crypto::Hash::SHA256::hash("");
|
auto digest = Crypto::Hash::SHA256::hash("");
|
||||||
if (memcmp(result, digest.data, Crypto::Hash::SHA256::digest_size()) != 0) {
|
if (memcmp(result, digest.data, Crypto::Hash::SHA256::digest_size()) != 0) {
|
||||||
FAIL(Invalid hash);
|
FAIL(Invalid hash);
|
||||||
print_buffer(ByteBuffer::wrap(digest.data, Crypto::Hash::SHA256::digest_size()), -1);
|
print_buffer({ digest.data, Crypto::Hash::SHA256::digest_size() }, -1);
|
||||||
} else
|
} else
|
||||||
PASS;
|
PASS;
|
||||||
}
|
}
|
||||||
|
@ -1281,7 +1287,7 @@ void hmac_sha256_test_process()
|
||||||
auto mac = hmac.process("Some bogus data");
|
auto mac = hmac.process("Some bogus data");
|
||||||
if (memcmp(result, mac.data, hmac.digest_size()) != 0) {
|
if (memcmp(result, mac.data, hmac.digest_size()) != 0) {
|
||||||
FAIL(Invalid mac);
|
FAIL(Invalid mac);
|
||||||
print_buffer(ByteBuffer::wrap(mac.data, hmac.digest_size()), -1);
|
print_buffer({ mac.data, hmac.digest_size() }, -1);
|
||||||
} else
|
} else
|
||||||
PASS;
|
PASS;
|
||||||
}
|
}
|
||||||
|
@ -1294,7 +1300,7 @@ void hmac_sha256_test_process()
|
||||||
auto mac = hmac.process("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa");
|
auto mac = hmac.process("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa");
|
||||||
if (memcmp(result, mac.data, hmac.digest_size()) != 0) {
|
if (memcmp(result, mac.data, hmac.digest_size()) != 0) {
|
||||||
FAIL(Invalid mac);
|
FAIL(Invalid mac);
|
||||||
print_buffer(ByteBuffer::wrap(mac.data, hmac.digest_size()), -1);
|
print_buffer({ mac.data, hmac.digest_size() }, -1);
|
||||||
} else
|
} else
|
||||||
PASS;
|
PASS;
|
||||||
}
|
}
|
||||||
|
@ -1307,7 +1313,7 @@ void hmac_sha256_test_process()
|
||||||
auto mac = hmac.process("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa");
|
auto mac = hmac.process("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa");
|
||||||
if (memcmp(result, mac.data, hmac.digest_size()) != 0) {
|
if (memcmp(result, mac.data, hmac.digest_size()) != 0) {
|
||||||
FAIL(Invalid mac);
|
FAIL(Invalid mac);
|
||||||
print_buffer(ByteBuffer::wrap(mac.data, hmac.digest_size()), -1);
|
print_buffer({ mac.data, hmac.digest_size() }, -1);
|
||||||
} else
|
} else
|
||||||
PASS;
|
PASS;
|
||||||
}
|
}
|
||||||
|
@ -1353,7 +1359,7 @@ void sha512_test_hash()
|
||||||
auto digest = Crypto::Hash::SHA512::hash("Well hello friends");
|
auto digest = Crypto::Hash::SHA512::hash("Well hello friends");
|
||||||
if (memcmp(result, digest.data, Crypto::Hash::SHA512::digest_size()) != 0) {
|
if (memcmp(result, digest.data, Crypto::Hash::SHA512::digest_size()) != 0) {
|
||||||
FAIL(Invalid hash);
|
FAIL(Invalid hash);
|
||||||
print_buffer(ByteBuffer::wrap(digest.data, Crypto::Hash::SHA512::digest_size()), -1);
|
print_buffer({ digest.data, Crypto::Hash::SHA512::digest_size() }, -1);
|
||||||
} else
|
} else
|
||||||
PASS;
|
PASS;
|
||||||
}
|
}
|
||||||
|
@ -1365,7 +1371,7 @@ void sha512_test_hash()
|
||||||
auto digest = Crypto::Hash::SHA512::hash("");
|
auto digest = Crypto::Hash::SHA512::hash("");
|
||||||
if (memcmp(result, digest.data, Crypto::Hash::SHA512::digest_size()) != 0) {
|
if (memcmp(result, digest.data, Crypto::Hash::SHA512::digest_size()) != 0) {
|
||||||
FAIL(Invalid hash);
|
FAIL(Invalid hash);
|
||||||
print_buffer(ByteBuffer::wrap(digest.data, Crypto::Hash::SHA512::digest_size()), -1);
|
print_buffer({ digest.data, Crypto::Hash::SHA512::digest_size() }, -1);
|
||||||
} else
|
} else
|
||||||
PASS;
|
PASS;
|
||||||
}
|
}
|
||||||
|
@ -1392,7 +1398,7 @@ void hmac_sha512_test_process()
|
||||||
auto mac = hmac.process("Some bogus data");
|
auto mac = hmac.process("Some bogus data");
|
||||||
if (memcmp(result, mac.data, hmac.digest_size()) != 0) {
|
if (memcmp(result, mac.data, hmac.digest_size()) != 0) {
|
||||||
FAIL(Invalid mac);
|
FAIL(Invalid mac);
|
||||||
print_buffer(ByteBuffer::wrap(mac.data, hmac.digest_size()), -1);
|
print_buffer({ mac.data, hmac.digest_size() }, -1);
|
||||||
} else
|
} else
|
||||||
PASS;
|
PASS;
|
||||||
}
|
}
|
||||||
|
@ -1435,7 +1441,7 @@ void rsa_test_encrypt()
|
||||||
rsa.encrypt(data, buf);
|
rsa.encrypt(data, buf);
|
||||||
if (memcmp(result, buf.data(), buf.size())) {
|
if (memcmp(result, buf.data(), buf.size())) {
|
||||||
FAIL(Invalid encryption result);
|
FAIL(Invalid encryption result);
|
||||||
print_buffer(buf, 16);
|
print_buffer(buf.span(), 16);
|
||||||
} else {
|
} else {
|
||||||
PASS;
|
PASS;
|
||||||
}
|
}
|
||||||
|
@ -1944,7 +1950,7 @@ void bigint_import_export()
|
||||||
PASS;
|
PASS;
|
||||||
} else {
|
} else {
|
||||||
FAIL(Invalid value);
|
FAIL(Invalid value);
|
||||||
print_buffer(ByteBuffer::wrap(exported - exported_length + 8, exported_length), -1);
|
print_buffer({ exported - exported_length + 8, exported_length }, -1);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Reference in a new issue