1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204
|
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
use serde::Deserialize;
use std::ffi::c_void;
use std::fs::File;
use std::io::Cursor;
use thin_vec::ThinVec;
use dap_ffi::types::Report;
use prio::codec::{Decode, Encode};
#[no_mangle]
pub extern "C" fn dap_test_encoding() {
let r = Report::new_dummy();
let mut encoded = Vec::<u8>::new();
Report::encode(&r, &mut encoded).expect("Report encoding failed!");
let decoded = Report::decode(&mut Cursor::new(&encoded)).expect("Report decoding failed!");
if r != decoded {
println!("Report:");
println!("{:?}", r);
println!("Encoded Report:");
println!("{:?}", encoded);
println!("Decoded Report:");
println!("{:?}", decoded);
panic!("Report changed after encoding & decoding.");
}
}
extern "C" {
pub fn dapHpkeEncrypt(
aContext: *mut c_void,
aAad: *mut u8,
aAadLength: u32,
aPlaintext: *mut u8,
aPlaintextLength: u32,
aOutputShare: &mut ThinVec<u8>,
) -> bool;
pub fn dapSetupHpkeContextForTesting(
aKey: *const u8,
aKeyLength: u32,
aInfo: *mut u8,
aInfoLength: u32,
aPkEm: *const u8,
aPkEmLength: u32,
aSkEm: *const u8,
aSkEmLength: u32,
aOutputEncapsulatedKey: &mut ThinVec<u8>,
) -> *mut c_void;
pub fn dapDestroyHpkeContext(aContext: *mut c_void);
}
struct HpkeContext(*mut c_void);
impl Drop for HpkeContext {
fn drop(&mut self) {
unsafe {
dapDestroyHpkeContext(self.0);
}
}
}
type Testsuites = Vec<CiphersuiteTest>;
#[derive(Debug, Deserialize)]
pub struct HexString(#[serde(with = "hex")] Vec<u8>);
impl AsRef<[u8]> for HexString {
fn as_ref(&self) -> &[u8] {
&self.0
}
}
#[allow(dead_code)]
#[derive(Debug, Deserialize)]
struct CiphersuiteTest {
mode: i64,
kem_id: i64,
kdf_id: i64,
aead_id: i64,
info: HexString,
#[serde(rename = "ikmR")]
ikm_r: HexString,
#[serde(rename = "ikmE")]
ikm_e: HexString,
#[serde(rename = "skRm")]
sk_r_m: HexString,
#[serde(rename = "skEm")]
sk_e_m: HexString,
#[serde(rename = "pkRm")]
pk_r_m: HexString,
#[serde(rename = "pkEm")]
pk_e_m: HexString,
enc: HexString,
shared_secret: HexString,
key_schedule_context: HexString,
secret: HexString,
key: HexString,
base_nonce: HexString,
exporter_secret: HexString,
encryptions: Vec<Encryption>,
exports: Vec<Export>,
psk: Option<HexString>,
psk_id: Option<HexString>,
ikm_s: Option<HexString>,
sk_sm: Option<HexString>,
pk_sm: Option<HexString>,
}
#[derive(Debug, Deserialize)]
pub struct Encryption {
pub aad: HexString,
pub ciphertext: HexString,
pub nonce: HexString,
pub plaintext: HexString,
}
#[derive(Debug, Deserialize)]
pub struct Export {
pub exporter_context: HexString,
#[serde(rename = "L")]
pub length: i64,
pub exported_value: HexString,
}
#[no_mangle]
pub extern "C" fn dap_test_hpke_encrypt() {
let file = File::open("hpke-vectors.json").unwrap();
let tests: Testsuites = serde_json::from_reader(file).unwrap();
let mut have_tested = false;
for (test_idx, test) in tests.into_iter().enumerate() {
// Mode must be "Base"
if test.mode != 0
// KEM must be DHKEM(X25519, HKDF-SHA256)
|| test.kem_id != 32
// KDF must be HKDF-SHA256
|| test.kdf_id != 1
// AEAD must be AES-128-GCM
|| test.aead_id != 1
{
continue;
}
have_tested = true;
let mut pk_r_serialized = test.pk_r_m.0;
let mut info = test.info.0;
let mut pk_e_serialized = test.pk_e_m.0;
let mut sk_e_serialized = test.sk_e_m.0;
let mut encapsulated_key = ThinVec::<u8>::new();
let ctx = HpkeContext(unsafe {
dapSetupHpkeContextForTesting(
pk_r_serialized.as_mut_ptr(),
pk_r_serialized.len().try_into().unwrap(),
info.as_mut_ptr(),
info.len().try_into().unwrap(),
pk_e_serialized.as_mut_ptr(),
pk_e_serialized.len().try_into().unwrap(),
sk_e_serialized.as_mut_ptr(),
sk_e_serialized.len().try_into().unwrap(),
&mut encapsulated_key,
)
});
if ctx.0.is_null() {
panic!("Failed to set up HPKE context.");
}
if encapsulated_key != test.enc.0 {
panic!("Encapsulated key is wrong!");
}
for (encryption_idx, encryption) in test.encryptions.into_iter().enumerate() {
let mut encrypted_share = ThinVec::<u8>::new();
let mut aad = encryption.aad.0.clone();
let mut pt = encryption.plaintext.0.clone();
unsafe {
dapHpkeEncrypt(
ctx.0,
aad.as_mut_ptr(),
aad.len().try_into().unwrap(),
pt.as_mut_ptr(),
pt.len().try_into().unwrap(),
&mut encrypted_share,
);
}
if encrypted_share != encryption.ciphertext.0 {
println!("Test: {}, Encryption: {}", test_idx, encryption_idx);
println!("Expected:");
println!("{:?}", encryption.ciphertext.0);
println!("Actual:");
println!("{:?}", encrypted_share);
panic!("Encryption outputs did not match!");
}
}
}
assert!(have_tested);
}
|