aes_siv: complete siv{a,b,c}_{en,de} with tests

This commit is contained in:
Matthew LeVan 2023-12-19 15:39:39 -05:00
parent f53534b366
commit b903e5784d
3 changed files with 314 additions and 73 deletions

View File

@ -53,6 +53,7 @@ dependencies = [
name = "ares_crypto" name = "ares_crypto"
version = "0.1.0" version = "0.1.0"
dependencies = [ dependencies = [
"aes",
"aes-siv", "aes-siv",
"assert_no_alloc", "assert_no_alloc",
"curve25519-dalek", "curve25519-dalek",

View File

@ -18,6 +18,7 @@ rand = { version = "0.8.5", features = ["std_rng"], default-features = false }
sha2 = "0.10.8" sha2 = "0.10.8"
urcrypt-sys = { version = "0.1.1", optional = true } urcrypt-sys = { version = "0.1.1", optional = true }
x25519-dalek = { version = "2.0.0", features = ["static_secrets"], default-features = false } x25519-dalek = { version = "2.0.0", features = ["static_secrets"], default-features = false }
aes = "0.8.3"
[features] [features]
# XX turn off test_vs_urcrypt after development # XX turn off test_vs_urcrypt after development

View File

@ -1,8 +1,10 @@
use aes_siv::{ use core::panic;
aead::KeyInit,
siv::Aes128Siv, use aes::Aes192;
Error use aes_siv::aead::{generic_array::GenericArray, KeyInit};
}; use aes_siv::siv::{Aes128Siv, Aes256Siv, CmacSiv};
type Aes192Siv = CmacSiv<Aes192>;
pub fn _ac_aes_siv_en( pub fn _ac_aes_siv_en(
key: &mut [u8], key: &mut [u8],
@ -10,26 +12,57 @@ pub fn _ac_aes_siv_en(
data: &mut [&mut [u8]], data: &mut [&mut [u8]],
iv: &mut [u8; 16], iv: &mut [u8; 16],
out: &mut [u8], out: &mut [u8],
) -> Result<(), Error> { ) {
let mut cipher = Aes128Siv::new_from_slice(&key).unwrap(); let iv_tag;
let iv_tag = cipher.encrypt_in_place_detached(data, message)?; if key.len() == 32 {
let mut cipher = Aes128Siv::new_from_slice(&key).unwrap();
iv_tag = cipher.encrypt_in_place_detached(data, message).unwrap();
out.copy_from_slice(message);
} else if key.len() == 48 {
let mut cipher = Aes192Siv::new_from_slice(&key).unwrap();
iv_tag = cipher.encrypt_in_place_detached(data, message).unwrap();
} else if key.len() == 64 {
let mut cipher = Aes256Siv::new_from_slice(&key).unwrap();
iv_tag = cipher.encrypt_in_place_detached(data, message).unwrap();
} else {
panic!("Invalid key length");
}
let mut iv_slice = iv_tag.as_slice().to_owned(); let mut iv_slice = iv_tag.as_slice().to_owned();
iv_slice.reverse(); iv_slice.reverse();
iv.copy_from_slice(&iv_slice); iv.copy_from_slice(&iv_slice);
message.reverse(); message.reverse();
out.copy_from_slice(message); out.copy_from_slice(message);
Ok(())
} }
// pub fn _ac_aes_siv_de( pub fn _ac_aes_siv_de(
// key: &mut [u8], key: &mut [u8],
// message: &mut [u8], message: &mut [u8],
// data: &mut [&mut [u8]], data: &mut [&mut [u8]],
// iv: &[u8; 16], iv: &mut [u8; 16],
// out: &mut [u8], out: &mut [u8],
// ) { ) {
// todo!(); let iv_array = GenericArray::from_slice(iv);
// } if key.len() == 32 {
let mut cipher = Aes128Siv::new_from_slice(&key).unwrap();
cipher
.decrypt_in_place_detached(data, message, iv_array)
.unwrap();
out.copy_from_slice(message);
} else if key.len() == 48 {
let mut cipher = Aes192Siv::new_from_slice(&key).unwrap();
cipher
.decrypt_in_place_detached(data, message, iv_array)
.unwrap();
} else if key.len() == 64 {
let mut cipher = Aes256Siv::new_from_slice(&key).unwrap();
cipher
.decrypt_in_place_detached(data, message, iv_array)
.unwrap();
} else {
panic!("Invalid key length");
}
out.copy_from_slice(message);
}
pub fn ac_aes_siva_en( pub fn ac_aes_siva_en(
key: &mut [u8; 32], key: &mut [u8; 32],
@ -38,75 +71,115 @@ pub fn ac_aes_siva_en(
iv: &mut [u8; 16], iv: &mut [u8; 16],
out: &mut [u8], out: &mut [u8],
) { ) {
_ac_aes_siv_en(key, message, data, iv, out).unwrap(); _ac_aes_siv_en(key, message, data, iv, out);
} }
// pub fn ac_aes_siva_de( pub fn ac_aes_siva_de(
// key: &mut [u8; 32], key: &mut [u8; 32],
// message: &mut [u8], message: &mut [u8],
// data: &mut [&mut [u8]], data: &mut [&mut [u8]],
// iv: &[u8; 16], iv: &mut [u8; 16],
// out: &mut [u8], out: &mut [u8],
// ) { ) {
// todo!(); _ac_aes_siv_de(key, message, data, iv, out);
// } }
// pub fn ac_aes_sivb_en( pub fn ac_aes_sivb_en(
// key: &mut [u8; 48], key: &mut [u8; 48],
// message: &mut [u8], message: &mut [u8],
// data: &mut [&mut [u8]], data: &mut [&mut [u8]],
// iv: &[u8; 16], iv: &mut [u8; 16],
// out: &mut [u8], out: &mut [u8],
// ) { ) {
// _ac_aes_siv_en(key, message, data, iv, out); _ac_aes_siv_en(key, message, data, iv, out);
// } }
// pub fn ac_aes_sivb_de( pub fn ac_aes_sivb_de(
// key: &mut [u8; 48], key: &mut [u8; 48],
// message: &mut [u8], message: &mut [u8],
// data: &mut [&mut [u8]], data: &mut [&mut [u8]],
// iv: &[u8; 16], iv: &mut [u8; 16],
// out: &mut [u8], out: &mut [u8],
// ) { ) {
// todo!(); _ac_aes_siv_de(key, message, data, iv, out);
// } }
// pub fn ac_aes_sivc_en( pub fn ac_aes_sivc_en(
// key: &mut [u8; 64], key: &mut [u8; 64],
// message: &mut [u8], message: &mut [u8],
// data: &mut [&mut [u8]], data: &mut [&mut [u8]],
// iv: &[u8; 16], iv: &mut [u8; 16],
// out: &mut [u8], out: &mut [u8],
// ) { ) {
// _ac_aes_siv_en(key, message, data, iv, out); _ac_aes_siv_en(key, message, data, iv, out);
// } }
// pub fn ac_aes_sivc_de( pub fn ac_aes_sivc_de(
// key: &mut [u8; 64], key: &mut [u8; 64],
// message: &mut [u8], message: &mut [u8],
// data: &mut [&mut [u8]], data: &mut [&mut [u8]],
// iv: &[u8; 16], iv: &mut [u8; 16],
// out: &mut [u8], out: &mut [u8],
// ) { ) {
// todo!(); _ac_aes_siv_de(key, message, data, iv, out);
// } }
#[cfg(test)] #[cfg(test)]
#[cfg(feature = "test_vs_urcrypt")] #[cfg(feature = "test_vs_urcrypt")]
mod urcrypt_tests { mod urcrypt_tests {
use super::{ use super::{
ac_aes_siva_en, ac_aes_siva_de, ac_aes_siva_en, ac_aes_sivb_de, ac_aes_sivb_en, ac_aes_sivc_de,
// ac_aes_siva_de, ac_aes_siva_en, ac_aes_sivb_de, ac_aes_sivb_en, ac_aes_sivc_de, ac_aes_sivc_en,
// ac_aes_sivc_en,
}; };
use urcrypt_sys::{ use urcrypt_sys::{
urcrypt_aes_siv_data, urcrypt_aes_siv_data, urcrypt_aes_siva_de, urcrypt_aes_siva_en, urcrypt_aes_sivb_de,
// urcrypt_aes_siva_de, urcrypt_aes_sivb_en, urcrypt_aes_sivc_de, urcrypt_aes_sivc_en,
urcrypt_aes_siva_en,
// urcrypt_aes_sivb_de,
// urcrypt_aes_sivb_en, urcrypt_aes_sivc_de, urcrypt_aes_sivc_en,
}; };
#[test]
fn test_aes_siva_de() {
let mut key: [u8; 32] = [42; 32];
let mut message: [u8; 32] = [
61, 88, 88, 36, 83, 232, 120, 45, 27, 159, 15, 145, 140, 231, 114, 229, 61, 243, 54,
183, 156, 53, 217, 103, 88, 36, 53, 37, 165, 240, 92, 133,
];
let mut iv: [u8; 16] = [
16, 90, 129, 170, 175, 145, 229, 78, 107, 253, 192, 138, 136, 52, 159, 219,
];
let mut uc_bytes = [42; 32];
let mut uc_bytes_two = [43; 32];
let mut uc_out: [u8; 32] = [0; 32];
let mut uc_data: [urcrypt_aes_siv_data; 2] = [
urcrypt_aes_siv_data {
bytes: uc_bytes.as_mut_ptr(),
length: uc_bytes.len(),
},
urcrypt_aes_siv_data {
bytes: uc_bytes_two.as_mut_ptr(),
length: uc_bytes_two.len(),
},
];
unsafe {
urcrypt_aes_siva_de(
message.as_mut_ptr(),
message.len(),
uc_data.as_mut_ptr(),
uc_data.len(),
key.as_mut_ptr(),
iv.as_mut_ptr(),
uc_out.as_mut_ptr(),
)
};
let mut ac_data: [&mut [u8]; 2] = [&mut uc_bytes, &mut uc_bytes_two];
let mut ac_out: [u8; 32] = [0; 32];
ac_aes_siva_de(&mut key, &mut message, &mut ac_data, &mut iv, &mut ac_out);
assert_eq!(ac_out, uc_out);
}
#[test] #[test]
fn test_aes_siva_en() { fn test_aes_siva_en() {
let mut key: [u8; 32] = [42; 32]; let mut key: [u8; 32] = [42; 32];
@ -139,10 +212,176 @@ mod urcrypt_tests {
) )
}; };
let mut ac_data: [&mut [u8]; 2] = [&mut [42; 32], &mut [43; 32]]; let mut ac_data: [&mut [u8]; 2] = [&mut uc_bytes, &mut uc_bytes_two];
let mut ac_out: [u8; 32] = [0; 32]; let mut ac_out: [u8; 32] = [0; 32];
ac_aes_siva_en(&mut key, &mut message, &mut ac_data, &mut iv, &mut ac_out); ac_aes_siva_en(&mut key, &mut message, &mut ac_data, &mut iv, &mut ac_out);
assert_eq!(ac_out, uc_out); assert_eq!(ac_out, uc_out);
} }
#[test]
fn test_aes_sivb_en() {
let mut key: [u8; 48] = [42; 48];
let mut message: [u8; 32] = [42; 32];
let mut iv: [u8; 16] = [42; 16];
let mut uc_bytes = [42; 32];
let mut uc_bytes_two = [43; 32];
let mut uc_out: [u8; 32] = [0; 32];
let mut uc_data: [urcrypt_aes_siv_data; 2] = [
urcrypt_aes_siv_data {
bytes: uc_bytes.as_mut_ptr(),
length: uc_bytes.len(),
},
urcrypt_aes_siv_data {
bytes: uc_bytes_two.as_mut_ptr(),
length: uc_bytes_two.len(),
},
];
unsafe {
urcrypt_aes_sivb_en(
message.as_mut_ptr(),
message.len(),
uc_data.as_mut_ptr(),
uc_data.len(),
key.as_mut_ptr(),
iv.as_mut_ptr(),
uc_out.as_mut_ptr(),
)
};
let mut ac_data: [&mut [u8]; 2] = [&mut uc_bytes, &mut uc_bytes_two];
let mut ac_out: [u8; 32] = [0; 32];
ac_aes_sivb_en(&mut key, &mut message, &mut ac_data, &mut iv, &mut ac_out);
assert_eq!(ac_out, uc_out);
}
#[test]
fn test_aes_sivb_de() {
let mut key: [u8; 48] = [42; 48];
let mut message: [u8; 32] = [
20, 249, 192, 238, 22, 92, 186, 62, 26, 194, 51, 61, 88, 148, 89, 208, 114, 24, 67, 99,
35, 241, 247, 133, 64, 18, 144, 54, 126, 121, 100, 145,
];
let mut iv: [u8; 16] = [
9, 146, 75, 192, 45, 169, 211, 188, 36, 212, 236, 80, 49, 197, 78, 141,
];
let mut uc_bytes = [42; 32];
let mut uc_bytes_two = [43; 32];
let mut uc_out: [u8; 32] = [0; 32];
let mut uc_data: [urcrypt_aes_siv_data; 2] = [
urcrypt_aes_siv_data {
bytes: uc_bytes.as_mut_ptr(),
length: uc_bytes.len(),
},
urcrypt_aes_siv_data {
bytes: uc_bytes_two.as_mut_ptr(),
length: uc_bytes_two.len(),
},
];
unsafe {
urcrypt_aes_sivb_de(
message.as_mut_ptr(),
message.len(),
uc_data.as_mut_ptr(),
uc_data.len(),
key.as_mut_ptr(),
iv.as_mut_ptr(),
uc_out.as_mut_ptr(),
)
};
let mut ac_data: [&mut [u8]; 2] = [&mut uc_bytes, &mut uc_bytes_two];
let mut ac_out: [u8; 32] = [0; 32];
ac_aes_sivb_de(&mut key, &mut message, &mut ac_data, &mut iv, &mut ac_out);
assert_eq!(ac_out, uc_out);
}
#[test]
fn test_aes_sivc_en() {
let mut key: [u8; 64] = [42; 64];
let mut message: [u8; 32] = [42; 32];
let mut iv: [u8; 16] = [42; 16];
let mut uc_bytes = [42; 32];
let mut uc_bytes_two = [43; 32];
let mut uc_out: [u8; 32] = [0; 32];
let mut uc_data: [urcrypt_aes_siv_data; 2] = [
urcrypt_aes_siv_data {
bytes: uc_bytes.as_mut_ptr(),
length: uc_bytes.len(),
},
urcrypt_aes_siv_data {
bytes: uc_bytes_two.as_mut_ptr(),
length: uc_bytes_two.len(),
},
];
unsafe {
urcrypt_aes_sivc_en(
message.as_mut_ptr(),
message.len(),
uc_data.as_mut_ptr(),
uc_data.len(),
key.as_mut_ptr(),
iv.as_mut_ptr(),
uc_out.as_mut_ptr(),
)
};
let mut ac_data: [&mut [u8]; 2] = [&mut uc_bytes, &mut uc_bytes_two];
let mut ac_out: [u8; 32] = [0; 32];
ac_aes_sivc_en(&mut key, &mut message, &mut ac_data, &mut iv, &mut ac_out);
assert_eq!(ac_out, uc_out);
}
#[test]
fn test_aes_sivc_de() {
let mut key: [u8; 64] = [42; 64];
let mut message: [u8; 32] = [
213, 96, 61, 200, 217, 8, 33, 147, 58, 213, 99, 8, 221, 23, 89, 206, 164, 237, 59, 231,
235, 50, 93, 122, 50, 202, 78, 248, 218, 41, 170, 175,
];
let mut iv: [u8; 16] = [
105, 123, 123, 122, 45, 244, 179, 136, 167, 164, 134, 30, 97, 14, 241, 223,
];
let mut uc_bytes = [42; 32];
let mut uc_bytes_two = [43; 32];
let mut uc_out: [u8; 32] = [0; 32];
let mut uc_data: [urcrypt_aes_siv_data; 2] = [
urcrypt_aes_siv_data {
bytes: uc_bytes.as_mut_ptr(),
length: uc_bytes.len(),
},
urcrypt_aes_siv_data {
bytes: uc_bytes_two.as_mut_ptr(),
length: uc_bytes_two.len(),
},
];
unsafe {
urcrypt_aes_sivc_de(
message.as_mut_ptr(),
message.len(),
uc_data.as_mut_ptr(),
uc_data.len(),
key.as_mut_ptr(),
iv.as_mut_ptr(),
uc_out.as_mut_ptr(),
)
};
let mut ac_data: [&mut [u8]; 2] = [&mut uc_bytes, &mut uc_bytes_two];
let mut ac_out: [u8; 32] = [0; 32];
ac_aes_sivc_de(&mut key, &mut message, &mut ac_data, &mut iv, &mut ac_out);
assert_eq!(ac_out, uc_out);
}
} }