/* Cryptographic Abstraction Unit Tests * * Copyright (c) 2021-2022 The OSCAR Team * * This file is subject to the terms and conditions of the GNU General Public * License. See the file COPYING in the main directory of the source code * for more details. */ #include "cryptotests.h" #include "SleepLib/crypto.h" void CryptoTests::testAES256() { // From FIPS-197 C.3 QByteArray expected_plaintext = QByteArray::fromHex("00112233445566778899aabbccddeeff"); QByteArray key = QByteArray::fromHex("000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f"); QByteArray ciphertext = QByteArray::fromHex("8ea2b7ca516745bfeafc49904b496089"); QByteArray plaintext; CryptoResult result = decrypt_aes256(key, ciphertext, plaintext); Q_ASSERT(result == OK); Q_ASSERT(plaintext == expected_plaintext); } // From https://luca-giuzzi.unibs.it/corsi/Support/papers-cryptography/gcm-spec.pdf typedef struct AES256GCMVector_t { const char* key; const char* p; const char* iv; const char* c; const char* tag; } AES256GCMVector_t; static const int s_AES256GCMVectorCount = 3; static const AES256GCMVector_t s_AES256GCMVectors[s_AES256GCMVectorCount] = { // Test Case 13 { "0000000000000000000000000000000000000000000000000000000000000000", "", "000000000000000000000000", "", "530f8afbc74536b9a963b4f1c4cb738b" }, // Test Case 14 { "0000000000000000000000000000000000000000000000000000000000000000", "00000000000000000000000000000000", "000000000000000000000000", "cea7403d4d606b6e074ec5d3baf39d18", "d0d1c8a799996bf0265b98b5d48ab919" }, // Test Case 15 { "feffe9928665731c6d6a8f9467308308feffe9928665731c6d6a8f9467308308", "d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b391aafd255", "cafebabefacedbaddecaf888", "522dc1f099567d07f47f37a32a84427d643a8cdcbfe5c0c97598a2bd2555d1aa8cb08e48590dbb3da7b08b1056828838c5f61e6393ba7a0abcc9f662898015ad", "b094dac5d93471bdec1a502270e3cc6c" } }; void CryptoTests::testAES256GCM() { QByteArray empty; for (int i = 0; i < s_AES256GCMVectorCount; i++) { const AES256GCMVector_t* v = &s_AES256GCMVectors[i]; QByteArray key = QByteArray::fromHex(v->key); QByteArray expected_plaintext = QByteArray::fromHex(v->p); QByteArray iv = QByteArray::fromHex(v->iv); QByteArray ciphertext = QByteArray::fromHex(v->c); QByteArray tag = QByteArray::fromHex(v->tag); QByteArray plaintext; CryptoResult result = decrypt_aes256_gcm(key, iv, ciphertext, tag, plaintext); Q_ASSERT(result == OK); Q_ASSERT(plaintext == expected_plaintext); tag = QByteArray::fromHex(s_AES256GCMVectors[(i+1) % s_AES256GCMVectorCount].tag); result = decrypt_aes256_gcm(key, iv, ciphertext, tag, plaintext); Q_ASSERT(result == InvalidTag); Q_ASSERT(plaintext == empty); } } void CryptoTests::testPBKDF2_SHA256() { // From RFC 7914 section 11 QByteArray passphrase("passwd"); QByteArray salt("salt"); int iterations = 1; QByteArray expected_key = QByteArray::fromHex( "55 ac 04 6e 56 e3 08 9f ec 16 91 c2 25 44 b6 05" "f9 41 85 21 6d de 04 65 e6 8b 9d 57 c2 0d ac bc" "49 ca 9c cc f1 79 b6 45 99 16 64 b3 9d 77 ef 31" "7c 71 b8 45 b1 e3 0b d5 09 11 20 41 d3 a1 97 83"); QByteArray derived_key(expected_key.size(), 0); CryptoResult result = pbkdf2_sha256(passphrase, salt, iterations, derived_key); Q_ASSERT(result == OK); Q_ASSERT(derived_key == expected_key); }