summaryrefslogtreecommitdiffstats
path: root/fips/aes
diff options
context:
space:
mode:
authorDr. Stephen Henson <steve@openssl.org>2011-02-18 17:09:33 +0000
committerDr. Stephen Henson <steve@openssl.org>2011-02-18 17:09:33 +0000
commitacf254f86efe94788827bc7da9ae167ecc19e6b1 (patch)
treefe5d0721f2135622e6b041961cfd9067b37111e3 /fips/aes
parent5d439d69552e753debc48461293517b66b0b94b4 (diff)
AES GCM selftests.
Diffstat (limited to 'fips/aes')
-rw-r--r--fips/aes/fips_aes_selftest.c92
1 files changed, 92 insertions, 0 deletions
diff --git a/fips/aes/fips_aes_selftest.c b/fips/aes/fips_aes_selftest.c
index 119ddfad50..05f18d1484 100644
--- a/fips/aes/fips_aes_selftest.c
+++ b/fips/aes/fips_aes_selftest.c
@@ -100,4 +100,96 @@ int FIPS_selftest_aes()
FIPSerr(FIPS_F_FIPS_SELFTEST_AES,FIPS_R_SELFTEST_FAILED);
return ret;
}
+
+/* AES-GCM test data from NIST public test vectors */
+
+static const unsigned char gcm_key[] = {
+ 0xee,0xbc,0x1f,0x57,0x48,0x7f,0x51,0x92,0x1c,0x04,0x65,0x66,
+ 0x5f,0x8a,0xe6,0xd1,0x65,0x8b,0xb2,0x6d,0xe6,0xf8,0xa0,0x69,
+ 0xa3,0x52,0x02,0x93,0xa5,0x72,0x07,0x8f
+};
+static const unsigned char gcm_iv[] = {
+ 0x99,0xaa,0x3e,0x68,0xed,0x81,0x73,0xa0,0xee,0xd0,0x66,0x84
+};
+static const unsigned char gcm_pt[] = {
+ 0xf5,0x6e,0x87,0x05,0x5b,0xc3,0x2d,0x0e,0xeb,0x31,0xb2,0xea,
+ 0xcc,0x2b,0xf2,0xa5
+};
+static const unsigned char gcm_aad[] = {
+ 0x4d,0x23,0xc3,0xce,0xc3,0x34,0xb4,0x9b,0xdb,0x37,0x0c,0x43,
+ 0x7f,0xec,0x78,0xde
+};
+static const unsigned char gcm_ct[] = {
+ 0xf7,0x26,0x44,0x13,0xa8,0x4c,0x0e,0x7c,0xd5,0x36,0x86,0x7e,
+ 0xb9,0xf2,0x17,0x36
+};
+static const unsigned char gcm_tag[] = {
+ 0x67,0xba,0x05,0x10,0x26,0x2a,0xe4,0x87,0xd7,0x37,0xee,0x62,
+ 0x98,0xf7,0x7e,0x0c
+};
+
+static int corrupt_aes_gcm = 0;
+
+void FIPS_corrupt_aes_gcm(void)
+ {
+ corrupt_aes_gcm = 1;
+ }
+
+int FIPS_selftest_aes_gcm(void)
+ {
+ int ret = 0;
+ unsigned char out[128], tag[16];
+ EVP_CIPHER_CTX ctx;
+ FIPS_cipher_ctx_init(&ctx);
+ FIPS_cipherinit(&ctx, EVP_aes_256_gcm(), NULL, NULL, 1);
+ FIPS_cipher_ctx_ctrl(&ctx, EVP_CTRL_GCM_SET_IVLEN,
+ sizeof(gcm_iv), NULL);
+ if (!FIPS_cipherinit(&ctx, NULL, gcm_key, gcm_iv, 1))
+ goto err;
+ if (FIPS_cipher(&ctx, NULL, gcm_aad, sizeof(gcm_aad)) < 0)
+ goto err;
+ if (FIPS_cipher(&ctx, out, gcm_pt, sizeof(gcm_pt)) != sizeof(gcm_ct))
+ goto err;
+ if (FIPS_cipher(&ctx, NULL, NULL, 0) < 0)
+ goto err;
+
+ if (!FIPS_cipher_ctx_ctrl(&ctx, EVP_CTRL_GCM_GET_TAG, 16, tag))
+ goto err;
+
+ if (memcmp(tag, gcm_tag, 16) || memcmp(out, gcm_ct, 16))
+ goto err;
+
+ /* Modify expected tag value */
+ if (corrupt_aes_gcm)
+ tag[0]++;
+
+ FIPS_cipherinit(&ctx, EVP_aes_256_gcm(), NULL, NULL, 0);
+ FIPS_cipher_ctx_ctrl(&ctx, EVP_CTRL_GCM_SET_IVLEN,
+ sizeof(gcm_iv), NULL);
+ if (!FIPS_cipher_ctx_ctrl(&ctx, EVP_CTRL_GCM_SET_TAG, 16, tag))
+ goto err;
+ if (!FIPS_cipherinit(&ctx, NULL, gcm_key, gcm_iv, 0))
+ goto err;
+ if (FIPS_cipher(&ctx, NULL, gcm_aad, sizeof(gcm_aad)) < 0)
+ goto err;
+ if (FIPS_cipher(&ctx, out, gcm_ct, sizeof(gcm_ct)) != sizeof(gcm_pt))
+ goto err;
+ if (FIPS_cipher(&ctx, NULL, NULL, 0) < 0)
+ goto err;
+
+ if (memcmp(out, gcm_pt, 16))
+ goto err;
+
+ ret = 1;
+
+ err:
+
+ if (ret == 0)
+ FIPSerr(FIPS_F_FIPS_SELFTEST_AES_GCM,FIPS_R_SELFTEST_FAILED);
+
+ FIPS_cipher_ctx_cleanup(&ctx);
+
+ return ret;
+ }
+
#endif