* [PATCH] tests: add functional tests for ECB mode using various ciphers
@ 2025-11-26 11:09 Srish Srinivasan
2025-11-27 6:00 ` Sudhakar Kuppusamy
2025-12-01 17:27 ` Glenn Washburn
0 siblings, 2 replies; 4+ messages in thread
From: Srish Srinivasan @ 2025-11-26 11:09 UTC (permalink / raw)
To: grub-devel; +Cc: daniel.kiper, stefanb, sudhakar, sridharm, nayna, ssrish
Add functional tests covering ECB mode for the following
ciphers: des, 3des, aes, blowfish, cast5, and camellia
Signed-off-by: Srish Srinivasan <ssrish@linux.ibm.com>
---
docs/grub.texi | 6 +
grub-core/Makefile.core.def | 5 +
grub-core/tests/ecb_test.c | 283 ++++++++++++++++++++++++++
grub-core/tests/lib/functional_test.c | 1 +
4 files changed, 295 insertions(+)
create mode 100644 grub-core/tests/ecb_test.c
diff --git a/docs/grub.texi b/docs/grub.texi
index 7181009b6..f90eb992d 100644
--- a/docs/grub.texi
+++ b/docs/grub.texi
@@ -4092,6 +4092,7 @@ Modules can be loaded via the @command{insmod} (@pxref{insmod}) command.
* dm_nv_module::
* drivemap_module::
* dsa_sexp_test_module::
+* ecb_test_module::
* echo_module::
* efi_gop_module::
* efi_uga_module::
@@ -4677,6 +4678,11 @@ mappings. @xref{drivemap} for more information.
@section dsa_sexp_test
This module provides a test of the libgcrypt DSA functionality in GRUB.
+@node ecb_test_module
+@section ecb_test
+This module is intended for performing a functional test of the ecb
+mode of operation for various ciphers in GRUB.
+
@node echo_module
@section echo
This module provides support for the @command{echo} to display a line of text.
diff --git a/grub-core/Makefile.core.def b/grub-core/Makefile.core.def
index fa4bc54aa..de0e857eb 100644
--- a/grub-core/Makefile.core.def
+++ b/grub-core/Makefile.core.def
@@ -2272,6 +2272,11 @@ module = {
common = tests/argon2_test.c;
};
+module = {
+ name = ecb_test;
+ common = tests/ecb_test.c;
+};
+
module = {
name = legacy_password_test;
common = tests/legacy_password_test.c;
diff --git a/grub-core/tests/ecb_test.c b/grub-core/tests/ecb_test.c
new file mode 100644
index 000000000..b92e0d619
--- /dev/null
+++ b/grub-core/tests/ecb_test.c
@@ -0,0 +1,283 @@
+/*
+ * GRUB -- GRand Unified Bootloader
+ * Copyright (C) 2025 Free Software Foundation, Inc.
+ *
+ * GRUB is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * GRUB is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with GRUB. If not, see <http://www.gnu.org/licenses/>.
+ */
+
+#include <grub/test.h>
+#include <grub/dl.h>
+#include <grub/misc.h>
+#include <grub/crypto.h>
+
+GRUB_MOD_LICENSE ("GPLv3+");
+
+static struct
+{
+ const char *cipher;
+ const char *key;
+ unsigned int keylen;
+ const char *ptext;
+ unsigned int plen;
+ const char *ctext;
+} vectors[] = {
+ {
+ "des",
+ "\x01\x23\x45\x67\x89\xab\xcd\xef",
+ 8,
+ "\x01\x23\x45\x67\x89\xab\xcd\xe7"
+ "\x22\x33\x44\x55\x66\x77\x88\x99"
+ "\xca\xfe\xba\xbe\xfe\xed\xbe\xef",
+ 24,
+ "\xc9\x57\x44\x25\x6a\x5e\xd3\x1d"
+ "\xf7\x9c\x89\x2a\x33\x8f\x4a\x8b"
+ "\xb4\x99\x26\xf7\x1f\xe1\xd4\x90",
+ },
+ {
+ "3des",
+ "\x01\x23\x45\x67\x89\xab\xcd\xef"
+ "\x55\x55\x55\x55\x55\x55\x55\x55"
+ "\xfe\xdc\xba\x98\x76\x54\x32\x10",
+ 24,
+ "\x73\x6f\x6d\x65\x64\x61\x74\x61",
+ 8,
+ "\x18\xd7\x48\xe5\x63\x62\x05\x72",
+ },
+ {
+ "aes",
+ "\x00\x01\x02\x03\x04\x05\x06\x07"
+ "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f",
+ 16,
+ "\x00\x11\x22\x33\x44\x55\x66\x77"
+ "\x88\x99\xaa\xbb\xcc\xdd\xee\xff",
+ 16,
+ "\x69\xc4\xe0\xd8\x6a\x7b\x04\x30"
+ "\xd8\xcd\xb7\x80\x70\xb4\xc5\x5a",
+ },
+ {
+ "aes",
+ "\x00\x01\x02\x03\x04\x05\x06\x07"
+ "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
+ "\x10\x11\x12\x13\x14\x15\x16\x17",
+ 24,
+ "\x00\x11\x22\x33\x44\x55\x66\x77"
+ "\x88\x99\xaa\xbb\xcc\xdd\xee\xff",
+ 16,
+ "\xdd\xa9\x7c\xa4\x86\x4c\xdf\xe0"
+ "\x6e\xaf\x70\xa0\xec\x0d\x71\x91",
+ },
+ {
+ "aes",
+ "\x00\x01\x02\x03\x04\x05\x06\x07"
+ "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
+ "\x10\x11\x12\x13\x14\x15\x16\x17"
+ "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f",
+ 32,
+ "\x00\x11\x22\x33\x44\x55\x66\x77"
+ "\x88\x99\xaa\xbb\xcc\xdd\xee\xff",
+ 16,
+ "\x8e\xa2\xb7\xca\x51\x67\x45\xbf"
+ "\xea\xfc\x49\x90\x4b\x49\x60\x89",
+ },
+ {
+ "blowfish",
+ "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87",
+ 8,
+ "\xfe\xdc\xba\x98\x76\x54\x32\x10",
+ 8,
+ "\xe8\x7a\x24\x4e\x2c\xc8\x5e\x82",
+ },
+ {
+ "blowfish",
+ "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87"
+ "\x78\x69\x5a\x4b\x3c\x2d\x1e\x0f",
+ 16,
+ "\xfe\xdc\xba\x98\x76\x54\x32\x10",
+ 8,
+ "\x93\x14\x28\x87\xee\x3b\xe1\x5c",
+ },
+ {
+ "blowfish",
+ "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87"
+ "\x78\x69\x5a\x4b\x3c\x2d\x1e\x0f"
+ "\x00\x11\x22\x33\x44",
+ 21,
+ "\xfe\xdc\xba\x98\x76\x54\x32\x10",
+ 8,
+ "\xe6\xf5\x1e\xd7\x9b\x9d\xb2\x1f",
+ },
+ {
+ "blowfish",
+ "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87"
+ "\x78\x69\x5a\x4b\x3c\x2d\x1e\x0f"
+ "\x00\x11\x22\x33\x44\x55\x66\x77"
+ "\x04\x68\x91\x04\xc2\xfd\x3b\x2f"
+ "\x58\x40\x23\x64\x1a\xba\x61\x76"
+ "\x1f\x1f\x1f\x1f\x0e\x0e\x0e\x0e"
+ "\xff\xff\xff\xff\xff\xff\xff\xff",
+ 56,
+ "\xfe\xdc\xba\x98\x76\x54\x32\x10",
+ 8,
+ "\xc0\x45\x04\x01\x2e\x4e\x1f\x53",
+ },
+ {
+ "cast5",
+ "\x01\x23\x45\x67\x12\x34\x56\x78"
+ "\x23\x45\x67\x89\x34\x56\x78\x9a",
+ 16,
+ "\x01\x23\x45\x67\x89\xab\xcd\xef",
+ 8,
+ "\x23\x8b\x4f\xe5\x84\x7e\x44\xb2",
+ },
+ {
+ "cast5",
+ "\x01\x23\x45\x67\x12\x34\x56\x78"
+ "\x23\x45\x00\x00\x00\x00\x00\x00",
+ 16,
+ "\x01\x23\x45\x67\x89\xab\xcd\xef",
+ 8,
+ "\x75\x3d\xe2\x9f\x5d\x16\x7d\x03",
+ },
+ {
+ "camellia128",
+ "\x01\x23\x45\x67\x89\xab\xcd\xef"
+ "\xfe\xdc\xba\x98\x76\x54\x32\x10",
+ 16,
+ "\x01\x23\x45\x67\x89\xab\xcd\xef"
+ "\xfe\xdc\xba\x98\x76\x54\x32\x10",
+ 16,
+ "\x67\x67\x31\x38\x54\x96\x69\x73"
+ "\x08\x57\x06\x56\x48\xea\xbe\x43",
+ },
+ {
+ "camellia192",
+ "\x01\x23\x45\x67\x89\xab\xcd\xef"
+ "\xfe\xdc\xba\x98\x76\x54\x32\x10"
+ "\x00\x11\x22\x33\x44\x55\x66\x77",
+ 24,
+ "\x01\x23\x45\x67\x89\xab\xcd\xef"
+ "\xfe\xdc\xba\x98\x76\x54\x32\x10",
+ 16,
+ "\xb4\x99\x34\x01\xb3\xe9\x96\xf8"
+ "\x4e\xe5\xce\xe7\xd7\x9b\x09\xb9",
+ },
+ {
+ "camellia256",
+ "\x01\x23\x45\x67\x89\xab\xcd\xef"
+ "\xfe\xdc\xba\x98\x76\x54\x32\x10"
+ "\x00\x11\x22\x33\x44\x55\x66\x77"
+ "\x88\x99\xaa\xbb\xcc\xdd\xee\xff",
+ 32,
+ "\x01\x23\x45\x67\x89\xab\xcd\xef"
+ "\xfe\xdc\xba\x98\x76\x54\x32\x10",
+ 16,
+ "\x9a\xcc\x23\x7d\xff\x16\xd7\x6c"
+ "\x20\xef\x7c\x91\x9e\x3a\x75\x09",
+ },
+};
+
+static void
+ecb_test (void)
+{
+ grub_size_t i;
+
+ for (i = 0; i < ARRAY_SIZE (vectors); i++)
+ {
+ gcry_err_code_t err;
+ unsigned char *plaintext, *ciphertext;
+ int rc;
+
+ const gcry_cipher_spec_t *cipher = grub_crypto_lookup_cipher_by_name (vectors[i].cipher);
+ grub_test_assert (cipher != NULL, "cipher lookup failed for vector %ld (cipher: %s)", i+1,
+ vectors[i].cipher);
+ if (cipher == NULL)
+ return;
+
+ grub_crypto_cipher_handle_t handle = grub_crypto_cipher_open (cipher);
+ grub_test_assert (handle != NULL, "cipher handle opening failed for vector %ld (cipher: %s)",
+ i+1, vectors[i].cipher);
+ if (handle == NULL)
+ return;
+
+ err = grub_crypto_cipher_set_key (handle, (grub_uint8_t *)vectors[i].key, vectors[i].keylen);
+ grub_test_assert (err == GPG_ERR_NO_ERROR,
+ "setting key of length %d failed for vector %ld (cipher: %s)",
+ vectors[i].keylen, i+1, vectors[i].cipher);
+ if (err != GPG_ERR_NO_ERROR)
+ {
+ grub_crypto_cipher_close(handle);
+ return;
+ }
+
+ /* Test Encryption */
+ ciphertext = grub_zalloc (vectors[i].plen);
+ grub_test_assert (ciphertext != NULL,
+ "ciphertext buffer allocation failed for vector %ld (cipher: %s)", i+1,
+ vectors[i].cipher);
+ if (ciphertext == NULL)
+ {
+ grub_crypto_cipher_close(handle);
+ return;
+ }
+
+ err = grub_crypto_ecb_encrypt (handle, ciphertext, vectors[i].ptext, vectors[i].plen);
+ grub_test_assert (err == GPG_ERR_NO_ERROR,
+ "ecb encryption failed for vector %ld (cipher: %s)", i+1,
+ vectors[i].cipher);
+ if (err != GPG_ERR_NO_ERROR)
+ {
+ grub_crypto_cipher_close(handle);
+ grub_free(ciphertext);
+ return;
+ }
+
+ rc = grub_memcmp (ciphertext, vectors[i].ctext, vectors[i].plen);
+ grub_test_assert (rc == 0, "ciphertext mismatch after encryption for vector %ld (cipher: %s)",
+ i+1, vectors[i].cipher);
+
+ grub_free(ciphertext);
+
+ /* Test Decryption */
+ plaintext = grub_zalloc (vectors[i].plen);
+ grub_test_assert (plaintext != NULL,
+ "plaintext buffer allocation failed for vector %ld (cipher: %s)", i+1,
+ vectors[i].cipher);
+ if (plaintext == NULL)
+ {
+ grub_crypto_cipher_close(handle);
+ return;
+ }
+
+ err = grub_crypto_ecb_decrypt (handle, plaintext, vectors[i].ctext, vectors[i].plen);
+ grub_test_assert (err == GPG_ERR_NO_ERROR,
+ "ecb decryption failed for vector %ld (cipher: %s)", i+1,
+ vectors[i].cipher);
+ if (err != GPG_ERR_NO_ERROR)
+ {
+ grub_crypto_cipher_close(handle);
+ grub_free(plaintext);
+ return;
+ }
+
+ rc = grub_memcmp (plaintext, vectors[i].ptext, vectors[i].plen);
+ grub_test_assert (rc == 0, "plaintext mismatch after decryption for vector %ld (cipher: %s)",
+ i+1, vectors[i].cipher);
+
+ grub_free(plaintext);
+ grub_crypto_cipher_close(handle);
+ }
+}
+
+/* Register example_test method as a functional test. */
+GRUB_FUNCTIONAL_TEST (ecb_test, ecb_test);
diff --git a/grub-core/tests/lib/functional_test.c b/grub-core/tests/lib/functional_test.c
index 776934e1f..b3cc5f5ce 100644
--- a/grub-core/tests/lib/functional_test.c
+++ b/grub-core/tests/lib/functional_test.c
@@ -82,6 +82,7 @@ grub_functional_all_tests (grub_extcmd_context_t ctxt __attribute__ ((unused)),
grub_dl_load ("shift_test");
grub_dl_load ("asn1_test");
grub_dl_load ("argon2_test");
+ grub_dl_load ("ecb_test");
FOR_LIST_ELEMENTS (test, grub_test_list)
ok = !grub_test_run (test) && ok;
--
2.43.0
_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
https://lists.gnu.org/mailman/listinfo/grub-devel
^ permalink raw reply related [flat|nested] 4+ messages in thread
* Re: [PATCH] tests: add functional tests for ECB mode using various ciphers
2025-11-26 11:09 [PATCH] tests: add functional tests for ECB mode using various ciphers Srish Srinivasan
@ 2025-11-27 6:00 ` Sudhakar Kuppusamy
2025-12-01 17:27 ` Glenn Washburn
1 sibling, 0 replies; 4+ messages in thread
From: Sudhakar Kuppusamy @ 2025-11-27 6:00 UTC (permalink / raw)
To: Srish Srinivasan; +Cc: grub-devel, daniel.kiper, stefanb, sridharm, nayna
> On 26 Nov 2025, at 4:39 PM, Srish Srinivasan <ssrish@linux.ibm.com> wrote:
>
> Add functional tests covering ECB mode for the following
> ciphers: des, 3des, aes, blowfish, cast5, and camellia
>
> Signed-off-by: Srish Srinivasan <ssrish@linux.ibm.com>
Reviewed-by: Sudhakar Kuppusamy <sudhakar@linux.ibm.com>
Thanks,
Sudhakar
> ---
> docs/grub.texi | 6 +
> grub-core/Makefile.core.def | 5 +
> grub-core/tests/ecb_test.c | 283 ++++++++++++++++++++++++++
> grub-core/tests/lib/functional_test.c | 1 +
> 4 files changed, 295 insertions(+)
> create mode 100644 grub-core/tests/ecb_test.c
>
> diff --git a/docs/grub.texi b/docs/grub.texi
> index 7181009b6..f90eb992d 100644
> --- a/docs/grub.texi
> +++ b/docs/grub.texi
> @@ -4092,6 +4092,7 @@ Modules can be loaded via the @command{insmod} (@pxref{insmod}) command.
> * dm_nv_module::
> * drivemap_module::
> * dsa_sexp_test_module::
> +* ecb_test_module::
> * echo_module::
> * efi_gop_module::
> * efi_uga_module::
> @@ -4677,6 +4678,11 @@ mappings. @xref{drivemap} for more information.
> @section dsa_sexp_test
> This module provides a test of the libgcrypt DSA functionality in GRUB.
>
> +@node ecb_test_module
> +@section ecb_test
> +This module is intended for performing a functional test of the ecb
> +mode of operation for various ciphers in GRUB.
> +
> @node echo_module
> @section echo
> This module provides support for the @command{echo} to display a line of text.
> diff --git a/grub-core/Makefile.core.def b/grub-core/Makefile.core.def
> index fa4bc54aa..de0e857eb 100644
> --- a/grub-core/Makefile.core.def
> +++ b/grub-core/Makefile.core.def
> @@ -2272,6 +2272,11 @@ module = {
> common = tests/argon2_test.c;
> };
>
> +module = {
> + name = ecb_test;
> + common = tests/ecb_test.c;
> +};
> +
> module = {
> name = legacy_password_test;
> common = tests/legacy_password_test.c;
> diff --git a/grub-core/tests/ecb_test.c b/grub-core/tests/ecb_test.c
> new file mode 100644
> index 000000000..b92e0d619
> --- /dev/null
> +++ b/grub-core/tests/ecb_test.c
> @@ -0,0 +1,283 @@
> +/*
> + * GRUB -- GRand Unified Bootloader
> + * Copyright (C) 2025 Free Software Foundation, Inc.
> + *
> + * GRUB is free software: you can redistribute it and/or modify
> + * it under the terms of the GNU General Public License as published by
> + * the Free Software Foundation, either version 3 of the License, or
> + * (at your option) any later version.
> + *
> + * GRUB is distributed in the hope that it will be useful,
> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
> + * GNU General Public License for more details.
> + *
> + * You should have received a copy of the GNU General Public License
> + * along with GRUB. If not, see <http://www.gnu.org/licenses/>.
> + */
> +
> +#include <grub/test.h>
> +#include <grub/dl.h>
> +#include <grub/misc.h>
> +#include <grub/crypto.h>
> +
> +GRUB_MOD_LICENSE ("GPLv3+");
> +
> +static struct
> +{
> + const char *cipher;
> + const char *key;
> + unsigned int keylen;
> + const char *ptext;
> + unsigned int plen;
> + const char *ctext;
> +} vectors[] = {
> + {
> + "des",
> + "\x01\x23\x45\x67\x89\xab\xcd\xef",
> + 8,
> + "\x01\x23\x45\x67\x89\xab\xcd\xe7"
> + "\x22\x33\x44\x55\x66\x77\x88\x99"
> + "\xca\xfe\xba\xbe\xfe\xed\xbe\xef",
> + 24,
> + "\xc9\x57\x44\x25\x6a\x5e\xd3\x1d"
> + "\xf7\x9c\x89\x2a\x33\x8f\x4a\x8b"
> + "\xb4\x99\x26\xf7\x1f\xe1\xd4\x90",
> + },
> + {
> + "3des",
> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
> + "\x55\x55\x55\x55\x55\x55\x55\x55"
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
> + 24,
> + "\x73\x6f\x6d\x65\x64\x61\x74\x61",
> + 8,
> + "\x18\xd7\x48\xe5\x63\x62\x05\x72",
> + },
> + {
> + "aes",
> + "\x00\x01\x02\x03\x04\x05\x06\x07"
> + "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f",
> + 16,
> + "\x00\x11\x22\x33\x44\x55\x66\x77"
> + "\x88\x99\xaa\xbb\xcc\xdd\xee\xff",
> + 16,
> + "\x69\xc4\xe0\xd8\x6a\x7b\x04\x30"
> + "\xd8\xcd\xb7\x80\x70\xb4\xc5\x5a",
> + },
> + {
> + "aes",
> + "\x00\x01\x02\x03\x04\x05\x06\x07"
> + "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
> + "\x10\x11\x12\x13\x14\x15\x16\x17",
> + 24,
> + "\x00\x11\x22\x33\x44\x55\x66\x77"
> + "\x88\x99\xaa\xbb\xcc\xdd\xee\xff",
> + 16,
> + "\xdd\xa9\x7c\xa4\x86\x4c\xdf\xe0"
> + "\x6e\xaf\x70\xa0\xec\x0d\x71\x91",
> + },
> + {
> + "aes",
> + "\x00\x01\x02\x03\x04\x05\x06\x07"
> + "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
> + "\x10\x11\x12\x13\x14\x15\x16\x17"
> + "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f",
> + 32,
> + "\x00\x11\x22\x33\x44\x55\x66\x77"
> + "\x88\x99\xaa\xbb\xcc\xdd\xee\xff",
> + 16,
> + "\x8e\xa2\xb7\xca\x51\x67\x45\xbf"
> + "\xea\xfc\x49\x90\x4b\x49\x60\x89",
> + },
> + {
> + "blowfish",
> + "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87",
> + 8,
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
> + 8,
> + "\xe8\x7a\x24\x4e\x2c\xc8\x5e\x82",
> + },
> + {
> + "blowfish",
> + "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87"
> + "\x78\x69\x5a\x4b\x3c\x2d\x1e\x0f",
> + 16,
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
> + 8,
> + "\x93\x14\x28\x87\xee\x3b\xe1\x5c",
> + },
> + {
> + "blowfish",
> + "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87"
> + "\x78\x69\x5a\x4b\x3c\x2d\x1e\x0f"
> + "\x00\x11\x22\x33\x44",
> + 21,
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
> + 8,
> + "\xe6\xf5\x1e\xd7\x9b\x9d\xb2\x1f",
> + },
> + {
> + "blowfish",
> + "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87"
> + "\x78\x69\x5a\x4b\x3c\x2d\x1e\x0f"
> + "\x00\x11\x22\x33\x44\x55\x66\x77"
> + "\x04\x68\x91\x04\xc2\xfd\x3b\x2f"
> + "\x58\x40\x23\x64\x1a\xba\x61\x76"
> + "\x1f\x1f\x1f\x1f\x0e\x0e\x0e\x0e"
> + "\xff\xff\xff\xff\xff\xff\xff\xff",
> + 56,
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
> + 8,
> + "\xc0\x45\x04\x01\x2e\x4e\x1f\x53",
> + },
> + {
> + "cast5",
> + "\x01\x23\x45\x67\x12\x34\x56\x78"
> + "\x23\x45\x67\x89\x34\x56\x78\x9a",
> + 16,
> + "\x01\x23\x45\x67\x89\xab\xcd\xef",
> + 8,
> + "\x23\x8b\x4f\xe5\x84\x7e\x44\xb2",
> + },
> + {
> + "cast5",
> + "\x01\x23\x45\x67\x12\x34\x56\x78"
> + "\x23\x45\x00\x00\x00\x00\x00\x00",
> + 16,
> + "\x01\x23\x45\x67\x89\xab\xcd\xef",
> + 8,
> + "\x75\x3d\xe2\x9f\x5d\x16\x7d\x03",
> + },
> + {
> + "camellia128",
> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
> + 16,
> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
> + 16,
> + "\x67\x67\x31\x38\x54\x96\x69\x73"
> + "\x08\x57\x06\x56\x48\xea\xbe\x43",
> + },
> + {
> + "camellia192",
> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10"
> + "\x00\x11\x22\x33\x44\x55\x66\x77",
> + 24,
> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
> + 16,
> + "\xb4\x99\x34\x01\xb3\xe9\x96\xf8"
> + "\x4e\xe5\xce\xe7\xd7\x9b\x09\xb9",
> + },
> + {
> + "camellia256",
> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10"
> + "\x00\x11\x22\x33\x44\x55\x66\x77"
> + "\x88\x99\xaa\xbb\xcc\xdd\xee\xff",
> + 32,
> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
> + 16,
> + "\x9a\xcc\x23\x7d\xff\x16\xd7\x6c"
> + "\x20\xef\x7c\x91\x9e\x3a\x75\x09",
> + },
> +};
> +
> +static void
> +ecb_test (void)
> +{
> + grub_size_t i;
> +
> + for (i = 0; i < ARRAY_SIZE (vectors); i++)
> + {
> + gcry_err_code_t err;
> + unsigned char *plaintext, *ciphertext;
> + int rc;
> +
> + const gcry_cipher_spec_t *cipher = grub_crypto_lookup_cipher_by_name (vectors[i].cipher);
> + grub_test_assert (cipher != NULL, "cipher lookup failed for vector %ld (cipher: %s)", i+1,
> + vectors[i].cipher);
> + if (cipher == NULL)
> + return;
> +
> + grub_crypto_cipher_handle_t handle = grub_crypto_cipher_open (cipher);
> + grub_test_assert (handle != NULL, "cipher handle opening failed for vector %ld (cipher: %s)",
> + i+1, vectors[i].cipher);
> + if (handle == NULL)
> + return;
> +
> + err = grub_crypto_cipher_set_key (handle, (grub_uint8_t *)vectors[i].key, vectors[i].keylen);
> + grub_test_assert (err == GPG_ERR_NO_ERROR,
> + "setting key of length %d failed for vector %ld (cipher: %s)",
> + vectors[i].keylen, i+1, vectors[i].cipher);
> + if (err != GPG_ERR_NO_ERROR)
> + {
> + grub_crypto_cipher_close(handle);
> + return;
> + }
> +
> + /* Test Encryption */
> + ciphertext = grub_zalloc (vectors[i].plen);
> + grub_test_assert (ciphertext != NULL,
> + "ciphertext buffer allocation failed for vector %ld (cipher: %s)", i+1,
> + vectors[i].cipher);
> + if (ciphertext == NULL)
> + {
> + grub_crypto_cipher_close(handle);
> + return;
> + }
> +
> + err = grub_crypto_ecb_encrypt (handle, ciphertext, vectors[i].ptext, vectors[i].plen);
> + grub_test_assert (err == GPG_ERR_NO_ERROR,
> + "ecb encryption failed for vector %ld (cipher: %s)", i+1,
> + vectors[i].cipher);
> + if (err != GPG_ERR_NO_ERROR)
> + {
> + grub_crypto_cipher_close(handle);
> + grub_free(ciphertext);
> + return;
> + }
> +
> + rc = grub_memcmp (ciphertext, vectors[i].ctext, vectors[i].plen);
> + grub_test_assert (rc == 0, "ciphertext mismatch after encryption for vector %ld (cipher: %s)",
> + i+1, vectors[i].cipher);
> +
> + grub_free(ciphertext);
> +
> + /* Test Decryption */
> + plaintext = grub_zalloc (vectors[i].plen);
> + grub_test_assert (plaintext != NULL,
> + "plaintext buffer allocation failed for vector %ld (cipher: %s)", i+1,
> + vectors[i].cipher);
> + if (plaintext == NULL)
> + {
> + grub_crypto_cipher_close(handle);
> + return;
> + }
> +
> + err = grub_crypto_ecb_decrypt (handle, plaintext, vectors[i].ctext, vectors[i].plen);
> + grub_test_assert (err == GPG_ERR_NO_ERROR,
> + "ecb decryption failed for vector %ld (cipher: %s)", i+1,
> + vectors[i].cipher);
> + if (err != GPG_ERR_NO_ERROR)
> + {
> + grub_crypto_cipher_close(handle);
> + grub_free(plaintext);
> + return;
> + }
> +
> + rc = grub_memcmp (plaintext, vectors[i].ptext, vectors[i].plen);
> + grub_test_assert (rc == 0, "plaintext mismatch after decryption for vector %ld (cipher: %s)",
> + i+1, vectors[i].cipher);
> +
> + grub_free(plaintext);
> + grub_crypto_cipher_close(handle);
> + }
> +}
> +
> +/* Register example_test method as a functional test. */
> +GRUB_FUNCTIONAL_TEST (ecb_test, ecb_test);
> diff --git a/grub-core/tests/lib/functional_test.c b/grub-core/tests/lib/functional_test.c
> index 776934e1f..b3cc5f5ce 100644
> --- a/grub-core/tests/lib/functional_test.c
> +++ b/grub-core/tests/lib/functional_test.c
> @@ -82,6 +82,7 @@ grub_functional_all_tests (grub_extcmd_context_t ctxt __attribute__ ((unused)),
> grub_dl_load ("shift_test");
> grub_dl_load ("asn1_test");
> grub_dl_load ("argon2_test");
> + grub_dl_load ("ecb_test");
>
> FOR_LIST_ELEMENTS (test, grub_test_list)
> ok = !grub_test_run (test) && ok;
> --
> 2.43.0
>
_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
https://lists.gnu.org/mailman/listinfo/grub-devel
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH] tests: add functional tests for ECB mode using various ciphers
2025-11-26 11:09 [PATCH] tests: add functional tests for ECB mode using various ciphers Srish Srinivasan
2025-11-27 6:00 ` Sudhakar Kuppusamy
@ 2025-12-01 17:27 ` Glenn Washburn
2025-12-01 20:08 ` Srish Srinivasan
1 sibling, 1 reply; 4+ messages in thread
From: Glenn Washburn @ 2025-12-01 17:27 UTC (permalink / raw)
To: Srish Srinivasan
Cc: The development of GNU GRUB, daniel.kiper, stefanb, sudhakar,
sridharm, nayna
On Wed, 26 Nov 2025 16:39:09 +0530
Srish Srinivasan <ssrish@linux.ibm.com> wrote:
> Add functional tests covering ECB mode for the following
> ciphers: des, 3des, aes, blowfish, cast5, and camellia
Are any of these actually able to be used by GRUB, aside from AES? And
if so where? My understanding is that from a security standpoint DES
should never be used, and that's probably true for others in the list.
Does the quality of the ECB testing decrease by not testing some of
these algorithms. I haven't looked at the ECB code, but I imagine that
testing one cipher is sufficient. Am I wrong?
Glenn
>
> Signed-off-by: Srish Srinivasan <ssrish@linux.ibm.com>
> ---
> docs/grub.texi | 6 +
> grub-core/Makefile.core.def | 5 +
> grub-core/tests/ecb_test.c | 283 ++++++++++++++++++++++++++
> grub-core/tests/lib/functional_test.c | 1 +
> 4 files changed, 295 insertions(+)
> create mode 100644 grub-core/tests/ecb_test.c
>
> diff --git a/docs/grub.texi b/docs/grub.texi
> index 7181009b6..f90eb992d 100644
> --- a/docs/grub.texi
> +++ b/docs/grub.texi
> @@ -4092,6 +4092,7 @@ Modules can be loaded via the @command{insmod} (@pxref{insmod}) command.
> * dm_nv_module::
> * drivemap_module::
> * dsa_sexp_test_module::
> +* ecb_test_module::
> * echo_module::
> * efi_gop_module::
> * efi_uga_module::
> @@ -4677,6 +4678,11 @@ mappings. @xref{drivemap} for more information.
> @section dsa_sexp_test
> This module provides a test of the libgcrypt DSA functionality in GRUB.
>
> +@node ecb_test_module
> +@section ecb_test
> +This module is intended for performing a functional test of the ecb
> +mode of operation for various ciphers in GRUB.
> +
> @node echo_module
> @section echo
> This module provides support for the @command{echo} to display a line of text.
> diff --git a/grub-core/Makefile.core.def b/grub-core/Makefile.core.def
> index fa4bc54aa..de0e857eb 100644
> --- a/grub-core/Makefile.core.def
> +++ b/grub-core/Makefile.core.def
> @@ -2272,6 +2272,11 @@ module = {
> common = tests/argon2_test.c;
> };
>
> +module = {
> + name = ecb_test;
> + common = tests/ecb_test.c;
> +};
> +
> module = {
> name = legacy_password_test;
> common = tests/legacy_password_test.c;
> diff --git a/grub-core/tests/ecb_test.c b/grub-core/tests/ecb_test.c
> new file mode 100644
> index 000000000..b92e0d619
> --- /dev/null
> +++ b/grub-core/tests/ecb_test.c
> @@ -0,0 +1,283 @@
> +/*
> + * GRUB -- GRand Unified Bootloader
> + * Copyright (C) 2025 Free Software Foundation, Inc.
> + *
> + * GRUB is free software: you can redistribute it and/or modify
> + * it under the terms of the GNU General Public License as published by
> + * the Free Software Foundation, either version 3 of the License, or
> + * (at your option) any later version.
> + *
> + * GRUB is distributed in the hope that it will be useful,
> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
> + * GNU General Public License for more details.
> + *
> + * You should have received a copy of the GNU General Public License
> + * along with GRUB. If not, see <http://www.gnu.org/licenses/>.
> + */
> +
> +#include <grub/test.h>
> +#include <grub/dl.h>
> +#include <grub/misc.h>
> +#include <grub/crypto.h>
> +
> +GRUB_MOD_LICENSE ("GPLv3+");
> +
> +static struct
> +{
> + const char *cipher;
> + const char *key;
> + unsigned int keylen;
> + const char *ptext;
> + unsigned int plen;
> + const char *ctext;
> +} vectors[] = {
> + {
> + "des",
> + "\x01\x23\x45\x67\x89\xab\xcd\xef",
> + 8,
> + "\x01\x23\x45\x67\x89\xab\xcd\xe7"
> + "\x22\x33\x44\x55\x66\x77\x88\x99"
> + "\xca\xfe\xba\xbe\xfe\xed\xbe\xef",
> + 24,
> + "\xc9\x57\x44\x25\x6a\x5e\xd3\x1d"
> + "\xf7\x9c\x89\x2a\x33\x8f\x4a\x8b"
> + "\xb4\x99\x26\xf7\x1f\xe1\xd4\x90",
> + },
> + {
> + "3des",
> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
> + "\x55\x55\x55\x55\x55\x55\x55\x55"
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
> + 24,
> + "\x73\x6f\x6d\x65\x64\x61\x74\x61",
> + 8,
> + "\x18\xd7\x48\xe5\x63\x62\x05\x72",
> + },
> + {
> + "aes",
> + "\x00\x01\x02\x03\x04\x05\x06\x07"
> + "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f",
> + 16,
> + "\x00\x11\x22\x33\x44\x55\x66\x77"
> + "\x88\x99\xaa\xbb\xcc\xdd\xee\xff",
> + 16,
> + "\x69\xc4\xe0\xd8\x6a\x7b\x04\x30"
> + "\xd8\xcd\xb7\x80\x70\xb4\xc5\x5a",
> + },
> + {
> + "aes",
> + "\x00\x01\x02\x03\x04\x05\x06\x07"
> + "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
> + "\x10\x11\x12\x13\x14\x15\x16\x17",
> + 24,
> + "\x00\x11\x22\x33\x44\x55\x66\x77"
> + "\x88\x99\xaa\xbb\xcc\xdd\xee\xff",
> + 16,
> + "\xdd\xa9\x7c\xa4\x86\x4c\xdf\xe0"
> + "\x6e\xaf\x70\xa0\xec\x0d\x71\x91",
> + },
> + {
> + "aes",
> + "\x00\x01\x02\x03\x04\x05\x06\x07"
> + "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
> + "\x10\x11\x12\x13\x14\x15\x16\x17"
> + "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f",
> + 32,
> + "\x00\x11\x22\x33\x44\x55\x66\x77"
> + "\x88\x99\xaa\xbb\xcc\xdd\xee\xff",
> + 16,
> + "\x8e\xa2\xb7\xca\x51\x67\x45\xbf"
> + "\xea\xfc\x49\x90\x4b\x49\x60\x89",
> + },
> + {
> + "blowfish",
> + "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87",
> + 8,
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
> + 8,
> + "\xe8\x7a\x24\x4e\x2c\xc8\x5e\x82",
> + },
> + {
> + "blowfish",
> + "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87"
> + "\x78\x69\x5a\x4b\x3c\x2d\x1e\x0f",
> + 16,
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
> + 8,
> + "\x93\x14\x28\x87\xee\x3b\xe1\x5c",
> + },
> + {
> + "blowfish",
> + "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87"
> + "\x78\x69\x5a\x4b\x3c\x2d\x1e\x0f"
> + "\x00\x11\x22\x33\x44",
> + 21,
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
> + 8,
> + "\xe6\xf5\x1e\xd7\x9b\x9d\xb2\x1f",
> + },
> + {
> + "blowfish",
> + "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87"
> + "\x78\x69\x5a\x4b\x3c\x2d\x1e\x0f"
> + "\x00\x11\x22\x33\x44\x55\x66\x77"
> + "\x04\x68\x91\x04\xc2\xfd\x3b\x2f"
> + "\x58\x40\x23\x64\x1a\xba\x61\x76"
> + "\x1f\x1f\x1f\x1f\x0e\x0e\x0e\x0e"
> + "\xff\xff\xff\xff\xff\xff\xff\xff",
> + 56,
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
> + 8,
> + "\xc0\x45\x04\x01\x2e\x4e\x1f\x53",
> + },
> + {
> + "cast5",
> + "\x01\x23\x45\x67\x12\x34\x56\x78"
> + "\x23\x45\x67\x89\x34\x56\x78\x9a",
> + 16,
> + "\x01\x23\x45\x67\x89\xab\xcd\xef",
> + 8,
> + "\x23\x8b\x4f\xe5\x84\x7e\x44\xb2",
> + },
> + {
> + "cast5",
> + "\x01\x23\x45\x67\x12\x34\x56\x78"
> + "\x23\x45\x00\x00\x00\x00\x00\x00",
> + 16,
> + "\x01\x23\x45\x67\x89\xab\xcd\xef",
> + 8,
> + "\x75\x3d\xe2\x9f\x5d\x16\x7d\x03",
> + },
> + {
> + "camellia128",
> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
> + 16,
> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
> + 16,
> + "\x67\x67\x31\x38\x54\x96\x69\x73"
> + "\x08\x57\x06\x56\x48\xea\xbe\x43",
> + },
> + {
> + "camellia192",
> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10"
> + "\x00\x11\x22\x33\x44\x55\x66\x77",
> + 24,
> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
> + 16,
> + "\xb4\x99\x34\x01\xb3\xe9\x96\xf8"
> + "\x4e\xe5\xce\xe7\xd7\x9b\x09\xb9",
> + },
> + {
> + "camellia256",
> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10"
> + "\x00\x11\x22\x33\x44\x55\x66\x77"
> + "\x88\x99\xaa\xbb\xcc\xdd\xee\xff",
> + 32,
> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
> + 16,
> + "\x9a\xcc\x23\x7d\xff\x16\xd7\x6c"
> + "\x20\xef\x7c\x91\x9e\x3a\x75\x09",
> + },
> +};
> +
> +static void
> +ecb_test (void)
> +{
> + grub_size_t i;
> +
> + for (i = 0; i < ARRAY_SIZE (vectors); i++)
> + {
> + gcry_err_code_t err;
> + unsigned char *plaintext, *ciphertext;
> + int rc;
> +
> + const gcry_cipher_spec_t *cipher = grub_crypto_lookup_cipher_by_name (vectors[i].cipher);
> + grub_test_assert (cipher != NULL, "cipher lookup failed for vector %ld (cipher: %s)", i+1,
> + vectors[i].cipher);
> + if (cipher == NULL)
> + return;
> +
> + grub_crypto_cipher_handle_t handle = grub_crypto_cipher_open (cipher);
> + grub_test_assert (handle != NULL, "cipher handle opening failed for vector %ld (cipher: %s)",
> + i+1, vectors[i].cipher);
> + if (handle == NULL)
> + return;
> +
> + err = grub_crypto_cipher_set_key (handle, (grub_uint8_t *)vectors[i].key, vectors[i].keylen);
> + grub_test_assert (err == GPG_ERR_NO_ERROR,
> + "setting key of length %d failed for vector %ld (cipher: %s)",
> + vectors[i].keylen, i+1, vectors[i].cipher);
> + if (err != GPG_ERR_NO_ERROR)
> + {
> + grub_crypto_cipher_close(handle);
> + return;
> + }
> +
> + /* Test Encryption */
> + ciphertext = grub_zalloc (vectors[i].plen);
> + grub_test_assert (ciphertext != NULL,
> + "ciphertext buffer allocation failed for vector %ld (cipher: %s)", i+1,
> + vectors[i].cipher);
> + if (ciphertext == NULL)
> + {
> + grub_crypto_cipher_close(handle);
> + return;
> + }
> +
> + err = grub_crypto_ecb_encrypt (handle, ciphertext, vectors[i].ptext, vectors[i].plen);
> + grub_test_assert (err == GPG_ERR_NO_ERROR,
> + "ecb encryption failed for vector %ld (cipher: %s)", i+1,
> + vectors[i].cipher);
> + if (err != GPG_ERR_NO_ERROR)
> + {
> + grub_crypto_cipher_close(handle);
> + grub_free(ciphertext);
> + return;
> + }
> +
> + rc = grub_memcmp (ciphertext, vectors[i].ctext, vectors[i].plen);
> + grub_test_assert (rc == 0, "ciphertext mismatch after encryption for vector %ld (cipher: %s)",
> + i+1, vectors[i].cipher);
> +
> + grub_free(ciphertext);
> +
> + /* Test Decryption */
> + plaintext = grub_zalloc (vectors[i].plen);
> + grub_test_assert (plaintext != NULL,
> + "plaintext buffer allocation failed for vector %ld (cipher: %s)", i+1,
> + vectors[i].cipher);
> + if (plaintext == NULL)
> + {
> + grub_crypto_cipher_close(handle);
> + return;
> + }
> +
> + err = grub_crypto_ecb_decrypt (handle, plaintext, vectors[i].ctext, vectors[i].plen);
> + grub_test_assert (err == GPG_ERR_NO_ERROR,
> + "ecb decryption failed for vector %ld (cipher: %s)", i+1,
> + vectors[i].cipher);
> + if (err != GPG_ERR_NO_ERROR)
> + {
> + grub_crypto_cipher_close(handle);
> + grub_free(plaintext);
> + return;
> + }
> +
> + rc = grub_memcmp (plaintext, vectors[i].ptext, vectors[i].plen);
> + grub_test_assert (rc == 0, "plaintext mismatch after decryption for vector %ld (cipher: %s)",
> + i+1, vectors[i].cipher);
> +
> + grub_free(plaintext);
> + grub_crypto_cipher_close(handle);
> + }
> +}
> +
> +/* Register example_test method as a functional test. */
> +GRUB_FUNCTIONAL_TEST (ecb_test, ecb_test);
> diff --git a/grub-core/tests/lib/functional_test.c b/grub-core/tests/lib/functional_test.c
> index 776934e1f..b3cc5f5ce 100644
> --- a/grub-core/tests/lib/functional_test.c
> +++ b/grub-core/tests/lib/functional_test.c
> @@ -82,6 +82,7 @@ grub_functional_all_tests (grub_extcmd_context_t ctxt __attribute__ ((unused)),
> grub_dl_load ("shift_test");
> grub_dl_load ("asn1_test");
> grub_dl_load ("argon2_test");
> + grub_dl_load ("ecb_test");
>
> FOR_LIST_ELEMENTS (test, grub_test_list)
> ok = !grub_test_run (test) && ok;
_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
https://lists.gnu.org/mailman/listinfo/grub-devel
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH] tests: add functional tests for ECB mode using various ciphers
2025-12-01 17:27 ` Glenn Washburn
@ 2025-12-01 20:08 ` Srish Srinivasan
0 siblings, 0 replies; 4+ messages in thread
From: Srish Srinivasan @ 2025-12-01 20:08 UTC (permalink / raw)
To: The development of GNU GRUB, Glenn Washburn
Cc: daniel.kiper, stefanb, sudhakar, sridharm, nayna
Hi Glenn.
Thank you for taking a look.
On 12/1/25 10:57 PM, Glenn Washburn wrote:
> On Wed, 26 Nov 2025 16:39:09 +0530
> Srish Srinivasan <ssrish@linux.ibm.com> wrote:
>
>> Add functional tests covering ECB mode for the following
>> ciphers: des, 3des, aes, blowfish, cast5, and camellia
> Are any of these actually able to be used by GRUB, aside from AES? And
> if so where? My understanding is that from a security standpoint DES
> should never be used, and that's probably true for others in the list.
> Does the quality of the ECB testing decrease by not testing some of
> these algorithms. I haven't looked at the ECB code, but I imagine that
> testing one cipher is sufficient. Am I wrong?
>
> Glenn
For the use-case part, I did observe that GRUB's geli module makes use
of these additional
(non-aes) ciphers while dealing with geli encrypted devices.
Link:
https://github.com/olafhering/grub/blob/master/grub-core/disk/geli.c#L126
geli operates in either the xts or the cbc mode. While cbc works with
all the listed ciphers,
xts (uses the ecb APIs internally) works only with aes. Therefore, for
geli encrypted disks the
ecb helpers are used only with aes.
Yes, testing ecb with just aes seems sufficient. I agree with you.
I will send out v2 with the required changes.
Thank You,
Srish.
>> Signed-off-by: Srish Srinivasan <ssrish@linux.ibm.com>
>> ---
>> docs/grub.texi | 6 +
>> grub-core/Makefile.core.def | 5 +
>> grub-core/tests/ecb_test.c | 283 ++++++++++++++++++++++++++
>> grub-core/tests/lib/functional_test.c | 1 +
>> 4 files changed, 295 insertions(+)
>> create mode 100644 grub-core/tests/ecb_test.c
>>
>> diff --git a/docs/grub.texi b/docs/grub.texi
>> index 7181009b6..f90eb992d 100644
>> --- a/docs/grub.texi
>> +++ b/docs/grub.texi
>> @@ -4092,6 +4092,7 @@ Modules can be loaded via the @command{insmod} (@pxref{insmod}) command.
>> * dm_nv_module::
>> * drivemap_module::
>> * dsa_sexp_test_module::
>> +* ecb_test_module::
>> * echo_module::
>> * efi_gop_module::
>> * efi_uga_module::
>> @@ -4677,6 +4678,11 @@ mappings. @xref{drivemap} for more information.
>> @section dsa_sexp_test
>> This module provides a test of the libgcrypt DSA functionality in GRUB.
>>
>> +@node ecb_test_module
>> +@section ecb_test
>> +This module is intended for performing a functional test of the ecb
>> +mode of operation for various ciphers in GRUB.
>> +
>> @node echo_module
>> @section echo
>> This module provides support for the @command{echo} to display a line of text.
>> diff --git a/grub-core/Makefile.core.def b/grub-core/Makefile.core.def
>> index fa4bc54aa..de0e857eb 100644
>> --- a/grub-core/Makefile.core.def
>> +++ b/grub-core/Makefile.core.def
>> @@ -2272,6 +2272,11 @@ module = {
>> common = tests/argon2_test.c;
>> };
>>
>> +module = {
>> + name = ecb_test;
>> + common = tests/ecb_test.c;
>> +};
>> +
>> module = {
>> name = legacy_password_test;
>> common = tests/legacy_password_test.c;
>> diff --git a/grub-core/tests/ecb_test.c b/grub-core/tests/ecb_test.c
>> new file mode 100644
>> index 000000000..b92e0d619
>> --- /dev/null
>> +++ b/grub-core/tests/ecb_test.c
>> @@ -0,0 +1,283 @@
>> +/*
>> + * GRUB -- GRand Unified Bootloader
>> + * Copyright (C) 2025 Free Software Foundation, Inc.
>> + *
>> + * GRUB is free software: you can redistribute it and/or modify
>> + * it under the terms of the GNU General Public License as published by
>> + * the Free Software Foundation, either version 3 of the License, or
>> + * (at your option) any later version.
>> + *
>> + * GRUB is distributed in the hope that it will be useful,
>> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
>> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
>> + * GNU General Public License for more details.
>> + *
>> + * You should have received a copy of the GNU General Public License
>> + * along with GRUB. If not, see <http://www.gnu.org/licenses/>.
>> + */
>> +
>> +#include <grub/test.h>
>> +#include <grub/dl.h>
>> +#include <grub/misc.h>
>> +#include <grub/crypto.h>
>> +
>> +GRUB_MOD_LICENSE ("GPLv3+");
>> +
>> +static struct
>> +{
>> + const char *cipher;
>> + const char *key;
>> + unsigned int keylen;
>> + const char *ptext;
>> + unsigned int plen;
>> + const char *ctext;
>> +} vectors[] = {
>> + {
>> + "des",
>> + "\x01\x23\x45\x67\x89\xab\xcd\xef",
>> + 8,
>> + "\x01\x23\x45\x67\x89\xab\xcd\xe7"
>> + "\x22\x33\x44\x55\x66\x77\x88\x99"
>> + "\xca\xfe\xba\xbe\xfe\xed\xbe\xef",
>> + 24,
>> + "\xc9\x57\x44\x25\x6a\x5e\xd3\x1d"
>> + "\xf7\x9c\x89\x2a\x33\x8f\x4a\x8b"
>> + "\xb4\x99\x26\xf7\x1f\xe1\xd4\x90",
>> + },
>> + {
>> + "3des",
>> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
>> + "\x55\x55\x55\x55\x55\x55\x55\x55"
>> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
>> + 24,
>> + "\x73\x6f\x6d\x65\x64\x61\x74\x61",
>> + 8,
>> + "\x18\xd7\x48\xe5\x63\x62\x05\x72",
>> + },
>> + {
>> + "aes",
>> + "\x00\x01\x02\x03\x04\x05\x06\x07"
>> + "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f",
>> + 16,
>> + "\x00\x11\x22\x33\x44\x55\x66\x77"
>> + "\x88\x99\xaa\xbb\xcc\xdd\xee\xff",
>> + 16,
>> + "\x69\xc4\xe0\xd8\x6a\x7b\x04\x30"
>> + "\xd8\xcd\xb7\x80\x70\xb4\xc5\x5a",
>> + },
>> + {
>> + "aes",
>> + "\x00\x01\x02\x03\x04\x05\x06\x07"
>> + "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
>> + "\x10\x11\x12\x13\x14\x15\x16\x17",
>> + 24,
>> + "\x00\x11\x22\x33\x44\x55\x66\x77"
>> + "\x88\x99\xaa\xbb\xcc\xdd\xee\xff",
>> + 16,
>> + "\xdd\xa9\x7c\xa4\x86\x4c\xdf\xe0"
>> + "\x6e\xaf\x70\xa0\xec\x0d\x71\x91",
>> + },
>> + {
>> + "aes",
>> + "\x00\x01\x02\x03\x04\x05\x06\x07"
>> + "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
>> + "\x10\x11\x12\x13\x14\x15\x16\x17"
>> + "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f",
>> + 32,
>> + "\x00\x11\x22\x33\x44\x55\x66\x77"
>> + "\x88\x99\xaa\xbb\xcc\xdd\xee\xff",
>> + 16,
>> + "\x8e\xa2\xb7\xca\x51\x67\x45\xbf"
>> + "\xea\xfc\x49\x90\x4b\x49\x60\x89",
>> + },
>> + {
>> + "blowfish",
>> + "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87",
>> + 8,
>> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
>> + 8,
>> + "\xe8\x7a\x24\x4e\x2c\xc8\x5e\x82",
>> + },
>> + {
>> + "blowfish",
>> + "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87"
>> + "\x78\x69\x5a\x4b\x3c\x2d\x1e\x0f",
>> + 16,
>> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
>> + 8,
>> + "\x93\x14\x28\x87\xee\x3b\xe1\x5c",
>> + },
>> + {
>> + "blowfish",
>> + "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87"
>> + "\x78\x69\x5a\x4b\x3c\x2d\x1e\x0f"
>> + "\x00\x11\x22\x33\x44",
>> + 21,
>> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
>> + 8,
>> + "\xe6\xf5\x1e\xd7\x9b\x9d\xb2\x1f",
>> + },
>> + {
>> + "blowfish",
>> + "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87"
>> + "\x78\x69\x5a\x4b\x3c\x2d\x1e\x0f"
>> + "\x00\x11\x22\x33\x44\x55\x66\x77"
>> + "\x04\x68\x91\x04\xc2\xfd\x3b\x2f"
>> + "\x58\x40\x23\x64\x1a\xba\x61\x76"
>> + "\x1f\x1f\x1f\x1f\x0e\x0e\x0e\x0e"
>> + "\xff\xff\xff\xff\xff\xff\xff\xff",
>> + 56,
>> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
>> + 8,
>> + "\xc0\x45\x04\x01\x2e\x4e\x1f\x53",
>> + },
>> + {
>> + "cast5",
>> + "\x01\x23\x45\x67\x12\x34\x56\x78"
>> + "\x23\x45\x67\x89\x34\x56\x78\x9a",
>> + 16,
>> + "\x01\x23\x45\x67\x89\xab\xcd\xef",
>> + 8,
>> + "\x23\x8b\x4f\xe5\x84\x7e\x44\xb2",
>> + },
>> + {
>> + "cast5",
>> + "\x01\x23\x45\x67\x12\x34\x56\x78"
>> + "\x23\x45\x00\x00\x00\x00\x00\x00",
>> + 16,
>> + "\x01\x23\x45\x67\x89\xab\xcd\xef",
>> + 8,
>> + "\x75\x3d\xe2\x9f\x5d\x16\x7d\x03",
>> + },
>> + {
>> + "camellia128",
>> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
>> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
>> + 16,
>> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
>> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
>> + 16,
>> + "\x67\x67\x31\x38\x54\x96\x69\x73"
>> + "\x08\x57\x06\x56\x48\xea\xbe\x43",
>> + },
>> + {
>> + "camellia192",
>> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
>> + "\xfe\xdc\xba\x98\x76\x54\x32\x10"
>> + "\x00\x11\x22\x33\x44\x55\x66\x77",
>> + 24,
>> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
>> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
>> + 16,
>> + "\xb4\x99\x34\x01\xb3\xe9\x96\xf8"
>> + "\x4e\xe5\xce\xe7\xd7\x9b\x09\xb9",
>> + },
>> + {
>> + "camellia256",
>> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
>> + "\xfe\xdc\xba\x98\x76\x54\x32\x10"
>> + "\x00\x11\x22\x33\x44\x55\x66\x77"
>> + "\x88\x99\xaa\xbb\xcc\xdd\xee\xff",
>> + 32,
>> + "\x01\x23\x45\x67\x89\xab\xcd\xef"
>> + "\xfe\xdc\xba\x98\x76\x54\x32\x10",
>> + 16,
>> + "\x9a\xcc\x23\x7d\xff\x16\xd7\x6c"
>> + "\x20\xef\x7c\x91\x9e\x3a\x75\x09",
>> + },
>> +};
>> +
>> +static void
>> +ecb_test (void)
>> +{
>> + grub_size_t i;
>> +
>> + for (i = 0; i < ARRAY_SIZE (vectors); i++)
>> + {
>> + gcry_err_code_t err;
>> + unsigned char *plaintext, *ciphertext;
>> + int rc;
>> +
>> + const gcry_cipher_spec_t *cipher = grub_crypto_lookup_cipher_by_name (vectors[i].cipher);
>> + grub_test_assert (cipher != NULL, "cipher lookup failed for vector %ld (cipher: %s)", i+1,
>> + vectors[i].cipher);
>> + if (cipher == NULL)
>> + return;
>> +
>> + grub_crypto_cipher_handle_t handle = grub_crypto_cipher_open (cipher);
>> + grub_test_assert (handle != NULL, "cipher handle opening failed for vector %ld (cipher: %s)",
>> + i+1, vectors[i].cipher);
>> + if (handle == NULL)
>> + return;
>> +
>> + err = grub_crypto_cipher_set_key (handle, (grub_uint8_t *)vectors[i].key, vectors[i].keylen);
>> + grub_test_assert (err == GPG_ERR_NO_ERROR,
>> + "setting key of length %d failed for vector %ld (cipher: %s)",
>> + vectors[i].keylen, i+1, vectors[i].cipher);
>> + if (err != GPG_ERR_NO_ERROR)
>> + {
>> + grub_crypto_cipher_close(handle);
>> + return;
>> + }
>> +
>> + /* Test Encryption */
>> + ciphertext = grub_zalloc (vectors[i].plen);
>> + grub_test_assert (ciphertext != NULL,
>> + "ciphertext buffer allocation failed for vector %ld (cipher: %s)", i+1,
>> + vectors[i].cipher);
>> + if (ciphertext == NULL)
>> + {
>> + grub_crypto_cipher_close(handle);
>> + return;
>> + }
>> +
>> + err = grub_crypto_ecb_encrypt (handle, ciphertext, vectors[i].ptext, vectors[i].plen);
>> + grub_test_assert (err == GPG_ERR_NO_ERROR,
>> + "ecb encryption failed for vector %ld (cipher: %s)", i+1,
>> + vectors[i].cipher);
>> + if (err != GPG_ERR_NO_ERROR)
>> + {
>> + grub_crypto_cipher_close(handle);
>> + grub_free(ciphertext);
>> + return;
>> + }
>> +
>> + rc = grub_memcmp (ciphertext, vectors[i].ctext, vectors[i].plen);
>> + grub_test_assert (rc == 0, "ciphertext mismatch after encryption for vector %ld (cipher: %s)",
>> + i+1, vectors[i].cipher);
>> +
>> + grub_free(ciphertext);
>> +
>> + /* Test Decryption */
>> + plaintext = grub_zalloc (vectors[i].plen);
>> + grub_test_assert (plaintext != NULL,
>> + "plaintext buffer allocation failed for vector %ld (cipher: %s)", i+1,
>> + vectors[i].cipher);
>> + if (plaintext == NULL)
>> + {
>> + grub_crypto_cipher_close(handle);
>> + return;
>> + }
>> +
>> + err = grub_crypto_ecb_decrypt (handle, plaintext, vectors[i].ctext, vectors[i].plen);
>> + grub_test_assert (err == GPG_ERR_NO_ERROR,
>> + "ecb decryption failed for vector %ld (cipher: %s)", i+1,
>> + vectors[i].cipher);
>> + if (err != GPG_ERR_NO_ERROR)
>> + {
>> + grub_crypto_cipher_close(handle);
>> + grub_free(plaintext);
>> + return;
>> + }
>> +
>> + rc = grub_memcmp (plaintext, vectors[i].ptext, vectors[i].plen);
>> + grub_test_assert (rc == 0, "plaintext mismatch after decryption for vector %ld (cipher: %s)",
>> + i+1, vectors[i].cipher);
>> +
>> + grub_free(plaintext);
>> + grub_crypto_cipher_close(handle);
>> + }
>> +}
>> +
>> +/* Register example_test method as a functional test. */
>> +GRUB_FUNCTIONAL_TEST (ecb_test, ecb_test);
>> diff --git a/grub-core/tests/lib/functional_test.c b/grub-core/tests/lib/functional_test.c
>> index 776934e1f..b3cc5f5ce 100644
>> --- a/grub-core/tests/lib/functional_test.c
>> +++ b/grub-core/tests/lib/functional_test.c
>> @@ -82,6 +82,7 @@ grub_functional_all_tests (grub_extcmd_context_t ctxt __attribute__ ((unused)),
>> grub_dl_load ("shift_test");
>> grub_dl_load ("asn1_test");
>> grub_dl_load ("argon2_test");
>> + grub_dl_load ("ecb_test");
>>
>> FOR_LIST_ELEMENTS (test, grub_test_list)
>> ok = !grub_test_run (test) && ok;
> _______________________________________________
> Grub-devel mailing list
> Grub-devel@gnu.org
> https://lists.gnu.org/mailman/listinfo/grub-devel
_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
https://lists.gnu.org/mailman/listinfo/grub-devel
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2025-12-01 20:09 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-11-26 11:09 [PATCH] tests: add functional tests for ECB mode using various ciphers Srish Srinivasan
2025-11-27 6:00 ` Sudhakar Kuppusamy
2025-12-01 17:27 ` Glenn Washburn
2025-12-01 20:08 ` Srish Srinivasan
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox