| Index: srtp/crypto/test/stat_driver.c
|
| diff --git a/srtp/crypto/test/stat_driver.c b/srtp/crypto/test/stat_driver.c
|
| index 4ff2b142616395527e9a4f1cb5f1e8a12a76ed14..962f7484a913703bb3301be7191346c170838dd5 100644
|
| --- a/srtp/crypto/test/stat_driver.c
|
| +++ b/srtp/crypto/test/stat_driver.c
|
| @@ -43,10 +43,15 @@
|
| *
|
| */
|
|
|
| +#ifdef HAVE_CONFIG_H
|
| + #include <config.h>
|
| +#endif
|
| +
|
| #include <stdio.h> /* for printf() */
|
|
|
| #include "err.h"
|
| #include "stat.h"
|
| +#include "srtp.h"
|
|
|
| #include "cipher.h"
|
|
|
| @@ -67,10 +72,14 @@ err_check(err_status_t s) {
|
|
|
| int
|
| main (int argc, char *argv[]) {
|
| - uint8_t buffer[2500];
|
| + uint8_t buffer[2532];
|
| unsigned int buf_len = 2500;
|
| int i, j;
|
| extern cipher_type_t aes_icm;
|
| +#ifdef OPENSSL
|
| + extern cipher_type_t aes_gcm_128_openssl;
|
| + extern cipher_type_t aes_gcm_256_openssl;
|
| +#endif
|
| cipher_t *c;
|
| uint8_t key[46] = {
|
| 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
|
| @@ -86,6 +95,7 @@ main (int argc, char *argv[]) {
|
|
|
| printf("statistical tests driver\n");
|
|
|
| + v128_set_to_zero(&nonce);
|
| for (i=0; i < 2500; i++)
|
| buffer[i] = 0;
|
|
|
| @@ -106,9 +116,9 @@ main (int argc, char *argv[]) {
|
| /* set buffer to cipher output */
|
| for (i=0; i < 2500; i++)
|
| buffer[i] = 0;
|
| - err_check(cipher_type_alloc(&aes_icm, &c, 30));
|
| - err_check(cipher_init(c, key, direction_encrypt));
|
| - err_check(cipher_set_iv(c, &nonce));
|
| + err_check(cipher_type_alloc(&aes_icm, &c, 30, 0));
|
| + err_check(cipher_init(c, key));
|
| + err_check(cipher_set_iv(c, &nonce, direction_encrypt));
|
| err_check(cipher_encrypt(c, buffer, &buf_len));
|
| /* run tests on cipher outout */
|
| printf("monobit %d\n", stat_test_monobit(buffer));
|
| @@ -123,7 +133,7 @@ main (int argc, char *argv[]) {
|
| for (i=0; i < 2500; i++)
|
| buffer[i] = 0;
|
| nonce.v32[3] = i;
|
| - err_check(cipher_set_iv(c, &nonce));
|
| + err_check(cipher_set_iv(c, &nonce, direction_encrypt));
|
| err_check(cipher_encrypt(c, buffer, &buf_len));
|
| if (stat_test_runs(buffer)) {
|
| num_fail++;
|
| @@ -140,9 +150,9 @@ main (int argc, char *argv[]) {
|
| /* set buffer to cipher output */
|
| for (i=0; i < 2500; i++)
|
| buffer[i] = 0;
|
| - err_check(cipher_type_alloc(&aes_icm, &c, 46));
|
| - err_check(cipher_init(c, key, direction_encrypt));
|
| - err_check(cipher_set_iv(c, &nonce));
|
| + err_check(cipher_type_alloc(&aes_icm, &c, 46, 0));
|
| + err_check(cipher_init(c, key));
|
| + err_check(cipher_set_iv(c, &nonce, direction_encrypt));
|
| err_check(cipher_encrypt(c, buffer, &buf_len));
|
| /* run tests on cipher outout */
|
| printf("monobit %d\n", stat_test_monobit(buffer));
|
| @@ -157,13 +167,75 @@ main (int argc, char *argv[]) {
|
| for (i=0; i < 2500; i++)
|
| buffer[i] = 0;
|
| nonce.v32[3] = i;
|
| - err_check(cipher_set_iv(c, &nonce));
|
| + err_check(cipher_set_iv(c, &nonce, direction_encrypt));
|
| err_check(cipher_encrypt(c, buffer, &buf_len));
|
| if (stat_test_runs(buffer)) {
|
| num_fail++;
|
| }
|
| }
|
|
|
| +#ifdef OPENSSL
|
| + {
|
| + printf("running stat_tests on AES-128-GCM, expecting success\n");
|
| + /* set buffer to cipher output */
|
| + for (i=0; i < 2500; i++) {
|
| + buffer[i] = 0;
|
| + }
|
| + err_check(cipher_type_alloc(&aes_gcm_128_openssl, &c, AES_128_GCM_KEYSIZE_WSALT, 8));
|
| + err_check(cipher_init(c, key));
|
| + err_check(cipher_set_iv(c, &nonce, direction_encrypt));
|
| + err_check(cipher_encrypt(c, buffer, &buf_len));
|
| + /* run tests on cipher outout */
|
| + printf("monobit %d\n", stat_test_monobit(buffer));
|
| + printf("poker %d\n", stat_test_poker(buffer));
|
| + printf("runs %d\n", stat_test_runs(buffer));
|
| + fflush(stdout);
|
| + num_fail = 0;
|
| + v128_set_to_zero(&nonce);
|
| + for(j=0; j < num_trials; j++) {
|
| + for (i=0; i < 2500; i++) {
|
| + buffer[i] = 0;
|
| + }
|
| + nonce.v32[3] = i;
|
| + err_check(cipher_set_iv(c, &nonce, direction_encrypt));
|
| + err_check(cipher_encrypt(c, buffer, &buf_len));
|
| + buf_len = 2500;
|
| + if (stat_test_runs(buffer)) {
|
| + num_fail++;
|
| + }
|
| + }
|
| +
|
| + printf("running stat_tests on AES-256-GCM, expecting success\n");
|
| + /* set buffer to cipher output */
|
| + for (i=0; i < 2500; i++) {
|
| + buffer[i] = 0;
|
| + }
|
| + err_check(cipher_type_alloc(&aes_gcm_256_openssl, &c, AES_256_GCM_KEYSIZE_WSALT, 16));
|
| + err_check(cipher_init(c, key));
|
| + err_check(cipher_set_iv(c, &nonce, direction_encrypt));
|
| + err_check(cipher_encrypt(c, buffer, &buf_len));
|
| + /* run tests on cipher outout */
|
| + printf("monobit %d\n", stat_test_monobit(buffer));
|
| + printf("poker %d\n", stat_test_poker(buffer));
|
| + printf("runs %d\n", stat_test_runs(buffer));
|
| + fflush(stdout);
|
| + num_fail = 0;
|
| + v128_set_to_zero(&nonce);
|
| + for(j=0; j < num_trials; j++) {
|
| + for (i=0; i < 2500; i++) {
|
| + buffer[i] = 0;
|
| + }
|
| + nonce.v32[3] = i;
|
| + err_check(cipher_set_iv(c, &nonce, direction_encrypt));
|
| + err_check(cipher_encrypt(c, buffer, &buf_len));
|
| + buf_len = 2500;
|
| + if (stat_test_runs(buffer)) {
|
| + num_fail++;
|
| + }
|
| + }
|
| + }
|
| +#endif
|
| +
|
| printf("%d failures in %d tests\n", num_fail, num_trials);
|
| printf("(nota bene: a small fraction of stat_test failures does not \n"
|
| "indicate that the random source is invalid)\n");
|
|
|