diff options
Diffstat (limited to '')
| -rw-r--r-- | src/regress/lib/libcrypto/wycheproof/wycheproof.go | 44 |
1 files changed, 22 insertions, 22 deletions
diff --git a/src/regress/lib/libcrypto/wycheproof/wycheproof.go b/src/regress/lib/libcrypto/wycheproof/wycheproof.go index 55f6858e89..3aeea18e3f 100644 --- a/src/regress/lib/libcrypto/wycheproof/wycheproof.go +++ b/src/regress/lib/libcrypto/wycheproof/wycheproof.go | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: wycheproof.go,v 1.35 2018/08/29 19:18:20 tb Exp $ */ | 1 | /* $OpenBSD: wycheproof.go,v 1.36 2018/08/29 19:20:22 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2018 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2018 Joel Sing <jsing@openbsd.org> |
| 4 | * Copyright (c) 2018 Theo Buehler <tb@openbsd.org> | 4 | * Copyright (c) 2018 Theo Buehler <tb@openbsd.org> |
| @@ -377,8 +377,8 @@ func runAesCbcPkcs5Test(ctx *C.EVP_CIPHER_CTX, wt *wycheproofTestAesCbcPkcs5) bo | |||
| 377 | return openSuccess && sealSuccess | 377 | return openSuccess && sealSuccess |
| 378 | } | 378 | } |
| 379 | 379 | ||
| 380 | func runAesCbcPkcs5TestGroup(wtg *wycheproofTestGroupAesCbcPkcs5) bool { | 380 | func runAesCbcPkcs5TestGroup(algorithm string, wtg *wycheproofTestGroupAesCbcPkcs5) bool { |
| 381 | fmt.Printf("Running AES-CBC-PKCS5 test group %v with IV size %d and key size %d...\n", wtg.Type, wtg.IVSize, wtg.KeySize) | 381 | fmt.Printf("Running %v test group %v with IV size %d and key size %d...\n", algorithm, wtg.Type, wtg.IVSize, wtg.KeySize) |
| 382 | 382 | ||
| 383 | var cipher *C.EVP_CIPHER | 383 | var cipher *C.EVP_CIPHER |
| 384 | switch wtg.KeySize { | 384 | switch wtg.KeySize { |
| @@ -708,8 +708,8 @@ func runAesCmacTest(cipher *C.EVP_CIPHER, wt *wycheproofTestAesCmac) bool { | |||
| 708 | return success | 708 | return success |
| 709 | } | 709 | } |
| 710 | 710 | ||
| 711 | func runAesCmacTestGroup(wtg *wycheproofTestGroupAesCmac) bool { | 711 | func runAesCmacTestGroup(algorithm string, wtg *wycheproofTestGroupAesCmac) bool { |
| 712 | fmt.Printf("Running AES-CMAC test group %v with key size %d and tag size %d...\n", wtg.Type, wtg.KeySize, wtg.TagSize) | 712 | fmt.Printf("Running %v test group %v with key size %d and tag size %d...\n", algorithm, wtg.Type, wtg.KeySize, wtg.TagSize) |
| 713 | var cipher *C.EVP_CIPHER | 713 | var cipher *C.EVP_CIPHER |
| 714 | 714 | ||
| 715 | switch wtg.KeySize { | 715 | switch wtg.KeySize { |
| @@ -864,13 +864,13 @@ func runChaCha20Poly1305Test(iv_len int, key_len int, tag_len int, wt *wycheproo | |||
| 864 | return openSuccess && sealSuccess | 864 | return openSuccess && sealSuccess |
| 865 | } | 865 | } |
| 866 | 866 | ||
| 867 | func runChaCha20Poly1305TestGroup(wtg *wycheproofTestGroupChaCha20Poly1305) bool { | 867 | func runChaCha20Poly1305TestGroup(algorithm string, wtg *wycheproofTestGroupChaCha20Poly1305) bool { |
| 868 | // We currently only support nonces of length 12 (96 bits) | 868 | // We currently only support nonces of length 12 (96 bits) |
| 869 | if wtg.IVSize != 96 { | 869 | if wtg.IVSize != 96 { |
| 870 | return true | 870 | return true |
| 871 | } | 871 | } |
| 872 | 872 | ||
| 873 | fmt.Printf("Running ChaCha20-Poly1305 test group %v with IV size %d, key size %d, tag size %d...\n", wtg.Type, wtg.IVSize, wtg.KeySize, wtg.TagSize) | 873 | fmt.Printf("Running %v test group %v with IV size %d, key size %d, tag size %d...\n", algorithm, wtg.Type, wtg.IVSize, wtg.KeySize, wtg.TagSize) |
| 874 | 874 | ||
| 875 | success := true | 875 | success := true |
| 876 | for _, wt := range wtg.Tests { | 876 | for _, wt := range wtg.Tests { |
| @@ -915,8 +915,8 @@ func runDSATest(dsa *C.DSA, h hash.Hash, wt *wycheproofTestDSA) bool { | |||
| 915 | return success | 915 | return success |
| 916 | } | 916 | } |
| 917 | 917 | ||
| 918 | func runDSATestGroup(wtg *wycheproofTestGroupDSA) bool { | 918 | func runDSATestGroup(algorithm string, wtg *wycheproofTestGroupDSA) bool { |
| 919 | fmt.Printf("Running DSA test group %v, key size %d and %v...\n", wtg.Type, wtg.Key.KeySize, wtg.SHA) | 919 | fmt.Printf("Running %v test group %v, key size %d and %v...\n", algorithm, wtg.Type, wtg.Key.KeySize, wtg.SHA) |
| 920 | 920 | ||
| 921 | dsa := C.DSA_new() | 921 | dsa := C.DSA_new() |
| 922 | if dsa == nil { | 922 | if dsa == nil { |
| @@ -1049,13 +1049,13 @@ func runECDSATest(ecKey *C.EC_KEY, nid int, h hash.Hash, wt *wycheproofTestECDSA | |||
| 1049 | return success | 1049 | return success |
| 1050 | } | 1050 | } |
| 1051 | 1051 | ||
| 1052 | func runECDSATestGroup(wtg *wycheproofTestGroupECDSA) bool { | 1052 | func runECDSATestGroup(algorithm string, wtg *wycheproofTestGroupECDSA) bool { |
| 1053 | // No secp256r1 support. | 1053 | // No secp256r1 support. |
| 1054 | if wtg.Key.Curve == "secp256r1" { | 1054 | if wtg.Key.Curve == "secp256r1" { |
| 1055 | return true | 1055 | return true |
| 1056 | } | 1056 | } |
| 1057 | 1057 | ||
| 1058 | fmt.Printf("Running ECDSA test group %v with curve %v, key size %d and %v...\n", wtg.Type, wtg.Key.Curve, wtg.Key.KeySize, wtg.SHA) | 1058 | fmt.Printf("Running %v test group %v with curve %v, key size %d and %v...\n", algorithm, wtg.Type, wtg.Key.Curve, wtg.Key.KeySize, wtg.SHA) |
| 1059 | 1059 | ||
| 1060 | nid, err := nidFromString(wtg.Key.Curve) | 1060 | nid, err := nidFromString(wtg.Key.Curve) |
| 1061 | if err != nil { | 1061 | if err != nil { |
| @@ -1140,8 +1140,8 @@ func runRSATest(rsa *C.RSA, nid int, h hash.Hash, wt *wycheproofTestRSA) bool { | |||
| 1140 | return success | 1140 | return success |
| 1141 | } | 1141 | } |
| 1142 | 1142 | ||
| 1143 | func runRSATestGroup(wtg *wycheproofTestGroupRSA) bool { | 1143 | func runRSATestGroup(algorithm string, wtg *wycheproofTestGroupRSA) bool { |
| 1144 | fmt.Printf("Running RSA test group %v with key size %d and %v...\n", wtg.Type, wtg.KeySize, wtg.SHA) | 1144 | fmt.Printf("Running %v test group %v with key size %d and %v...\n", algorithm, wtg.Type, wtg.KeySize, wtg.SHA) |
| 1145 | 1145 | ||
| 1146 | rsa := C.RSA_new() | 1146 | rsa := C.RSA_new() |
| 1147 | if rsa == nil { | 1147 | if rsa == nil { |
| @@ -1211,8 +1211,8 @@ func runX25519Test(wt *wycheproofTestX25519) bool { | |||
| 1211 | return success | 1211 | return success |
| 1212 | } | 1212 | } |
| 1213 | 1213 | ||
| 1214 | func runX25519TestGroup(wtg *wycheproofTestGroupX25519) bool { | 1214 | func runX25519TestGroup(algorithm string, wtg *wycheproofTestGroupX25519) bool { |
| 1215 | fmt.Printf("Running X25519 test group with curve %v...\n", wtg.Curve) | 1215 | fmt.Printf("Running %v test group with curve %v...\n", algorithm, wtg.Curve) |
| 1216 | 1216 | ||
| 1217 | success := true | 1217 | success := true |
| 1218 | for _, wt := range wtg.Tests { | 1218 | for _, wt := range wtg.Tests { |
| @@ -1265,7 +1265,7 @@ func runTestVectors(path string) bool { | |||
| 1265 | } | 1265 | } |
| 1266 | switch wtv.Algorithm { | 1266 | switch wtv.Algorithm { |
| 1267 | case "AES-CBC-PKCS5": | 1267 | case "AES-CBC-PKCS5": |
| 1268 | if !runAesCbcPkcs5TestGroup(wtg.(*wycheproofTestGroupAesCbcPkcs5)) { | 1268 | if !runAesCbcPkcs5TestGroup(wtv.Algorithm, wtg.(*wycheproofTestGroupAesCbcPkcs5)) { |
| 1269 | success = false | 1269 | success = false |
| 1270 | } | 1270 | } |
| 1271 | case "AES-CCM": | 1271 | case "AES-CCM": |
| @@ -1273,7 +1273,7 @@ func runTestVectors(path string) bool { | |||
| 1273 | success = false | 1273 | success = false |
| 1274 | } | 1274 | } |
| 1275 | case "AES-CMAC": | 1275 | case "AES-CMAC": |
| 1276 | if !runAesCmacTestGroup(wtg.(*wycheproofTestGroupAesCmac)) { | 1276 | if !runAesCmacTestGroup(wtv.Algorithm, wtg.(*wycheproofTestGroupAesCmac)) { |
| 1277 | success = false | 1277 | success = false |
| 1278 | } | 1278 | } |
| 1279 | case "AES-GCM": | 1279 | case "AES-GCM": |
| @@ -1281,23 +1281,23 @@ func runTestVectors(path string) bool { | |||
| 1281 | success = false | 1281 | success = false |
| 1282 | } | 1282 | } |
| 1283 | case "CHACHA20-POLY1305": | 1283 | case "CHACHA20-POLY1305": |
| 1284 | if !runChaCha20Poly1305TestGroup(wtg.(*wycheproofTestGroupChaCha20Poly1305)) { | 1284 | if !runChaCha20Poly1305TestGroup(wtv.Algorithm, wtg.(*wycheproofTestGroupChaCha20Poly1305)) { |
| 1285 | success = false | 1285 | success = false |
| 1286 | } | 1286 | } |
| 1287 | case "DSA": | 1287 | case "DSA": |
| 1288 | if !runDSATestGroup(wtg.(*wycheproofTestGroupDSA)) { | 1288 | if !runDSATestGroup(wtv.Algorithm, wtg.(*wycheproofTestGroupDSA)) { |
| 1289 | success = false | 1289 | success = false |
| 1290 | } | 1290 | } |
| 1291 | case "ECDSA": | 1291 | case "ECDSA": |
| 1292 | if !runECDSATestGroup(wtg.(*wycheproofTestGroupECDSA)) { | 1292 | if !runECDSATestGroup(wtv.Algorithm, wtg.(*wycheproofTestGroupECDSA)) { |
| 1293 | success = false | 1293 | success = false |
| 1294 | } | 1294 | } |
| 1295 | case "RSASig": | 1295 | case "RSASig": |
| 1296 | if !runRSATestGroup(wtg.(*wycheproofTestGroupRSA)) { | 1296 | if !runRSATestGroup(wtv.Algorithm, wtg.(*wycheproofTestGroupRSA)) { |
| 1297 | success = false | 1297 | success = false |
| 1298 | } | 1298 | } |
| 1299 | case "X25519": | 1299 | case "X25519": |
| 1300 | if !runX25519TestGroup(wtg.(*wycheproofTestGroupX25519)) { | 1300 | if !runX25519TestGroup(wtv.Algorithm, wtg.(*wycheproofTestGroupX25519)) { |
| 1301 | success = false | 1301 | success = false |
| 1302 | } | 1302 | } |
| 1303 | default: | 1303 | default: |
