119 Commits

Author SHA1 Message Date
Adam Langley
c5dc2781b1 avcp: SHA-1 for ECDSA _verification_ is still supported by NIST.
Change-Id: I26a643737e99ddf75af24143829df4551040f7db
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/47144
Commit-Queue: David Benjamin <davidben@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2021-04-22 18:07:52 +00:00
Adam Langley
2e54edf323 A couple of Aarch64 FIPS delocate fixes.
Clang 12 in opt mode produces a couple of assembly patterns that were
not handled by delocate.

Firstly, two-digit vector indexes were just a simple omission. Fixed.

Secondly, Clang puts symbol deltas in .byte directives, and bit-shifts
them. The .byte directive was not considered to be a symbol-containing
directive because it's too small, but it could store deltas.
Additionally, bit-shifting of symbol expressions was not supported.
Fixed.

Change-Id: I796299821f5ac7d3639fa6243c5d9bd5342bbddf
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/47064
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
2021-04-22 16:47:12 +00:00
Gurleen Grewal
68a799af7f acvptool: Fix typo hard-coding the HTTP method.
Change-Id: I134e2e8d73913843d21d8a3d7f2b266bee6ba73b
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/46964
Reviewed-by: Adam Langley <agl@google.com>
2021-04-19 22:17:07 +00:00
Adam Langley
7a1986c463 acvp: support GMAC as an algorithm.
It's defined as GCM without a plaintext input, so this is trivial.

Change-Id: Id430e998447e489c2bf2dd5c6541877870104ade
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/46844
Commit-Queue: David Benjamin <davidben@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2021-04-15 15:08:29 +00:00
Adam Langley
09f71c1bfd acvp: support KAS-ECC-SSC staticUnified mode.
Change-Id: I3dfd75c93b3ae83e0a4db643ac7d00d2867fa656
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/46704
Commit-Queue: David Benjamin <davidben@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2021-04-14 19:08:27 +00:00
Adam Langley
3af88549c2 Fix ppc64le build.
Change-Id: Ib2356f1a6e6ef8bfd5b5469eae9d1bc43dd40895
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/46724
Commit-Queue: Adam Langley <agl@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2021-04-12 16:44:40 +00:00
Adam Langley
1a93f4f820 modulewrapper: add option to print build information.
When doing Android FIPS validations one ends up with quite a lot of
different build configurations for ACVP and it's useful to be able to
check that a binary is what you think it is.

Change-Id: Ie5c81f164e6e6903c85ea832a93868f84921e74a
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/46484
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
2021-03-31 19:19:21 +00:00
Stephen Crane
bc0a4f1f0f acvp: split ACVP modulewrapper for reuse by Trusty
Trusty requires its own trusted app to implement the ACVP modulewrapper
functionality for validation. Separate the frontend from the generic
functions that implement each algorithm.

Change-Id: I86802b66c627ce4f5b5ddd54555a386e8e993eed
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/45604
Reviewed-by: Adam Langley <agl@google.com>
Commit-Queue: Adam Langley <agl@google.com>
2021-02-22 18:27:59 +00:00
Adam Langley
3b7029a549 acvp: detect header element in JSON.
Sometimes JSON vector files contain a header element that must be
duplicated into the output and sometimes they don't. Auto-detect this by
looking for a “url” field in the first element.

Change-Id: I76046adb8ea64fe5ac9bae9d6583546504723918
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/45524
Reviewed-by: David Benjamin <davidben@google.com>
2021-02-11 16:45:32 +00:00
Adam Langley
fc23300164 acvp: don't include CMAC-AES in regcap dump.
CMAC-AES isn't inside our FIPS module, it's only included in
modulewrapper in order to test acvptool. Mark it with a special tag to
avoid it appearing when dumping regcap JSON because NIST paperwork is
such that it's better not to ACVP test such code.

Change-Id: I0c6d3a38bce9bf5766b889677eb3f7de94262c24
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/45465
Reviewed-by: David Benjamin <davidben@google.com>
2021-02-09 22:57:26 +00:00
Adam Langley
4d3e540cc0 acvp: fix CMAC verify
This is only used for testing acvptool but, yea, |memcmp| doesn't return
a bool 😳

This wasn't noticed because "ver" mode was missing from the registration
and thus from the test vectors.

Change-Id: I181c9b66aea4032543d39ebcc8728a01e0f34f55
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/45464
Commit-Queue: Adam Langley <alangley@gmail.com>
Commit-Queue: David Benjamin <davidben@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2021-02-09 22:22:14 +00:00
Adam Langley
48cbd69dee Add various function calls to test_fips.
test_fips probably needs to exercise everything that we have self-tests
for.

(The following change will eliminate the duplication of the code to
create the FFDH group. For reasons, that can't be done in this change.)

Change-Id: Ia72064db77381e7cf396a34b4723b2607f26f00b
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/45404
Reviewed-by: Adam Langley <alangley@gmail.com>
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: Adam Langley <agl@google.com>
2021-02-04 17:40:21 +00:00
Adam Langley
4a196ccf9a acvp: move CMAC verification into the module wrapper.
CMAC is not inside our FIPS module and we have ACVP support for it just
for testing (other modules need to validate CMAC). This change makes the
CMAC verify test an explicit action for the module wrapper so that a
verification function exposed by a FIPS module can be tested.

Change-Id: I3943bde175f2c1d62881002b4e12d7bca68a9018
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/45264
Reviewed-by: David Benjamin <davidben@google.com>
2021-01-28 17:42:38 +00:00
David Benjamin
1c919724d3 Support MOVLPS and MOVHPS in delocate.
GCC 10.2.1 seems to be emitting code like this:

    movq    gcm_gmult_clmul@GOTPCREL(%rip), %xmm0
    movhps  gcm_ghash_clmul@GOTPCREL(%rip), %xmm0
    movaps  %xmm0, (%rsp)

This is assembling a pair of function pointers in %xmm0 and writing the
two out together. I've not observed the compiler output movlps, but
supporting movhps and movlps are about as tricky. The main complication
is that these instructions preserve the unwritten half of the
destination, and they do not support register sources, only memory.

This CL supports them by loading in a general-purpose register as we
usually do, pushing the register on the stack, and then running the
instruction on (%rsp). Some alternatives I considered:

- Save/restore a temporary XMM register and then use MOVHLPS and
  MOVLHPS. This would work but require another saveRegister-like
  wrapper.

- Take advantage of loadFromGOT ending in a memory mov and swap out
  the final instruction. This would be more efficient, but we downgrade
  GOT-based accesses to local symbols to a plain LEA. The compiler will
  only do this when we write a pair of function pointers in a row, so
  trying to optimize the non-local symbols seems not worth the trouble.
  (Really the compiler should not be emitting GOT-relative loads at all,
  but the compiler doesn't know these symbols will be private and in the
  same module, so it has a habit of pessimally using GOT-based loads.)

This option seemed the simplest.

Change-Id: I8c4915a6a0d72aa4c5f4d581081b99b3a6ab64c2
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/45244
Reviewed-by: Adam Langley <agl@google.com>
2021-01-27 22:51:57 +00:00
Adam Langley
5cf02188fe Add FFDH FIPS self-test.
This invovles a |2048|^|225| modexp, which is far from ideal, but is now
required in FIPS mode.

Change-Id: Id7384b4ba92aa74e971231bc44fa0f10434d18e2
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/45085
Commit-Queue: Adam Langley <agl@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2021-01-27 22:48:11 +00:00
Adam Langley
d09962d5c3 acvp: update to newer FFDH test.
Revision 1.0 is this test is reportedly no longer acceptable and we have
to use the “SSC” version now. The documentation for this test doesn't
mention that a “z” field is possible, but that's what the test vectors
from the demo server contain and, after guessing at the correct response
format, this makes the NIST server happy.

Change-Id: Ic63d9e19998dc015733d847cd0330a3af1d5e7e6
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/45224
Reviewed-by: David Benjamin <davidben@google.com>
2021-01-27 15:31:39 +00:00
Adam Langley
16c42cc796 acvp: check that the payloadLen of cipher tests is correct.
NIST currently seems to have a bug where they don't respect the regcap
for AES-CTR and return fractional-byte tests when not allowed.
Previously we didn't notice that the specified payload length didn't
match the actual value.

Change-Id: I0e48d5246f7250e6047d983cd016b0de290d0f70
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/45205
Reviewed-by: David Benjamin <davidben@google.com>
2021-01-26 18:59:21 +00:00
Adam Langley
1fa6b7ffd9 acvp: update test expectations in light of 8dcdcb39a7
(Forgot to git add these files to that change.)

Change-Id: I8303bbbf7e0089b3e992f4be7e645fe989a7ddb6
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/45204
Reviewed-by: David Benjamin <davidben@google.com>
2021-01-26 18:58:42 +00:00
Adam Langley
8dcdcb39a7 acvp: drop 3DES fields from output when unused.
Change-Id: Ibc7f1b70deca0e1541c3f32271e57fc0320e6a05
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/45185
Reviewed-by: David Benjamin <davidben@google.com>
2021-01-22 13:32:33 +00:00
Adam Langley
0f0e2bce6d acvp: don't advertise SHA-1 RSA signature generation.
The NIST production server doesn't like this.

Change-Id: I22ce31e822107f176eb97f7632ea2777c6ab4a44
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/45184
Commit-Queue: David Benjamin <davidben@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2021-01-22 01:20:48 +00:00
Adam Langley
c5e2cf3c07 delocate: support Aarch64
Add Aarch64 support to delocate. Since it's a modern ISA, it's actually
not too bad once I understood the behaviour of the assembler.

Change-Id: I105fede43b5196b7ff7bdbf1ee71c6cfa2fc1aab
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/44848
Reviewed-by: David Benjamin <davidben@google.com>
2021-01-20 17:18:30 +00:00
Adam Langley
2f2d27eb5c acvp: add XTS support.
Since we don't have XTS in the FIPS module, this change uses
testmodulewrapper for testing.

Change-Id: I82117472ea4288d017983fe9cc11d4ba808a972a
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/45064
Reviewed-by: David Benjamin <davidben@google.com>
2021-01-19 22:32:08 +00:00
Adam Langley
5d54832f1a delocate: handle Aarch64 assembly in parser.
Aarch64 assembly is quite different from x86-64 or POWER. But the system
of directives is the same so there's quite a lot of utility from being
able to use the same delocate framework.

Unfortunately, with peg, there's no obvious way to be able to parse
instructions differently without breaking the parsing into two stages.
Thus the parser is extended here to support all three ISAs. This seems
to work ok without breaking either of the other two.

Change-Id: Iced0f651e556e6ffae3eb35f2edfc0bf84167967
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/44846
Commit-Queue: Adam Langley <agl@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2021-01-11 19:03:16 +00:00
Adam Langley
ab6a8f49ff acvp: drop subprocess_test.go
It has been subsumed by the tests added in the previous change.

Change-Id: Ie53e8bd1116d2a70b9b88b2b59163e0f9a3140e8
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/44747
Commit-Queue: Adam Langley <agl@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2021-01-07 17:13:14 +00:00
Adam Langley
e4843750e5 delocate: support alternative comment indicators
aarch64 assembly files use "//" as the comment indicator because '#'
indicates a constant value.

Change-Id: I53b18cbb3498522b0924716238abf55e6627d216
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/44844
Commit-Queue: Adam Langley <agl@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2021-01-06 19:26:33 +00:00
Adam Langley
4f75b76ef2 acvp: add tests
This change causes the run_tests target, in FIPS builds, to run ACVP
for each supported algorithm. For most of them the output can be compared
against a known result. For some of them the output is too variable and
they are only run to ensure that they don't have local errors.

The ACVP test vectors have been trimmed significantly because they're
often huge. Firstly an included tool drops all but one test from each
group. Some vector sets have been manually trimmed to remove tests that
cause variable output.

Change-Id: Iff73851e3d47813041cc7ea6d881282750274940
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/44746
Commit-Queue: Adam Langley <agl@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2021-01-06 17:28:02 +00:00
Adam Langley
78f15a6aa9 Gerrit ignores <sup>; use Unicode superscript instead.
Change-Id: Ieb49837c3091b058a05d4558fe73248449c718c5
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/44825
Reviewed-by: Adam Langley <agl@google.com>
2020-12-23 18:59:44 +00:00
Adam Langley
e02dd70f53 acvp: better document the subprocess protocol.
Change-Id: I5b0b0892cfb968e5899464a6b35f647ba2dc2702
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/44824
Reviewed-by: Adam Langley <agl@google.com>
2020-12-23 18:43:06 +00:00
Adam Langley
4ab14ea275 acvp: fix silly errors.
A couple of processing errors crept in over time. Caught by the tests
in the next change.

Change-Id: I0caa478d3321cb8a1da1e61ddde16ba8db91eb35
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/44745
Commit-Queue: Adam Langley <agl@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2020-12-18 00:48:55 +00:00
Adam Langley
86854828e0 acvp: load config later.
The config file is only needed if interacting with an ACVP server.
Invocations that just want to process input from a file don't need it.
By moving this chunk of code down, the config isn't loaded until
after handling JSON inputs and just can be ignore if not needed.

Change-Id: Ibce334f63ddf8df34cf2917b923db20b3aaa735f
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/44744
Commit-Queue: David Benjamin <davidben@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2020-12-18 00:47:15 +00:00
Adam Langley
28cab640d1 acvp: add support for finite-field Diffie–Hellman.
This involves adding a new function |DH_compute_key_hashed| that
combines the FFDH with the output hashing inside the FIPS module. This
new function uses the padded FFDH output, as newly specified in SP
800-56Ar3.

Change-Id: Iafcb7e276f16d39bf7d25d3b2f163b5cd6f67883
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/44504
Reviewed-by: David Benjamin <davidben@google.com>
2020-12-14 21:31:09 +00:00
Adam Langley
0898b077a3 acvp: add support for KAS
Change-Id: Ida3ec65e81398881a71828dc1d51cf80be41bdbb
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/44444
Commit-Queue: Adam Langley <agl@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2020-12-08 23:28:48 +00:00
Adam Langley
f0400014b3 acvp: add TLS KDF support
Change-Id: I4f4a89f97e2513d8b5b740620989b187a7b44a58
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/44386
Commit-Queue: Adam Langley <agl@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2020-12-08 19:14:47 +00:00
Adam Langley
9ac743e0b4 acvp: tweak config
This change tweaks our ACVP config to better match what BoringCrypto
has previously tested with CAVP.

Change-Id: I7d7ce5153a3eb7355ae1516f06ff591ee2c9d902
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/44385
Reviewed-by: David Benjamin <davidben@google.com>
2020-12-08 18:47:46 +00:00
Adam Langley
329c0cbb2f acvp: fix subprocess_test.go
Change-Id: Ia3d98b00365ed92cbf7d02cdb55a1a16e431c4f4
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/44384
Reviewed-by: David Benjamin <davidben@google.com>
2020-12-08 18:47:24 +00:00
Emmanuel T Odeke
bb6f9c44b3 util/fipstools/acvp/acvptool: buffer signal channel to avoid losing signal
The docs at os/signal.Notify warn about this signal delivery loss bug at
https://golang.org/pkg/os/signal/#Notify, which says:

    Package signal will not block sending to c: the caller must ensure
    that c has sufficient buffer space to keep up with the expected signal
    rate. For a channel used for notification of just one signal value,
    a buffer of size 1 is sufficient.

Discovered by one of Orijtech, Inc's internal static
analyzers that will eventually be donated to the Go project, and will
then be included when one runs:
    go test

Change-Id: I5713f7087a195ac706240d32b53d2e4855d93a1c
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/44264
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
2020-12-01 17:57:02 +00:00
Adam Langley
806c505b7e acvp: add SHA-512/256 support.
Change-Id: Ib5d69d82c4cfc8cc172bdb5d9a739af53f9d2899
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/44165
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: Adam Langley <agl@google.com>
2020-11-19 20:24:07 +00:00
Adam Langley
8846533744 Add FIPS self test for the TLS KDF.
Change-Id: I08cc198f326f02b3f38234b938208ea49a13fab6
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/44164
Commit-Queue: Adam Langley <agl@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2020-11-19 20:14:47 +00:00
Adam Langley
1607f54fed acvp: move inner MCT loops into subprocess.
The ACVP MCT tests involve a double loop where the inner loop iterates
1000 (AES) or 10000 (3DES) times. This change moves that inner loop
into the subprocess. This significantly reduces the amount of IPC
traffic at the cost of making the subprocesses more complex. The traffic
volume is unimportant when talking over a local pipe, but it's
significant when channels like serial links are used.

Change-Id: Ia9d51335f06b743791f7885d366c8fd2f0f7eaf6
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/43844
Commit-Queue: Adam Langley <alangley@gmail.com>
Commit-Queue: Adam Langley <agl@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2020-11-04 22:04:09 +00:00
Adam Langley
777e1ff3b1 acvp: RSA signature verification tests.
Change-Id: I8697230d4feb3bc5308905aa8981087b0f080555
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/43626
Commit-Queue: Adam Langley <agl@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2020-10-23 22:09:07 +00:00
Adam Langley
e44d977c5e acvp: RSA signature generation tests.
Change-Id: Ibc794a66ea9b04e2d48c2124d52234a0bed10aff
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/43625
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: Adam Langley <agl@google.com>
2020-10-23 20:03:56 +00:00
Adam Langley
2e22d1b3cb acvp: support RSA key generation tests.
Change-Id: I40bbf6d10fcfd1e0fb506bef44f4cd6e9d2daac5
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/43644
Reviewed-by: David Benjamin <davidben@google.com>
2020-10-23 19:58:09 +00:00
Adam Langley
9c12f01de7 acvp: add 3DES-CBC support
Change-Id: I2e6cc7367b5ca6631329be298fbed7424221a06b
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/43406
Commit-Queue: Adam Langley <agl@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2020-10-23 00:27:59 +00:00
Adam Langley
e796cc6502 acvp: add 3DES-ECB support
Change-Id: I4ffa2572acce1fdccdf4d3c33680e6d0114bd42b
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/43405
Commit-Queue: Adam Langley <agl@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2020-10-22 21:40:29 +00:00
David Benjamin
fd83592b42 Silence some linter checks.
Use empty() over size() == 0, and don't export the IterateAES*
functions. (They return private types.)

Change-Id: I8a8f33a64e28cc2eab789563c6ba91afa6df87f9
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/43544
Commit-Queue: Adam Langley <agl@google.com>
Reviewed-by: Adam Langley <agl@google.com>
2020-10-20 23:52:04 +00:00
Adam Langley
9d1bca3dd2 acvp: update subprocess_test.go
A recent change broke this but I didn't notice. (Which suggests that the
test isn't very useful, which is true, but I'm not ready to pull the
trigger on deleting it just yet.)

Change-Id: If120a553c095fa0be9f8e85fc05ee996a486621f
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/43484
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
2020-10-16 21:36:45 +00:00
Adam Langley
6d2c799920 acvp: abstract out MCT iteration functions.
(There's going to be more and it was getting too big.)

Change-Id: I16a49f77975697bb5a04f2adfd465b09c2a09ef3
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/43404
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
2020-10-08 15:15:59 +00:00
Adam Langley
f94e6d7f9d acvp: add AES-CCM support.
Change-Id: Ia8cbfd0b8f0f3932aea20e801e031d8df318f386
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/43286
Commit-Queue: Adam Langley <agl@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2020-10-06 20:17:55 +00:00
Adam Langley
56b28d8446 acvp: highlight that the TOTP secret goes in the config file.
Change-Id: I469a49f0f678235700b8859d84b1b25b9f51518e
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/43325
Reviewed-by: David Benjamin <davidben@google.com>
2020-10-06 18:42:14 +00:00
Adam Langley
048f354b2a acvp: handle more private key formats.
This change adds a config parameter PrivateKeyFile (to replace
PrivateKeyDERFile, although that still exists) because taking PKCS#1 DER
is a little odd for people. Also probe for PEM/DER and PKCS#1/8
automatically to try and work with whatever private key the user has.

Change-Id: I0f4efcd79528cfb26f791e9ee8c5141fc6a93723
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/43344
Reviewed-by: David Benjamin <davidben@google.com>
2020-10-06 18:42:05 +00:00