| <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta name="viewport" content="width=device-width, initial-scale=1.0"><meta name="generator" content="rustdoc"><meta name="description" content="Source of the Rust file `/root/.cargo/registry/src/github.com-1ecc6299db9ec823/openssl-0.10.54/src/symm.rs`."><meta name="keywords" content="rust, rustlang, rust-lang"><title>symm.rs - source</title><link rel="preload" as="font" type="font/woff2" crossorigin href="../../SourceSerif4-Regular.ttf.woff2"><link rel="preload" as="font" type="font/woff2" crossorigin href="../../FiraSans-Regular.woff2"><link rel="preload" as="font" type="font/woff2" crossorigin href="../../FiraSans-Medium.woff2"><link rel="preload" as="font" type="font/woff2" crossorigin href="../../SourceCodePro-Regular.ttf.woff2"><link rel="preload" as="font" type="font/woff2" crossorigin href="../../SourceSerif4-Bold.ttf.woff2"><link rel="preload" as="font" type="font/woff2" crossorigin href="../../SourceCodePro-Semibold.ttf.woff2"><link rel="stylesheet" href="../../normalize.css"><link rel="stylesheet" href="../../rustdoc.css" id="mainThemeStyle"><link rel="stylesheet" href="../../ayu.css" disabled><link rel="stylesheet" href="../../dark.css" disabled><link rel="stylesheet" href="../../light.css" id="themeStyle"><script id="default-settings" ></script><script src="../../storage.js"></script><script defer src="../../source-script.js"></script><script defer src="../../source-files.js"></script><script defer src="../../main.js"></script><noscript><link rel="stylesheet" href="../../noscript.css"></noscript><link rel="alternate icon" type="image/png" href="../../favicon-16x16.png"><link rel="alternate icon" type="image/png" href="../../favicon-32x32.png"><link rel="icon" type="image/svg+xml" href="../../favicon.svg"></head><body class="rustdoc source"><!--[if lte IE 11]><div class="warning">This old browser is unsupported and will most likely display funky things.</div><![endif]--><nav class="sidebar"><a class="sidebar-logo" href="../../openssl/index.html"><div class="logo-container"><img class="rust-logo" src="../../rust-logo.svg" alt="logo"></div></a></nav><main><div class="width-limiter"><nav class="sub"><a class="sub-logo-container" href="../../openssl/index.html"><img class="rust-logo" src="../../rust-logo.svg" alt="logo"></a><form class="search-form"><div class="search-container"><span></span><input class="search-input" name="search" autocomplete="off" spellcheck="false" placeholder="Click or press ‘S’ to search, ‘?’ for more options…" type="search"><div id="help-button" title="help" tabindex="-1"><a href="../../help.html">?</a></div><div id="settings-menu" tabindex="-1"><a href="../../settings.html" title="settings"><img width="22" height="22" alt="Change settings" src="../../wheel.svg"></a></div></div></form></nav><section id="main-content" class="content"><div class="example-wrap"><pre class="src-line-numbers"><span id="1">1</span> |
| <span id="2">2</span> |
| <span id="3">3</span> |
| <span id="4">4</span> |
| <span id="5">5</span> |
| <span id="6">6</span> |
| <span id="7">7</span> |
| <span id="8">8</span> |
| <span id="9">9</span> |
| <span id="10">10</span> |
| <span id="11">11</span> |
| <span id="12">12</span> |
| <span id="13">13</span> |
| <span id="14">14</span> |
| <span id="15">15</span> |
| <span id="16">16</span> |
| <span id="17">17</span> |
| <span id="18">18</span> |
| <span id="19">19</span> |
| <span id="20">20</span> |
| <span id="21">21</span> |
| <span id="22">22</span> |
| <span id="23">23</span> |
| <span id="24">24</span> |
| <span id="25">25</span> |
| <span id="26">26</span> |
| <span id="27">27</span> |
| <span id="28">28</span> |
| <span id="29">29</span> |
| <span id="30">30</span> |
| <span id="31">31</span> |
| <span id="32">32</span> |
| <span id="33">33</span> |
| <span id="34">34</span> |
| <span id="35">35</span> |
| <span id="36">36</span> |
| <span id="37">37</span> |
| <span id="38">38</span> |
| <span id="39">39</span> |
| <span id="40">40</span> |
| <span id="41">41</span> |
| <span id="42">42</span> |
| <span id="43">43</span> |
| <span id="44">44</span> |
| <span id="45">45</span> |
| <span id="46">46</span> |
| <span id="47">47</span> |
| <span id="48">48</span> |
| <span id="49">49</span> |
| <span id="50">50</span> |
| <span id="51">51</span> |
| <span id="52">52</span> |
| <span id="53">53</span> |
| <span id="54">54</span> |
| <span id="55">55</span> |
| <span id="56">56</span> |
| <span id="57">57</span> |
| <span id="58">58</span> |
| <span id="59">59</span> |
| <span id="60">60</span> |
| <span id="61">61</span> |
| <span id="62">62</span> |
| <span id="63">63</span> |
| <span id="64">64</span> |
| <span id="65">65</span> |
| <span id="66">66</span> |
| <span id="67">67</span> |
| <span id="68">68</span> |
| <span id="69">69</span> |
| <span id="70">70</span> |
| <span id="71">71</span> |
| <span id="72">72</span> |
| <span id="73">73</span> |
| <span id="74">74</span> |
| <span id="75">75</span> |
| <span id="76">76</span> |
| <span id="77">77</span> |
| <span id="78">78</span> |
| <span id="79">79</span> |
| <span id="80">80</span> |
| <span id="81">81</span> |
| <span id="82">82</span> |
| <span id="83">83</span> |
| <span id="84">84</span> |
| <span id="85">85</span> |
| <span id="86">86</span> |
| <span id="87">87</span> |
| <span id="88">88</span> |
| <span id="89">89</span> |
| <span id="90">90</span> |
| <span id="91">91</span> |
| <span id="92">92</span> |
| <span id="93">93</span> |
| <span id="94">94</span> |
| <span id="95">95</span> |
| <span id="96">96</span> |
| <span id="97">97</span> |
| <span id="98">98</span> |
| <span id="99">99</span> |
| <span id="100">100</span> |
| <span id="101">101</span> |
| <span id="102">102</span> |
| <span id="103">103</span> |
| <span id="104">104</span> |
| <span id="105">105</span> |
| <span id="106">106</span> |
| <span id="107">107</span> |
| <span id="108">108</span> |
| <span id="109">109</span> |
| <span id="110">110</span> |
| <span id="111">111</span> |
| <span id="112">112</span> |
| <span id="113">113</span> |
| <span id="114">114</span> |
| <span id="115">115</span> |
| <span id="116">116</span> |
| <span id="117">117</span> |
| <span id="118">118</span> |
| <span id="119">119</span> |
| <span id="120">120</span> |
| <span id="121">121</span> |
| <span id="122">122</span> |
| <span id="123">123</span> |
| <span id="124">124</span> |
| <span id="125">125</span> |
| <span id="126">126</span> |
| <span id="127">127</span> |
| <span id="128">128</span> |
| <span id="129">129</span> |
| <span id="130">130</span> |
| <span id="131">131</span> |
| <span id="132">132</span> |
| <span id="133">133</span> |
| <span id="134">134</span> |
| <span id="135">135</span> |
| <span id="136">136</span> |
| <span id="137">137</span> |
| <span id="138">138</span> |
| <span id="139">139</span> |
| <span id="140">140</span> |
| <span id="141">141</span> |
| <span id="142">142</span> |
| <span id="143">143</span> |
| <span id="144">144</span> |
| <span id="145">145</span> |
| <span id="146">146</span> |
| <span id="147">147</span> |
| <span id="148">148</span> |
| <span id="149">149</span> |
| <span id="150">150</span> |
| <span id="151">151</span> |
| <span id="152">152</span> |
| <span id="153">153</span> |
| <span id="154">154</span> |
| <span id="155">155</span> |
| <span id="156">156</span> |
| <span id="157">157</span> |
| <span id="158">158</span> |
| <span id="159">159</span> |
| <span id="160">160</span> |
| <span id="161">161</span> |
| <span id="162">162</span> |
| <span id="163">163</span> |
| <span id="164">164</span> |
| <span id="165">165</span> |
| <span id="166">166</span> |
| <span id="167">167</span> |
| <span id="168">168</span> |
| <span id="169">169</span> |
| <span id="170">170</span> |
| <span id="171">171</span> |
| <span id="172">172</span> |
| <span id="173">173</span> |
| <span id="174">174</span> |
| <span id="175">175</span> |
| <span id="176">176</span> |
| <span id="177">177</span> |
| <span id="178">178</span> |
| <span id="179">179</span> |
| <span id="180">180</span> |
| <span id="181">181</span> |
| <span id="182">182</span> |
| <span id="183">183</span> |
| <span id="184">184</span> |
| <span id="185">185</span> |
| <span id="186">186</span> |
| <span id="187">187</span> |
| <span id="188">188</span> |
| <span id="189">189</span> |
| <span id="190">190</span> |
| <span id="191">191</span> |
| <span id="192">192</span> |
| <span id="193">193</span> |
| <span id="194">194</span> |
| <span id="195">195</span> |
| <span id="196">196</span> |
| <span id="197">197</span> |
| <span id="198">198</span> |
| <span id="199">199</span> |
| <span id="200">200</span> |
| <span id="201">201</span> |
| <span id="202">202</span> |
| <span id="203">203</span> |
| <span id="204">204</span> |
| <span id="205">205</span> |
| <span id="206">206</span> |
| <span id="207">207</span> |
| <span id="208">208</span> |
| <span id="209">209</span> |
| <span id="210">210</span> |
| <span id="211">211</span> |
| <span id="212">212</span> |
| <span id="213">213</span> |
| <span id="214">214</span> |
| <span id="215">215</span> |
| <span id="216">216</span> |
| <span id="217">217</span> |
| <span id="218">218</span> |
| <span id="219">219</span> |
| <span id="220">220</span> |
| <span id="221">221</span> |
| <span id="222">222</span> |
| <span id="223">223</span> |
| <span id="224">224</span> |
| <span id="225">225</span> |
| <span id="226">226</span> |
| <span id="227">227</span> |
| <span id="228">228</span> |
| <span id="229">229</span> |
| <span id="230">230</span> |
| <span id="231">231</span> |
| <span id="232">232</span> |
| <span id="233">233</span> |
| <span id="234">234</span> |
| <span id="235">235</span> |
| <span id="236">236</span> |
| <span id="237">237</span> |
| <span id="238">238</span> |
| <span id="239">239</span> |
| <span id="240">240</span> |
| <span id="241">241</span> |
| <span id="242">242</span> |
| <span id="243">243</span> |
| <span id="244">244</span> |
| <span id="245">245</span> |
| <span id="246">246</span> |
| <span id="247">247</span> |
| <span id="248">248</span> |
| <span id="249">249</span> |
| <span id="250">250</span> |
| <span id="251">251</span> |
| <span id="252">252</span> |
| <span id="253">253</span> |
| <span id="254">254</span> |
| <span id="255">255</span> |
| <span id="256">256</span> |
| <span id="257">257</span> |
| <span id="258">258</span> |
| <span id="259">259</span> |
| <span id="260">260</span> |
| <span id="261">261</span> |
| <span id="262">262</span> |
| <span id="263">263</span> |
| <span id="264">264</span> |
| <span id="265">265</span> |
| <span id="266">266</span> |
| <span id="267">267</span> |
| <span id="268">268</span> |
| <span id="269">269</span> |
| <span id="270">270</span> |
| <span id="271">271</span> |
| <span id="272">272</span> |
| <span id="273">273</span> |
| <span id="274">274</span> |
| <span id="275">275</span> |
| <span id="276">276</span> |
| <span id="277">277</span> |
| <span id="278">278</span> |
| <span id="279">279</span> |
| <span id="280">280</span> |
| <span id="281">281</span> |
| <span id="282">282</span> |
| <span id="283">283</span> |
| <span id="284">284</span> |
| <span id="285">285</span> |
| <span id="286">286</span> |
| <span id="287">287</span> |
| <span id="288">288</span> |
| <span id="289">289</span> |
| <span id="290">290</span> |
| <span id="291">291</span> |
| <span id="292">292</span> |
| <span id="293">293</span> |
| <span id="294">294</span> |
| <span id="295">295</span> |
| <span id="296">296</span> |
| <span id="297">297</span> |
| <span id="298">298</span> |
| <span id="299">299</span> |
| <span id="300">300</span> |
| <span id="301">301</span> |
| <span id="302">302</span> |
| <span id="303">303</span> |
| <span id="304">304</span> |
| <span id="305">305</span> |
| <span id="306">306</span> |
| <span id="307">307</span> |
| <span id="308">308</span> |
| <span id="309">309</span> |
| <span id="310">310</span> |
| <span id="311">311</span> |
| <span id="312">312</span> |
| <span id="313">313</span> |
| <span id="314">314</span> |
| <span id="315">315</span> |
| <span id="316">316</span> |
| <span id="317">317</span> |
| <span id="318">318</span> |
| <span id="319">319</span> |
| <span id="320">320</span> |
| <span id="321">321</span> |
| <span id="322">322</span> |
| <span id="323">323</span> |
| <span id="324">324</span> |
| <span id="325">325</span> |
| <span id="326">326</span> |
| <span id="327">327</span> |
| <span id="328">328</span> |
| <span id="329">329</span> |
| <span id="330">330</span> |
| <span id="331">331</span> |
| <span id="332">332</span> |
| <span id="333">333</span> |
| <span id="334">334</span> |
| <span id="335">335</span> |
| <span id="336">336</span> |
| <span id="337">337</span> |
| <span id="338">338</span> |
| <span id="339">339</span> |
| <span id="340">340</span> |
| <span id="341">341</span> |
| <span id="342">342</span> |
| <span id="343">343</span> |
| <span id="344">344</span> |
| <span id="345">345</span> |
| <span id="346">346</span> |
| <span id="347">347</span> |
| <span id="348">348</span> |
| <span id="349">349</span> |
| <span id="350">350</span> |
| <span id="351">351</span> |
| <span id="352">352</span> |
| <span id="353">353</span> |
| <span id="354">354</span> |
| <span id="355">355</span> |
| <span id="356">356</span> |
| <span id="357">357</span> |
| <span id="358">358</span> |
| <span id="359">359</span> |
| <span id="360">360</span> |
| <span id="361">361</span> |
| <span id="362">362</span> |
| <span id="363">363</span> |
| <span id="364">364</span> |
| <span id="365">365</span> |
| <span id="366">366</span> |
| <span id="367">367</span> |
| <span id="368">368</span> |
| <span id="369">369</span> |
| <span id="370">370</span> |
| <span id="371">371</span> |
| <span id="372">372</span> |
| <span id="373">373</span> |
| <span id="374">374</span> |
| <span id="375">375</span> |
| <span id="376">376</span> |
| <span id="377">377</span> |
| <span id="378">378</span> |
| <span id="379">379</span> |
| <span id="380">380</span> |
| <span id="381">381</span> |
| <span id="382">382</span> |
| <span id="383">383</span> |
| <span id="384">384</span> |
| <span id="385">385</span> |
| <span id="386">386</span> |
| <span id="387">387</span> |
| <span id="388">388</span> |
| <span id="389">389</span> |
| <span id="390">390</span> |
| <span id="391">391</span> |
| <span id="392">392</span> |
| <span id="393">393</span> |
| <span id="394">394</span> |
| <span id="395">395</span> |
| <span id="396">396</span> |
| <span id="397">397</span> |
| <span id="398">398</span> |
| <span id="399">399</span> |
| <span id="400">400</span> |
| <span id="401">401</span> |
| <span id="402">402</span> |
| <span id="403">403</span> |
| <span id="404">404</span> |
| <span id="405">405</span> |
| <span id="406">406</span> |
| <span id="407">407</span> |
| <span id="408">408</span> |
| <span id="409">409</span> |
| <span id="410">410</span> |
| <span id="411">411</span> |
| <span id="412">412</span> |
| <span id="413">413</span> |
| <span id="414">414</span> |
| <span id="415">415</span> |
| <span id="416">416</span> |
| <span id="417">417</span> |
| <span id="418">418</span> |
| <span id="419">419</span> |
| <span id="420">420</span> |
| <span id="421">421</span> |
| <span id="422">422</span> |
| <span id="423">423</span> |
| <span id="424">424</span> |
| <span id="425">425</span> |
| <span id="426">426</span> |
| <span id="427">427</span> |
| <span id="428">428</span> |
| <span id="429">429</span> |
| <span id="430">430</span> |
| <span id="431">431</span> |
| <span id="432">432</span> |
| <span id="433">433</span> |
| <span id="434">434</span> |
| <span id="435">435</span> |
| <span id="436">436</span> |
| <span id="437">437</span> |
| <span id="438">438</span> |
| <span id="439">439</span> |
| <span id="440">440</span> |
| <span id="441">441</span> |
| <span id="442">442</span> |
| <span id="443">443</span> |
| <span id="444">444</span> |
| <span id="445">445</span> |
| <span id="446">446</span> |
| <span id="447">447</span> |
| <span id="448">448</span> |
| <span id="449">449</span> |
| <span id="450">450</span> |
| <span id="451">451</span> |
| <span id="452">452</span> |
| <span id="453">453</span> |
| <span id="454">454</span> |
| <span id="455">455</span> |
| <span id="456">456</span> |
| <span id="457">457</span> |
| <span id="458">458</span> |
| <span id="459">459</span> |
| <span id="460">460</span> |
| <span id="461">461</span> |
| <span id="462">462</span> |
| <span id="463">463</span> |
| <span id="464">464</span> |
| <span id="465">465</span> |
| <span id="466">466</span> |
| <span id="467">467</span> |
| <span id="468">468</span> |
| <span id="469">469</span> |
| <span id="470">470</span> |
| <span id="471">471</span> |
| <span id="472">472</span> |
| <span id="473">473</span> |
| <span id="474">474</span> |
| <span id="475">475</span> |
| <span id="476">476</span> |
| <span id="477">477</span> |
| <span id="478">478</span> |
| <span id="479">479</span> |
| <span id="480">480</span> |
| <span id="481">481</span> |
| <span id="482">482</span> |
| <span id="483">483</span> |
| <span id="484">484</span> |
| <span id="485">485</span> |
| <span id="486">486</span> |
| <span id="487">487</span> |
| <span id="488">488</span> |
| <span id="489">489</span> |
| <span id="490">490</span> |
| <span id="491">491</span> |
| <span id="492">492</span> |
| <span id="493">493</span> |
| <span id="494">494</span> |
| <span id="495">495</span> |
| <span id="496">496</span> |
| <span id="497">497</span> |
| <span id="498">498</span> |
| <span id="499">499</span> |
| <span id="500">500</span> |
| <span id="501">501</span> |
| <span id="502">502</span> |
| <span id="503">503</span> |
| <span id="504">504</span> |
| <span id="505">505</span> |
| <span id="506">506</span> |
| <span id="507">507</span> |
| <span id="508">508</span> |
| <span id="509">509</span> |
| <span id="510">510</span> |
| <span id="511">511</span> |
| <span id="512">512</span> |
| <span id="513">513</span> |
| <span id="514">514</span> |
| <span id="515">515</span> |
| <span id="516">516</span> |
| <span id="517">517</span> |
| <span id="518">518</span> |
| <span id="519">519</span> |
| <span id="520">520</span> |
| <span id="521">521</span> |
| <span id="522">522</span> |
| <span id="523">523</span> |
| <span id="524">524</span> |
| <span id="525">525</span> |
| <span id="526">526</span> |
| <span id="527">527</span> |
| <span id="528">528</span> |
| <span id="529">529</span> |
| <span id="530">530</span> |
| <span id="531">531</span> |
| <span id="532">532</span> |
| <span id="533">533</span> |
| <span id="534">534</span> |
| <span id="535">535</span> |
| <span id="536">536</span> |
| <span id="537">537</span> |
| <span id="538">538</span> |
| <span id="539">539</span> |
| <span id="540">540</span> |
| <span id="541">541</span> |
| <span id="542">542</span> |
| <span id="543">543</span> |
| <span id="544">544</span> |
| <span id="545">545</span> |
| <span id="546">546</span> |
| <span id="547">547</span> |
| <span id="548">548</span> |
| <span id="549">549</span> |
| <span id="550">550</span> |
| <span id="551">551</span> |
| <span id="552">552</span> |
| <span id="553">553</span> |
| <span id="554">554</span> |
| <span id="555">555</span> |
| <span id="556">556</span> |
| <span id="557">557</span> |
| <span id="558">558</span> |
| <span id="559">559</span> |
| <span id="560">560</span> |
| <span id="561">561</span> |
| <span id="562">562</span> |
| <span id="563">563</span> |
| <span id="564">564</span> |
| <span id="565">565</span> |
| <span id="566">566</span> |
| <span id="567">567</span> |
| <span id="568">568</span> |
| <span id="569">569</span> |
| <span id="570">570</span> |
| <span id="571">571</span> |
| <span id="572">572</span> |
| <span id="573">573</span> |
| <span id="574">574</span> |
| <span id="575">575</span> |
| <span id="576">576</span> |
| <span id="577">577</span> |
| <span id="578">578</span> |
| <span id="579">579</span> |
| <span id="580">580</span> |
| <span id="581">581</span> |
| <span id="582">582</span> |
| <span id="583">583</span> |
| <span id="584">584</span> |
| <span id="585">585</span> |
| <span id="586">586</span> |
| <span id="587">587</span> |
| <span id="588">588</span> |
| <span id="589">589</span> |
| <span id="590">590</span> |
| <span id="591">591</span> |
| <span id="592">592</span> |
| <span id="593">593</span> |
| <span id="594">594</span> |
| <span id="595">595</span> |
| <span id="596">596</span> |
| <span id="597">597</span> |
| <span id="598">598</span> |
| <span id="599">599</span> |
| <span id="600">600</span> |
| <span id="601">601</span> |
| <span id="602">602</span> |
| <span id="603">603</span> |
| <span id="604">604</span> |
| <span id="605">605</span> |
| <span id="606">606</span> |
| <span id="607">607</span> |
| <span id="608">608</span> |
| <span id="609">609</span> |
| <span id="610">610</span> |
| <span id="611">611</span> |
| <span id="612">612</span> |
| <span id="613">613</span> |
| <span id="614">614</span> |
| <span id="615">615</span> |
| <span id="616">616</span> |
| <span id="617">617</span> |
| <span id="618">618</span> |
| <span id="619">619</span> |
| <span id="620">620</span> |
| <span id="621">621</span> |
| <span id="622">622</span> |
| <span id="623">623</span> |
| <span id="624">624</span> |
| <span id="625">625</span> |
| <span id="626">626</span> |
| <span id="627">627</span> |
| <span id="628">628</span> |
| <span id="629">629</span> |
| <span id="630">630</span> |
| <span id="631">631</span> |
| <span id="632">632</span> |
| <span id="633">633</span> |
| <span id="634">634</span> |
| <span id="635">635</span> |
| <span id="636">636</span> |
| <span id="637">637</span> |
| <span id="638">638</span> |
| <span id="639">639</span> |
| <span id="640">640</span> |
| <span id="641">641</span> |
| <span id="642">642</span> |
| <span id="643">643</span> |
| <span id="644">644</span> |
| <span id="645">645</span> |
| <span id="646">646</span> |
| <span id="647">647</span> |
| <span id="648">648</span> |
| <span id="649">649</span> |
| <span id="650">650</span> |
| <span id="651">651</span> |
| <span id="652">652</span> |
| <span id="653">653</span> |
| <span id="654">654</span> |
| <span id="655">655</span> |
| <span id="656">656</span> |
| <span id="657">657</span> |
| <span id="658">658</span> |
| <span id="659">659</span> |
| <span id="660">660</span> |
| <span id="661">661</span> |
| <span id="662">662</span> |
| <span id="663">663</span> |
| <span id="664">664</span> |
| <span id="665">665</span> |
| <span id="666">666</span> |
| <span id="667">667</span> |
| <span id="668">668</span> |
| <span id="669">669</span> |
| <span id="670">670</span> |
| <span id="671">671</span> |
| <span id="672">672</span> |
| <span id="673">673</span> |
| <span id="674">674</span> |
| <span id="675">675</span> |
| <span id="676">676</span> |
| <span id="677">677</span> |
| <span id="678">678</span> |
| <span id="679">679</span> |
| <span id="680">680</span> |
| <span id="681">681</span> |
| <span id="682">682</span> |
| <span id="683">683</span> |
| <span id="684">684</span> |
| <span id="685">685</span> |
| <span id="686">686</span> |
| <span id="687">687</span> |
| <span id="688">688</span> |
| <span id="689">689</span> |
| <span id="690">690</span> |
| <span id="691">691</span> |
| <span id="692">692</span> |
| <span id="693">693</span> |
| <span id="694">694</span> |
| <span id="695">695</span> |
| <span id="696">696</span> |
| <span id="697">697</span> |
| <span id="698">698</span> |
| <span id="699">699</span> |
| <span id="700">700</span> |
| <span id="701">701</span> |
| <span id="702">702</span> |
| <span id="703">703</span> |
| <span id="704">704</span> |
| <span id="705">705</span> |
| <span id="706">706</span> |
| <span id="707">707</span> |
| <span id="708">708</span> |
| <span id="709">709</span> |
| <span id="710">710</span> |
| <span id="711">711</span> |
| <span id="712">712</span> |
| <span id="713">713</span> |
| <span id="714">714</span> |
| <span id="715">715</span> |
| <span id="716">716</span> |
| <span id="717">717</span> |
| <span id="718">718</span> |
| <span id="719">719</span> |
| <span id="720">720</span> |
| <span id="721">721</span> |
| <span id="722">722</span> |
| <span id="723">723</span> |
| <span id="724">724</span> |
| <span id="725">725</span> |
| <span id="726">726</span> |
| <span id="727">727</span> |
| <span id="728">728</span> |
| <span id="729">729</span> |
| <span id="730">730</span> |
| <span id="731">731</span> |
| <span id="732">732</span> |
| <span id="733">733</span> |
| <span id="734">734</span> |
| <span id="735">735</span> |
| <span id="736">736</span> |
| <span id="737">737</span> |
| <span id="738">738</span> |
| <span id="739">739</span> |
| <span id="740">740</span> |
| <span id="741">741</span> |
| <span id="742">742</span> |
| <span id="743">743</span> |
| <span id="744">744</span> |
| <span id="745">745</span> |
| <span id="746">746</span> |
| <span id="747">747</span> |
| <span id="748">748</span> |
| <span id="749">749</span> |
| <span id="750">750</span> |
| <span id="751">751</span> |
| <span id="752">752</span> |
| <span id="753">753</span> |
| <span id="754">754</span> |
| <span id="755">755</span> |
| <span id="756">756</span> |
| <span id="757">757</span> |
| <span id="758">758</span> |
| <span id="759">759</span> |
| <span id="760">760</span> |
| <span id="761">761</span> |
| <span id="762">762</span> |
| <span id="763">763</span> |
| <span id="764">764</span> |
| <span id="765">765</span> |
| <span id="766">766</span> |
| <span id="767">767</span> |
| <span id="768">768</span> |
| <span id="769">769</span> |
| <span id="770">770</span> |
| <span id="771">771</span> |
| <span id="772">772</span> |
| <span id="773">773</span> |
| <span id="774">774</span> |
| <span id="775">775</span> |
| <span id="776">776</span> |
| <span id="777">777</span> |
| <span id="778">778</span> |
| <span id="779">779</span> |
| <span id="780">780</span> |
| <span id="781">781</span> |
| <span id="782">782</span> |
| <span id="783">783</span> |
| <span id="784">784</span> |
| <span id="785">785</span> |
| <span id="786">786</span> |
| <span id="787">787</span> |
| <span id="788">788</span> |
| <span id="789">789</span> |
| <span id="790">790</span> |
| <span id="791">791</span> |
| <span id="792">792</span> |
| <span id="793">793</span> |
| <span id="794">794</span> |
| <span id="795">795</span> |
| <span id="796">796</span> |
| <span id="797">797</span> |
| <span id="798">798</span> |
| <span id="799">799</span> |
| <span id="800">800</span> |
| <span id="801">801</span> |
| <span id="802">802</span> |
| <span id="803">803</span> |
| <span id="804">804</span> |
| <span id="805">805</span> |
| <span id="806">806</span> |
| <span id="807">807</span> |
| <span id="808">808</span> |
| <span id="809">809</span> |
| <span id="810">810</span> |
| <span id="811">811</span> |
| <span id="812">812</span> |
| <span id="813">813</span> |
| <span id="814">814</span> |
| <span id="815">815</span> |
| <span id="816">816</span> |
| <span id="817">817</span> |
| <span id="818">818</span> |
| <span id="819">819</span> |
| <span id="820">820</span> |
| <span id="821">821</span> |
| <span id="822">822</span> |
| <span id="823">823</span> |
| <span id="824">824</span> |
| <span id="825">825</span> |
| <span id="826">826</span> |
| <span id="827">827</span> |
| <span id="828">828</span> |
| <span id="829">829</span> |
| <span id="830">830</span> |
| <span id="831">831</span> |
| <span id="832">832</span> |
| <span id="833">833</span> |
| <span id="834">834</span> |
| <span id="835">835</span> |
| <span id="836">836</span> |
| <span id="837">837</span> |
| <span id="838">838</span> |
| <span id="839">839</span> |
| <span id="840">840</span> |
| <span id="841">841</span> |
| <span id="842">842</span> |
| <span id="843">843</span> |
| <span id="844">844</span> |
| <span id="845">845</span> |
| <span id="846">846</span> |
| <span id="847">847</span> |
| <span id="848">848</span> |
| <span id="849">849</span> |
| <span id="850">850</span> |
| <span id="851">851</span> |
| <span id="852">852</span> |
| <span id="853">853</span> |
| <span id="854">854</span> |
| <span id="855">855</span> |
| <span id="856">856</span> |
| <span id="857">857</span> |
| <span id="858">858</span> |
| <span id="859">859</span> |
| <span id="860">860</span> |
| <span id="861">861</span> |
| <span id="862">862</span> |
| <span id="863">863</span> |
| <span id="864">864</span> |
| <span id="865">865</span> |
| <span id="866">866</span> |
| <span id="867">867</span> |
| <span id="868">868</span> |
| <span id="869">869</span> |
| <span id="870">870</span> |
| <span id="871">871</span> |
| <span id="872">872</span> |
| <span id="873">873</span> |
| <span id="874">874</span> |
| <span id="875">875</span> |
| <span id="876">876</span> |
| <span id="877">877</span> |
| <span id="878">878</span> |
| <span id="879">879</span> |
| <span id="880">880</span> |
| <span id="881">881</span> |
| <span id="882">882</span> |
| <span id="883">883</span> |
| <span id="884">884</span> |
| <span id="885">885</span> |
| <span id="886">886</span> |
| <span id="887">887</span> |
| <span id="888">888</span> |
| <span id="889">889</span> |
| <span id="890">890</span> |
| <span id="891">891</span> |
| <span id="892">892</span> |
| <span id="893">893</span> |
| <span id="894">894</span> |
| <span id="895">895</span> |
| <span id="896">896</span> |
| <span id="897">897</span> |
| <span id="898">898</span> |
| <span id="899">899</span> |
| <span id="900">900</span> |
| <span id="901">901</span> |
| <span id="902">902</span> |
| <span id="903">903</span> |
| <span id="904">904</span> |
| <span id="905">905</span> |
| <span id="906">906</span> |
| <span id="907">907</span> |
| <span id="908">908</span> |
| <span id="909">909</span> |
| <span id="910">910</span> |
| <span id="911">911</span> |
| <span id="912">912</span> |
| <span id="913">913</span> |
| <span id="914">914</span> |
| <span id="915">915</span> |
| <span id="916">916</span> |
| <span id="917">917</span> |
| <span id="918">918</span> |
| <span id="919">919</span> |
| <span id="920">920</span> |
| <span id="921">921</span> |
| <span id="922">922</span> |
| <span id="923">923</span> |
| <span id="924">924</span> |
| <span id="925">925</span> |
| <span id="926">926</span> |
| <span id="927">927</span> |
| <span id="928">928</span> |
| <span id="929">929</span> |
| <span id="930">930</span> |
| <span id="931">931</span> |
| <span id="932">932</span> |
| <span id="933">933</span> |
| <span id="934">934</span> |
| <span id="935">935</span> |
| <span id="936">936</span> |
| <span id="937">937</span> |
| <span id="938">938</span> |
| <span id="939">939</span> |
| <span id="940">940</span> |
| <span id="941">941</span> |
| <span id="942">942</span> |
| <span id="943">943</span> |
| <span id="944">944</span> |
| <span id="945">945</span> |
| <span id="946">946</span> |
| <span id="947">947</span> |
| <span id="948">948</span> |
| <span id="949">949</span> |
| <span id="950">950</span> |
| <span id="951">951</span> |
| <span id="952">952</span> |
| <span id="953">953</span> |
| <span id="954">954</span> |
| <span id="955">955</span> |
| <span id="956">956</span> |
| <span id="957">957</span> |
| <span id="958">958</span> |
| <span id="959">959</span> |
| <span id="960">960</span> |
| <span id="961">961</span> |
| <span id="962">962</span> |
| <span id="963">963</span> |
| <span id="964">964</span> |
| <span id="965">965</span> |
| <span id="966">966</span> |
| <span id="967">967</span> |
| <span id="968">968</span> |
| <span id="969">969</span> |
| <span id="970">970</span> |
| <span id="971">971</span> |
| <span id="972">972</span> |
| <span id="973">973</span> |
| <span id="974">974</span> |
| <span id="975">975</span> |
| <span id="976">976</span> |
| <span id="977">977</span> |
| <span id="978">978</span> |
| <span id="979">979</span> |
| <span id="980">980</span> |
| <span id="981">981</span> |
| <span id="982">982</span> |
| <span id="983">983</span> |
| <span id="984">984</span> |
| <span id="985">985</span> |
| <span id="986">986</span> |
| <span id="987">987</span> |
| <span id="988">988</span> |
| <span id="989">989</span> |
| <span id="990">990</span> |
| <span id="991">991</span> |
| <span id="992">992</span> |
| <span id="993">993</span> |
| <span id="994">994</span> |
| <span id="995">995</span> |
| <span id="996">996</span> |
| <span id="997">997</span> |
| <span id="998">998</span> |
| <span id="999">999</span> |
| <span id="1000">1000</span> |
| <span id="1001">1001</span> |
| <span id="1002">1002</span> |
| <span id="1003">1003</span> |
| <span id="1004">1004</span> |
| <span id="1005">1005</span> |
| <span id="1006">1006</span> |
| <span id="1007">1007</span> |
| <span id="1008">1008</span> |
| <span id="1009">1009</span> |
| <span id="1010">1010</span> |
| <span id="1011">1011</span> |
| <span id="1012">1012</span> |
| <span id="1013">1013</span> |
| <span id="1014">1014</span> |
| <span id="1015">1015</span> |
| <span id="1016">1016</span> |
| <span id="1017">1017</span> |
| <span id="1018">1018</span> |
| <span id="1019">1019</span> |
| <span id="1020">1020</span> |
| <span id="1021">1021</span> |
| <span id="1022">1022</span> |
| <span id="1023">1023</span> |
| <span id="1024">1024</span> |
| <span id="1025">1025</span> |
| <span id="1026">1026</span> |
| <span id="1027">1027</span> |
| <span id="1028">1028</span> |
| <span id="1029">1029</span> |
| <span id="1030">1030</span> |
| <span id="1031">1031</span> |
| <span id="1032">1032</span> |
| <span id="1033">1033</span> |
| <span id="1034">1034</span> |
| <span id="1035">1035</span> |
| <span id="1036">1036</span> |
| <span id="1037">1037</span> |
| <span id="1038">1038</span> |
| <span id="1039">1039</span> |
| <span id="1040">1040</span> |
| <span id="1041">1041</span> |
| <span id="1042">1042</span> |
| <span id="1043">1043</span> |
| <span id="1044">1044</span> |
| <span id="1045">1045</span> |
| <span id="1046">1046</span> |
| <span id="1047">1047</span> |
| <span id="1048">1048</span> |
| <span id="1049">1049</span> |
| <span id="1050">1050</span> |
| <span id="1051">1051</span> |
| <span id="1052">1052</span> |
| <span id="1053">1053</span> |
| <span id="1054">1054</span> |
| <span id="1055">1055</span> |
| <span id="1056">1056</span> |
| <span id="1057">1057</span> |
| <span id="1058">1058</span> |
| <span id="1059">1059</span> |
| <span id="1060">1060</span> |
| <span id="1061">1061</span> |
| <span id="1062">1062</span> |
| <span id="1063">1063</span> |
| <span id="1064">1064</span> |
| <span id="1065">1065</span> |
| <span id="1066">1066</span> |
| <span id="1067">1067</span> |
| <span id="1068">1068</span> |
| <span id="1069">1069</span> |
| <span id="1070">1070</span> |
| <span id="1071">1071</span> |
| <span id="1072">1072</span> |
| <span id="1073">1073</span> |
| <span id="1074">1074</span> |
| <span id="1075">1075</span> |
| <span id="1076">1076</span> |
| <span id="1077">1077</span> |
| <span id="1078">1078</span> |
| <span id="1079">1079</span> |
| <span id="1080">1080</span> |
| <span id="1081">1081</span> |
| <span id="1082">1082</span> |
| <span id="1083">1083</span> |
| <span id="1084">1084</span> |
| <span id="1085">1085</span> |
| <span id="1086">1086</span> |
| <span id="1087">1087</span> |
| <span id="1088">1088</span> |
| <span id="1089">1089</span> |
| <span id="1090">1090</span> |
| <span id="1091">1091</span> |
| <span id="1092">1092</span> |
| <span id="1093">1093</span> |
| <span id="1094">1094</span> |
| <span id="1095">1095</span> |
| <span id="1096">1096</span> |
| <span id="1097">1097</span> |
| <span id="1098">1098</span> |
| <span id="1099">1099</span> |
| <span id="1100">1100</span> |
| <span id="1101">1101</span> |
| <span id="1102">1102</span> |
| <span id="1103">1103</span> |
| <span id="1104">1104</span> |
| <span id="1105">1105</span> |
| <span id="1106">1106</span> |
| <span id="1107">1107</span> |
| <span id="1108">1108</span> |
| <span id="1109">1109</span> |
| <span id="1110">1110</span> |
| <span id="1111">1111</span> |
| <span id="1112">1112</span> |
| <span id="1113">1113</span> |
| <span id="1114">1114</span> |
| <span id="1115">1115</span> |
| <span id="1116">1116</span> |
| <span id="1117">1117</span> |
| <span id="1118">1118</span> |
| <span id="1119">1119</span> |
| <span id="1120">1120</span> |
| <span id="1121">1121</span> |
| <span id="1122">1122</span> |
| <span id="1123">1123</span> |
| <span id="1124">1124</span> |
| <span id="1125">1125</span> |
| <span id="1126">1126</span> |
| <span id="1127">1127</span> |
| <span id="1128">1128</span> |
| <span id="1129">1129</span> |
| <span id="1130">1130</span> |
| <span id="1131">1131</span> |
| <span id="1132">1132</span> |
| <span id="1133">1133</span> |
| <span id="1134">1134</span> |
| <span id="1135">1135</span> |
| <span id="1136">1136</span> |
| <span id="1137">1137</span> |
| <span id="1138">1138</span> |
| <span id="1139">1139</span> |
| <span id="1140">1140</span> |
| <span id="1141">1141</span> |
| <span id="1142">1142</span> |
| <span id="1143">1143</span> |
| <span id="1144">1144</span> |
| <span id="1145">1145</span> |
| <span id="1146">1146</span> |
| <span id="1147">1147</span> |
| <span id="1148">1148</span> |
| <span id="1149">1149</span> |
| <span id="1150">1150</span> |
| <span id="1151">1151</span> |
| <span id="1152">1152</span> |
| <span id="1153">1153</span> |
| <span id="1154">1154</span> |
| <span id="1155">1155</span> |
| <span id="1156">1156</span> |
| <span id="1157">1157</span> |
| <span id="1158">1158</span> |
| <span id="1159">1159</span> |
| <span id="1160">1160</span> |
| <span id="1161">1161</span> |
| <span id="1162">1162</span> |
| <span id="1163">1163</span> |
| <span id="1164">1164</span> |
| <span id="1165">1165</span> |
| <span id="1166">1166</span> |
| <span id="1167">1167</span> |
| <span id="1168">1168</span> |
| <span id="1169">1169</span> |
| <span id="1170">1170</span> |
| <span id="1171">1171</span> |
| <span id="1172">1172</span> |
| <span id="1173">1173</span> |
| <span id="1174">1174</span> |
| <span id="1175">1175</span> |
| <span id="1176">1176</span> |
| <span id="1177">1177</span> |
| <span id="1178">1178</span> |
| <span id="1179">1179</span> |
| <span id="1180">1180</span> |
| <span id="1181">1181</span> |
| <span id="1182">1182</span> |
| <span id="1183">1183</span> |
| <span id="1184">1184</span> |
| <span id="1185">1185</span> |
| <span id="1186">1186</span> |
| <span id="1187">1187</span> |
| <span id="1188">1188</span> |
| <span id="1189">1189</span> |
| <span id="1190">1190</span> |
| <span id="1191">1191</span> |
| <span id="1192">1192</span> |
| <span id="1193">1193</span> |
| <span id="1194">1194</span> |
| <span id="1195">1195</span> |
| <span id="1196">1196</span> |
| <span id="1197">1197</span> |
| <span id="1198">1198</span> |
| <span id="1199">1199</span> |
| <span id="1200">1200</span> |
| <span id="1201">1201</span> |
| <span id="1202">1202</span> |
| <span id="1203">1203</span> |
| <span id="1204">1204</span> |
| <span id="1205">1205</span> |
| <span id="1206">1206</span> |
| <span id="1207">1207</span> |
| <span id="1208">1208</span> |
| <span id="1209">1209</span> |
| <span id="1210">1210</span> |
| <span id="1211">1211</span> |
| <span id="1212">1212</span> |
| <span id="1213">1213</span> |
| <span id="1214">1214</span> |
| <span id="1215">1215</span> |
| <span id="1216">1216</span> |
| <span id="1217">1217</span> |
| <span id="1218">1218</span> |
| <span id="1219">1219</span> |
| <span id="1220">1220</span> |
| <span id="1221">1221</span> |
| <span id="1222">1222</span> |
| <span id="1223">1223</span> |
| <span id="1224">1224</span> |
| <span id="1225">1225</span> |
| <span id="1226">1226</span> |
| <span id="1227">1227</span> |
| <span id="1228">1228</span> |
| <span id="1229">1229</span> |
| <span id="1230">1230</span> |
| <span id="1231">1231</span> |
| <span id="1232">1232</span> |
| <span id="1233">1233</span> |
| <span id="1234">1234</span> |
| <span id="1235">1235</span> |
| <span id="1236">1236</span> |
| <span id="1237">1237</span> |
| <span id="1238">1238</span> |
| <span id="1239">1239</span> |
| <span id="1240">1240</span> |
| <span id="1241">1241</span> |
| <span id="1242">1242</span> |
| <span id="1243">1243</span> |
| <span id="1244">1244</span> |
| <span id="1245">1245</span> |
| <span id="1246">1246</span> |
| <span id="1247">1247</span> |
| <span id="1248">1248</span> |
| <span id="1249">1249</span> |
| <span id="1250">1250</span> |
| <span id="1251">1251</span> |
| <span id="1252">1252</span> |
| <span id="1253">1253</span> |
| <span id="1254">1254</span> |
| <span id="1255">1255</span> |
| <span id="1256">1256</span> |
| <span id="1257">1257</span> |
| <span id="1258">1258</span> |
| <span id="1259">1259</span> |
| <span id="1260">1260</span> |
| <span id="1261">1261</span> |
| <span id="1262">1262</span> |
| <span id="1263">1263</span> |
| <span id="1264">1264</span> |
| <span id="1265">1265</span> |
| <span id="1266">1266</span> |
| <span id="1267">1267</span> |
| <span id="1268">1268</span> |
| <span id="1269">1269</span> |
| <span id="1270">1270</span> |
| <span id="1271">1271</span> |
| <span id="1272">1272</span> |
| <span id="1273">1273</span> |
| <span id="1274">1274</span> |
| <span id="1275">1275</span> |
| <span id="1276">1276</span> |
| <span id="1277">1277</span> |
| <span id="1278">1278</span> |
| <span id="1279">1279</span> |
| <span id="1280">1280</span> |
| <span id="1281">1281</span> |
| <span id="1282">1282</span> |
| <span id="1283">1283</span> |
| <span id="1284">1284</span> |
| <span id="1285">1285</span> |
| <span id="1286">1286</span> |
| <span id="1287">1287</span> |
| <span id="1288">1288</span> |
| <span id="1289">1289</span> |
| <span id="1290">1290</span> |
| <span id="1291">1291</span> |
| <span id="1292">1292</span> |
| <span id="1293">1293</span> |
| <span id="1294">1294</span> |
| <span id="1295">1295</span> |
| <span id="1296">1296</span> |
| <span id="1297">1297</span> |
| <span id="1298">1298</span> |
| <span id="1299">1299</span> |
| <span id="1300">1300</span> |
| <span id="1301">1301</span> |
| <span id="1302">1302</span> |
| <span id="1303">1303</span> |
| <span id="1304">1304</span> |
| <span id="1305">1305</span> |
| <span id="1306">1306</span> |
| <span id="1307">1307</span> |
| <span id="1308">1308</span> |
| <span id="1309">1309</span> |
| <span id="1310">1310</span> |
| <span id="1311">1311</span> |
| <span id="1312">1312</span> |
| <span id="1313">1313</span> |
| <span id="1314">1314</span> |
| <span id="1315">1315</span> |
| <span id="1316">1316</span> |
| <span id="1317">1317</span> |
| <span id="1318">1318</span> |
| <span id="1319">1319</span> |
| <span id="1320">1320</span> |
| <span id="1321">1321</span> |
| <span id="1322">1322</span> |
| <span id="1323">1323</span> |
| <span id="1324">1324</span> |
| <span id="1325">1325</span> |
| <span id="1326">1326</span> |
| <span id="1327">1327</span> |
| <span id="1328">1328</span> |
| <span id="1329">1329</span> |
| <span id="1330">1330</span> |
| <span id="1331">1331</span> |
| <span id="1332">1332</span> |
| <span id="1333">1333</span> |
| <span id="1334">1334</span> |
| <span id="1335">1335</span> |
| <span id="1336">1336</span> |
| <span id="1337">1337</span> |
| <span id="1338">1338</span> |
| <span id="1339">1339</span> |
| <span id="1340">1340</span> |
| <span id="1341">1341</span> |
| <span id="1342">1342</span> |
| <span id="1343">1343</span> |
| <span id="1344">1344</span> |
| <span id="1345">1345</span> |
| <span id="1346">1346</span> |
| <span id="1347">1347</span> |
| <span id="1348">1348</span> |
| <span id="1349">1349</span> |
| <span id="1350">1350</span> |
| <span id="1351">1351</span> |
| <span id="1352">1352</span> |
| <span id="1353">1353</span> |
| <span id="1354">1354</span> |
| <span id="1355">1355</span> |
| <span id="1356">1356</span> |
| <span id="1357">1357</span> |
| <span id="1358">1358</span> |
| <span id="1359">1359</span> |
| <span id="1360">1360</span> |
| <span id="1361">1361</span> |
| <span id="1362">1362</span> |
| <span id="1363">1363</span> |
| <span id="1364">1364</span> |
| <span id="1365">1365</span> |
| <span id="1366">1366</span> |
| <span id="1367">1367</span> |
| <span id="1368">1368</span> |
| <span id="1369">1369</span> |
| <span id="1370">1370</span> |
| <span id="1371">1371</span> |
| <span id="1372">1372</span> |
| <span id="1373">1373</span> |
| <span id="1374">1374</span> |
| <span id="1375">1375</span> |
| <span id="1376">1376</span> |
| <span id="1377">1377</span> |
| <span id="1378">1378</span> |
| <span id="1379">1379</span> |
| <span id="1380">1380</span> |
| <span id="1381">1381</span> |
| <span id="1382">1382</span> |
| <span id="1383">1383</span> |
| <span id="1384">1384</span> |
| <span id="1385">1385</span> |
| <span id="1386">1386</span> |
| <span id="1387">1387</span> |
| <span id="1388">1388</span> |
| <span id="1389">1389</span> |
| <span id="1390">1390</span> |
| <span id="1391">1391</span> |
| <span id="1392">1392</span> |
| <span id="1393">1393</span> |
| <span id="1394">1394</span> |
| <span id="1395">1395</span> |
| <span id="1396">1396</span> |
| <span id="1397">1397</span> |
| <span id="1398">1398</span> |
| <span id="1399">1399</span> |
| <span id="1400">1400</span> |
| <span id="1401">1401</span> |
| <span id="1402">1402</span> |
| <span id="1403">1403</span> |
| <span id="1404">1404</span> |
| <span id="1405">1405</span> |
| <span id="1406">1406</span> |
| <span id="1407">1407</span> |
| <span id="1408">1408</span> |
| <span id="1409">1409</span> |
| <span id="1410">1410</span> |
| <span id="1411">1411</span> |
| <span id="1412">1412</span> |
| <span id="1413">1413</span> |
| <span id="1414">1414</span> |
| <span id="1415">1415</span> |
| <span id="1416">1416</span> |
| <span id="1417">1417</span> |
| <span id="1418">1418</span> |
| <span id="1419">1419</span> |
| <span id="1420">1420</span> |
| <span id="1421">1421</span> |
| <span id="1422">1422</span> |
| <span id="1423">1423</span> |
| <span id="1424">1424</span> |
| <span id="1425">1425</span> |
| <span id="1426">1426</span> |
| <span id="1427">1427</span> |
| <span id="1428">1428</span> |
| <span id="1429">1429</span> |
| <span id="1430">1430</span> |
| <span id="1431">1431</span> |
| <span id="1432">1432</span> |
| <span id="1433">1433</span> |
| <span id="1434">1434</span> |
| <span id="1435">1435</span> |
| <span id="1436">1436</span> |
| <span id="1437">1437</span> |
| <span id="1438">1438</span> |
| <span id="1439">1439</span> |
| <span id="1440">1440</span> |
| <span id="1441">1441</span> |
| <span id="1442">1442</span> |
| <span id="1443">1443</span> |
| <span id="1444">1444</span> |
| <span id="1445">1445</span> |
| <span id="1446">1446</span> |
| <span id="1447">1447</span> |
| <span id="1448">1448</span> |
| <span id="1449">1449</span> |
| <span id="1450">1450</span> |
| <span id="1451">1451</span> |
| <span id="1452">1452</span> |
| <span id="1453">1453</span> |
| <span id="1454">1454</span> |
| <span id="1455">1455</span> |
| <span id="1456">1456</span> |
| <span id="1457">1457</span> |
| <span id="1458">1458</span> |
| <span id="1459">1459</span> |
| <span id="1460">1460</span> |
| <span id="1461">1461</span> |
| <span id="1462">1462</span> |
| <span id="1463">1463</span> |
| <span id="1464">1464</span> |
| <span id="1465">1465</span> |
| <span id="1466">1466</span> |
| <span id="1467">1467</span> |
| <span id="1468">1468</span> |
| <span id="1469">1469</span> |
| <span id="1470">1470</span> |
| <span id="1471">1471</span> |
| <span id="1472">1472</span> |
| <span id="1473">1473</span> |
| <span id="1474">1474</span> |
| <span id="1475">1475</span> |
| <span id="1476">1476</span> |
| <span id="1477">1477</span> |
| <span id="1478">1478</span> |
| <span id="1479">1479</span> |
| <span id="1480">1480</span> |
| <span id="1481">1481</span> |
| <span id="1482">1482</span> |
| <span id="1483">1483</span> |
| <span id="1484">1484</span> |
| <span id="1485">1485</span> |
| <span id="1486">1486</span> |
| <span id="1487">1487</span> |
| <span id="1488">1488</span> |
| <span id="1489">1489</span> |
| <span id="1490">1490</span> |
| <span id="1491">1491</span> |
| <span id="1492">1492</span> |
| <span id="1493">1493</span> |
| <span id="1494">1494</span> |
| <span id="1495">1495</span> |
| <span id="1496">1496</span> |
| <span id="1497">1497</span> |
| <span id="1498">1498</span> |
| <span id="1499">1499</span> |
| <span id="1500">1500</span> |
| <span id="1501">1501</span> |
| <span id="1502">1502</span> |
| <span id="1503">1503</span> |
| <span id="1504">1504</span> |
| <span id="1505">1505</span> |
| <span id="1506">1506</span> |
| <span id="1507">1507</span> |
| <span id="1508">1508</span> |
| <span id="1509">1509</span> |
| <span id="1510">1510</span> |
| <span id="1511">1511</span> |
| <span id="1512">1512</span> |
| <span id="1513">1513</span> |
| <span id="1514">1514</span> |
| <span id="1515">1515</span> |
| <span id="1516">1516</span> |
| <span id="1517">1517</span> |
| <span id="1518">1518</span> |
| <span id="1519">1519</span> |
| <span id="1520">1520</span> |
| <span id="1521">1521</span> |
| <span id="1522">1522</span> |
| <span id="1523">1523</span> |
| <span id="1524">1524</span> |
| <span id="1525">1525</span> |
| <span id="1526">1526</span> |
| <span id="1527">1527</span> |
| <span id="1528">1528</span> |
| <span id="1529">1529</span> |
| <span id="1530">1530</span> |
| <span id="1531">1531</span> |
| <span id="1532">1532</span> |
| <span id="1533">1533</span> |
| <span id="1534">1534</span> |
| <span id="1535">1535</span> |
| <span id="1536">1536</span> |
| <span id="1537">1537</span> |
| <span id="1538">1538</span> |
| <span id="1539">1539</span> |
| <span id="1540">1540</span> |
| <span id="1541">1541</span> |
| <span id="1542">1542</span> |
| <span id="1543">1543</span> |
| <span id="1544">1544</span> |
| <span id="1545">1545</span> |
| <span id="1546">1546</span> |
| <span id="1547">1547</span> |
| <span id="1548">1548</span> |
| <span id="1549">1549</span> |
| <span id="1550">1550</span> |
| <span id="1551">1551</span> |
| <span id="1552">1552</span> |
| <span id="1553">1553</span> |
| <span id="1554">1554</span> |
| <span id="1555">1555</span> |
| <span id="1556">1556</span> |
| <span id="1557">1557</span> |
| <span id="1558">1558</span> |
| <span id="1559">1559</span> |
| <span id="1560">1560</span> |
| <span id="1561">1561</span> |
| <span id="1562">1562</span> |
| <span id="1563">1563</span> |
| <span id="1564">1564</span> |
| <span id="1565">1565</span> |
| <span id="1566">1566</span> |
| <span id="1567">1567</span> |
| <span id="1568">1568</span> |
| <span id="1569">1569</span> |
| <span id="1570">1570</span> |
| <span id="1571">1571</span> |
| <span id="1572">1572</span> |
| <span id="1573">1573</span> |
| <span id="1574">1574</span> |
| <span id="1575">1575</span> |
| <span id="1576">1576</span> |
| <span id="1577">1577</span> |
| <span id="1578">1578</span> |
| <span id="1579">1579</span> |
| <span id="1580">1580</span> |
| <span id="1581">1581</span> |
| <span id="1582">1582</span> |
| <span id="1583">1583</span> |
| <span id="1584">1584</span> |
| <span id="1585">1585</span> |
| <span id="1586">1586</span> |
| <span id="1587">1587</span> |
| <span id="1588">1588</span> |
| <span id="1589">1589</span> |
| <span id="1590">1590</span> |
| <span id="1591">1591</span> |
| <span id="1592">1592</span> |
| <span id="1593">1593</span> |
| <span id="1594">1594</span> |
| <span id="1595">1595</span> |
| <span id="1596">1596</span> |
| <span id="1597">1597</span> |
| <span id="1598">1598</span> |
| <span id="1599">1599</span> |
| <span id="1600">1600</span> |
| <span id="1601">1601</span> |
| <span id="1602">1602</span> |
| <span id="1603">1603</span> |
| <span id="1604">1604</span> |
| <span id="1605">1605</span> |
| <span id="1606">1606</span> |
| <span id="1607">1607</span> |
| <span id="1608">1608</span> |
| <span id="1609">1609</span> |
| <span id="1610">1610</span> |
| <span id="1611">1611</span> |
| <span id="1612">1612</span> |
| <span id="1613">1613</span> |
| <span id="1614">1614</span> |
| <span id="1615">1615</span> |
| <span id="1616">1616</span> |
| <span id="1617">1617</span> |
| <span id="1618">1618</span> |
| <span id="1619">1619</span> |
| <span id="1620">1620</span> |
| <span id="1621">1621</span> |
| <span id="1622">1622</span> |
| <span id="1623">1623</span> |
| <span id="1624">1624</span> |
| <span id="1625">1625</span> |
| <span id="1626">1626</span> |
| <span id="1627">1627</span> |
| <span id="1628">1628</span> |
| <span id="1629">1629</span> |
| <span id="1630">1630</span> |
| <span id="1631">1631</span> |
| <span id="1632">1632</span> |
| <span id="1633">1633</span> |
| </pre><pre class="rust"><code><span class="doccomment">//! High level interface to certain symmetric ciphers. |
| //! |
| //! # Examples |
| //! |
| //! Encrypt data in AES128 CBC mode |
| //! |
| //! ``` |
| //! use openssl::symm::{encrypt, Cipher}; |
| //! |
| //! let cipher = Cipher::aes_128_cbc(); |
| //! let data = b"Some Crypto Text"; |
| //! let key = b"\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F"; |
| //! let iv = b"\x00\x01\x02\x03\x04\x05\x06\x07\x00\x01\x02\x03\x04\x05\x06\x07"; |
| //! let ciphertext = encrypt( |
| //! cipher, |
| //! key, |
| //! Some(iv), |
| //! data).unwrap(); |
| //! |
| //! assert_eq!( |
| //! b"\xB4\xB9\xE7\x30\xD6\xD6\xF7\xDE\x77\x3F\x1C\xFF\xB3\x3E\x44\x5A\x91\xD7\x27\x62\x87\x4D\ |
| //! \xFB\x3C\x5E\xC4\x59\x72\x4A\xF4\x7C\xA1", |
| //! &ciphertext[..]); |
| //! ``` |
| //! |
| //! Encrypting an asymmetric key with a symmetric cipher |
| //! |
| //! ``` |
| //! use openssl::rsa::{Padding, Rsa}; |
| //! use openssl::symm::Cipher; |
| //! |
| //! // Generate keypair and encrypt private key: |
| //! let keypair = Rsa::generate(2048).unwrap(); |
| //! let cipher = Cipher::aes_256_cbc(); |
| //! let pubkey_pem = keypair.public_key_to_pem_pkcs1().unwrap(); |
| //! let privkey_pem = keypair.private_key_to_pem_passphrase(cipher, b"Rust").unwrap(); |
| //! // pubkey_pem and privkey_pem could be written to file here. |
| //! |
| //! // Load private and public key from string: |
| //! let pubkey = Rsa::public_key_from_pem_pkcs1(&pubkey_pem).unwrap(); |
| //! let privkey = Rsa::private_key_from_pem_passphrase(&privkey_pem, b"Rust").unwrap(); |
| //! |
| //! // Use the asymmetric keys to encrypt and decrypt a short message: |
| //! let msg = b"Foo bar"; |
| //! let mut encrypted = vec![0; pubkey.size() as usize]; |
| //! let mut decrypted = vec![0; privkey.size() as usize]; |
| //! let len = pubkey.public_encrypt(msg, &mut encrypted, Padding::PKCS1).unwrap(); |
| //! assert!(len > msg.len()); |
| //! let len = privkey.private_decrypt(&encrypted, &mut decrypted, Padding::PKCS1).unwrap(); |
| //! let output_string = String::from_utf8(decrypted[..len].to_vec()).unwrap(); |
| //! assert_eq!("Foo bar", output_string); |
| //! println!("Decrypted: '{}'", output_string); |
| //! ``` |
| </span><span class="kw">use </span><span class="kw">crate</span>::cipher::CipherRef; |
| <span class="kw">use </span><span class="kw">crate</span>::cipher_ctx::{CipherCtx, CipherCtxRef}; |
| <span class="kw">use </span><span class="kw">crate</span>::error::ErrorStack; |
| <span class="kw">use </span><span class="kw">crate</span>::nid::Nid; |
| <span class="kw">use </span>cfg_if::cfg_if; |
| <span class="kw">use </span>foreign_types::ForeignTypeRef; |
| |
| <span class="attribute">#[derive(Copy, Clone)] |
| </span><span class="kw">pub enum </span>Mode { |
| Encrypt, |
| Decrypt, |
| } |
| |
| <span class="doccomment">/// Represents a particular cipher algorithm. |
| /// |
| /// See OpenSSL doc at [`EVP_EncryptInit`] for more information on each algorithms. |
| /// |
| /// [`EVP_EncryptInit`]: https://www.openssl.org/docs/manmaster/crypto/EVP_EncryptInit.html |
| </span><span class="attribute">#[derive(Copy, Clone, PartialEq, Eq)] |
| </span><span class="kw">pub struct </span>Cipher(<span class="kw-2">*const </span>ffi::EVP_CIPHER); |
| |
| <span class="kw">impl </span>Cipher { |
| <span class="doccomment">/// Looks up the cipher for a certain nid. |
| /// |
| /// This corresponds to [`EVP_get_cipherbynid`] |
| /// |
| /// [`EVP_get_cipherbynid`]: https://www.openssl.org/docs/manmaster/crypto/EVP_get_cipherbyname.html |
| </span><span class="kw">pub fn </span>from_nid(nid: Nid) -> <span class="prelude-ty">Option</span><Cipher> { |
| <span class="kw">let </span>ptr = <span class="kw">unsafe </span>{ ffi::EVP_get_cipherbyname(ffi::OBJ_nid2sn(nid.as_raw())) }; |
| <span class="kw">if </span>ptr.is_null() { |
| <span class="prelude-val">None |
| </span>} <span class="kw">else </span>{ |
| <span class="prelude-val">Some</span>(Cipher(ptr)) |
| } |
| } |
| |
| <span class="doccomment">/// Returns the cipher's Nid. |
| /// |
| /// This corresponds to [`EVP_CIPHER_nid`] |
| /// |
| /// [`EVP_CIPHER_nid`]: https://www.openssl.org/docs/manmaster/crypto/EVP_CIPHER_nid.html |
| </span><span class="kw">pub fn </span>nid(<span class="kw-2">&</span><span class="self">self</span>) -> Nid { |
| <span class="kw">let </span>nid = <span class="kw">unsafe </span>{ ffi::EVP_CIPHER_nid(<span class="self">self</span>.<span class="number">0</span>) }; |
| Nid::from_raw(nid) |
| } |
| |
| <span class="kw">pub fn </span>aes_128_ecb() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_128_ecb()) } |
| } |
| |
| <span class="kw">pub fn </span>aes_128_cbc() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_128_cbc()) } |
| } |
| |
| <span class="attribute">#[cfg(not(boringssl))] |
| </span><span class="kw">pub fn </span>aes_128_xts() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_128_xts()) } |
| } |
| |
| <span class="kw">pub fn </span>aes_128_ctr() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_128_ctr()) } |
| } |
| |
| <span class="attribute">#[cfg(not(boringssl))] |
| </span><span class="kw">pub fn </span>aes_128_cfb1() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_128_cfb1()) } |
| } |
| |
| <span class="kw">pub fn </span>aes_128_cfb128() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_128_cfb128()) } |
| } |
| |
| <span class="attribute">#[cfg(not(boringssl))] |
| </span><span class="kw">pub fn </span>aes_128_cfb8() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_128_cfb8()) } |
| } |
| |
| <span class="kw">pub fn </span>aes_128_gcm() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_128_gcm()) } |
| } |
| |
| <span class="attribute">#[cfg(not(boringssl))] |
| </span><span class="kw">pub fn </span>aes_128_ccm() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_128_ccm()) } |
| } |
| |
| <span class="kw">pub fn </span>aes_128_ofb() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_128_ofb()) } |
| } |
| |
| <span class="doccomment">/// Requires OpenSSL 1.1.0 or newer. |
| </span><span class="attribute">#[cfg(ossl110)] |
| </span><span class="kw">pub fn </span>aes_128_ocb() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_128_ocb()) } |
| } |
| |
| <span class="kw">pub fn </span>aes_192_ecb() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_192_ecb()) } |
| } |
| |
| <span class="kw">pub fn </span>aes_192_cbc() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_192_cbc()) } |
| } |
| |
| <span class="kw">pub fn </span>aes_192_ctr() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_192_ctr()) } |
| } |
| |
| <span class="attribute">#[cfg(not(boringssl))] |
| </span><span class="kw">pub fn </span>aes_192_cfb1() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_192_cfb1()) } |
| } |
| |
| <span class="kw">pub fn </span>aes_192_cfb128() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_192_cfb128()) } |
| } |
| |
| <span class="attribute">#[cfg(not(boringssl))] |
| </span><span class="kw">pub fn </span>aes_192_cfb8() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_192_cfb8()) } |
| } |
| |
| <span class="kw">pub fn </span>aes_192_gcm() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_192_gcm()) } |
| } |
| |
| <span class="attribute">#[cfg(not(boringssl))] |
| </span><span class="kw">pub fn </span>aes_192_ccm() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_192_ccm()) } |
| } |
| |
| <span class="kw">pub fn </span>aes_192_ofb() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_192_ofb()) } |
| } |
| |
| <span class="doccomment">/// Requires OpenSSL 1.1.0 or newer. |
| </span><span class="attribute">#[cfg(ossl110)] |
| </span><span class="kw">pub fn </span>aes_192_ocb() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_192_ocb()) } |
| } |
| |
| <span class="kw">pub fn </span>aes_256_ecb() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_256_ecb()) } |
| } |
| |
| <span class="kw">pub fn </span>aes_256_cbc() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_256_cbc()) } |
| } |
| |
| <span class="attribute">#[cfg(not(boringssl))] |
| </span><span class="kw">pub fn </span>aes_256_xts() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_256_xts()) } |
| } |
| |
| <span class="kw">pub fn </span>aes_256_ctr() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_256_ctr()) } |
| } |
| |
| <span class="attribute">#[cfg(not(boringssl))] |
| </span><span class="kw">pub fn </span>aes_256_cfb1() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_256_cfb1()) } |
| } |
| |
| <span class="kw">pub fn </span>aes_256_cfb128() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_256_cfb128()) } |
| } |
| |
| <span class="attribute">#[cfg(not(boringssl))] |
| </span><span class="kw">pub fn </span>aes_256_cfb8() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_256_cfb8()) } |
| } |
| |
| <span class="kw">pub fn </span>aes_256_gcm() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_256_gcm()) } |
| } |
| |
| <span class="attribute">#[cfg(not(boringssl))] |
| </span><span class="kw">pub fn </span>aes_256_ccm() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_256_ccm()) } |
| } |
| |
| <span class="kw">pub fn </span>aes_256_ofb() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_256_ofb()) } |
| } |
| |
| <span class="doccomment">/// Requires OpenSSL 1.1.0 or newer. |
| </span><span class="attribute">#[cfg(ossl110)] |
| </span><span class="kw">pub fn </span>aes_256_ocb() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_aes_256_ocb()) } |
| } |
| |
| <span class="attribute">#[cfg(not(osslconf = <span class="string">"OPENSSL_NO_BF"</span>))] |
| </span><span class="kw">pub fn </span>bf_cbc() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_bf_cbc()) } |
| } |
| |
| <span class="attribute">#[cfg(not(osslconf = <span class="string">"OPENSSL_NO_BF"</span>))] |
| </span><span class="kw">pub fn </span>bf_ecb() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_bf_ecb()) } |
| } |
| |
| <span class="attribute">#[cfg(not(any(boringssl, osslconf = <span class="string">"OPENSSL_NO_BF"</span>)))] |
| </span><span class="kw">pub fn </span>bf_cfb64() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_bf_cfb64()) } |
| } |
| |
| <span class="attribute">#[cfg(not(any(boringssl, osslconf = <span class="string">"OPENSSL_NO_BF"</span>)))] |
| </span><span class="kw">pub fn </span>bf_ofb() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_bf_ofb()) } |
| } |
| |
| <span class="kw">pub fn </span>des_cbc() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_des_cbc()) } |
| } |
| |
| <span class="kw">pub fn </span>des_ecb() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_des_ecb()) } |
| } |
| |
| <span class="kw">pub fn </span>des_ede3() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_des_ede3()) } |
| } |
| |
| <span class="kw">pub fn </span>des_ede3_cbc() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_des_ede3_cbc()) } |
| } |
| |
| <span class="attribute">#[cfg(not(boringssl))] |
| </span><span class="kw">pub fn </span>des_ede3_cfb64() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_des_ede3_cfb64()) } |
| } |
| |
| <span class="attribute">#[cfg(not(osslconf = <span class="string">"OPENSSL_NO_RC4"</span>))] |
| </span><span class="kw">pub fn </span>rc4() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_rc4()) } |
| } |
| |
| <span class="doccomment">/// Requires OpenSSL 1.1.0 or newer. |
| </span><span class="attribute">#[cfg(all(ossl110, not(osslconf = <span class="string">"OPENSSL_NO_CHACHA"</span>)))] |
| </span><span class="kw">pub fn </span>chacha20() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_chacha20()) } |
| } |
| |
| <span class="doccomment">/// Requires OpenSSL 1.1.0 or newer. |
| </span><span class="attribute">#[cfg(all(ossl110, not(osslconf = <span class="string">"OPENSSL_NO_CHACHA"</span>)))] |
| </span><span class="kw">pub fn </span>chacha20_poly1305() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_chacha20_poly1305()) } |
| } |
| |
| <span class="attribute">#[cfg(not(any(boringssl, osslconf = <span class="string">"OPENSSL_NO_SEED"</span>)))] |
| </span><span class="kw">pub fn </span>seed_cbc() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_seed_cbc()) } |
| } |
| |
| <span class="attribute">#[cfg(not(any(boringssl, osslconf = <span class="string">"OPENSSL_NO_SEED"</span>)))] |
| </span><span class="kw">pub fn </span>seed_cfb128() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_seed_cfb128()) } |
| } |
| |
| <span class="attribute">#[cfg(not(any(boringssl, osslconf = <span class="string">"OPENSSL_NO_SEED"</span>)))] |
| </span><span class="kw">pub fn </span>seed_ecb() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_seed_ecb()) } |
| } |
| |
| <span class="attribute">#[cfg(not(any(boringssl, osslconf = <span class="string">"OPENSSL_NO_SEED"</span>)))] |
| </span><span class="kw">pub fn </span>seed_ofb() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_seed_ofb()) } |
| } |
| |
| <span class="attribute">#[cfg(all(any(ossl111, libressl291), not(osslconf = <span class="string">"OPENSSL_NO_SM4"</span>)))] |
| </span><span class="kw">pub fn </span>sm4_ecb() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_sm4_ecb()) } |
| } |
| |
| <span class="attribute">#[cfg(all(any(ossl111, libressl291), not(osslconf = <span class="string">"OPENSSL_NO_SM4"</span>)))] |
| </span><span class="kw">pub fn </span>sm4_cbc() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_sm4_cbc()) } |
| } |
| |
| <span class="attribute">#[cfg(all(any(ossl111, libressl291), not(osslconf = <span class="string">"OPENSSL_NO_SM4"</span>)))] |
| </span><span class="kw">pub fn </span>sm4_ctr() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_sm4_ctr()) } |
| } |
| |
| <span class="attribute">#[cfg(all(any(ossl111, libressl291), not(osslconf = <span class="string">"OPENSSL_NO_SM4"</span>)))] |
| </span><span class="kw">pub fn </span>sm4_cfb128() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_sm4_cfb128()) } |
| } |
| |
| <span class="attribute">#[cfg(all(any(ossl111, libressl291), not(osslconf = <span class="string">"OPENSSL_NO_SM4"</span>)))] |
| </span><span class="kw">pub fn </span>sm4_ofb() -> Cipher { |
| <span class="kw">unsafe </span>{ Cipher(ffi::EVP_sm4_ofb()) } |
| } |
| |
| <span class="doccomment">/// Creates a `Cipher` from a raw pointer to its OpenSSL type. |
| /// |
| /// # Safety |
| /// |
| /// The caller must ensure the pointer is valid for the `'static` lifetime. |
| </span><span class="kw">pub unsafe fn </span>from_ptr(ptr: <span class="kw-2">*const </span>ffi::EVP_CIPHER) -> Cipher { |
| Cipher(ptr) |
| } |
| |
| <span class="attribute">#[allow(clippy::trivially_copy_pass_by_ref)] |
| </span><span class="kw">pub fn </span>as_ptr(<span class="kw-2">&</span><span class="self">self</span>) -> <span class="kw-2">*const </span>ffi::EVP_CIPHER { |
| <span class="self">self</span>.<span class="number">0 |
| </span>} |
| |
| <span class="doccomment">/// Returns the length of keys used with this cipher. |
| </span><span class="attribute">#[allow(clippy::trivially_copy_pass_by_ref)] |
| </span><span class="kw">pub fn </span>key_len(<span class="kw-2">&</span><span class="self">self</span>) -> usize { |
| <span class="kw">unsafe </span>{ EVP_CIPHER_key_length(<span class="self">self</span>.<span class="number">0</span>) <span class="kw">as </span>usize } |
| } |
| |
| <span class="doccomment">/// Returns the length of the IV used with this cipher, or `None` if the |
| /// cipher does not use an IV. |
| </span><span class="attribute">#[allow(clippy::trivially_copy_pass_by_ref)] |
| </span><span class="kw">pub fn </span>iv_len(<span class="kw-2">&</span><span class="self">self</span>) -> <span class="prelude-ty">Option</span><usize> { |
| <span class="kw">unsafe </span>{ |
| <span class="kw">let </span>len = EVP_CIPHER_iv_length(<span class="self">self</span>.<span class="number">0</span>) <span class="kw">as </span>usize; |
| <span class="kw">if </span>len == <span class="number">0 </span>{ |
| <span class="prelude-val">None |
| </span>} <span class="kw">else </span>{ |
| <span class="prelude-val">Some</span>(len) |
| } |
| } |
| } |
| |
| <span class="doccomment">/// Returns the block size of the cipher. |
| /// |
| /// # Note |
| /// |
| /// Stream ciphers such as RC4 have a block size of 1. |
| </span><span class="attribute">#[allow(clippy::trivially_copy_pass_by_ref)] |
| </span><span class="kw">pub fn </span>block_size(<span class="kw-2">&</span><span class="self">self</span>) -> usize { |
| <span class="kw">unsafe </span>{ EVP_CIPHER_block_size(<span class="self">self</span>.<span class="number">0</span>) <span class="kw">as </span>usize } |
| } |
| |
| <span class="doccomment">/// Determines whether the cipher is using CCM mode |
| </span><span class="attribute">#[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>is_ccm(<span class="self">self</span>) -> bool { |
| <span class="comment">// NOTE: OpenSSL returns pointers to static structs, which makes this work as expected |
| </span><span class="self">self </span>== Cipher::aes_128_ccm() || <span class="self">self </span>== Cipher::aes_256_ccm() |
| } |
| |
| <span class="attribute">#[cfg(boringssl)] |
| </span><span class="kw">fn </span>is_ccm(<span class="self">self</span>) -> bool { |
| <span class="bool-val">false |
| </span>} |
| |
| <span class="doccomment">/// Determines whether the cipher is using OCB mode |
| </span><span class="attribute">#[cfg(ossl110)] |
| </span><span class="kw">fn </span>is_ocb(<span class="self">self</span>) -> bool { |
| <span class="self">self </span>== Cipher::aes_128_ocb() |
| || <span class="self">self </span>== Cipher::aes_192_ocb() |
| || <span class="self">self </span>== Cipher::aes_256_ocb() |
| } |
| |
| <span class="attribute">#[cfg(not(ossl110))] |
| </span><span class="kw">const fn </span>is_ocb(<span class="self">self</span>) -> bool { |
| <span class="bool-val">false |
| </span>} |
| } |
| |
| <span class="kw">unsafe impl </span>Sync <span class="kw">for </span>Cipher {} |
| <span class="kw">unsafe impl </span>Send <span class="kw">for </span>Cipher {} |
| |
| <span class="doccomment">/// Represents a symmetric cipher context. |
| /// |
| /// Padding is enabled by default. |
| /// |
| /// # Examples |
| /// |
| /// Encrypt some plaintext in chunks, then decrypt the ciphertext back into plaintext, in AES 128 |
| /// CBC mode. |
| /// |
| /// ``` |
| /// use openssl::symm::{Cipher, Mode, Crypter}; |
| /// |
| /// let plaintexts: [&[u8]; 2] = [b"Some Stream of", b" Crypto Text"]; |
| /// let key = b"\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F"; |
| /// let iv = b"\x00\x01\x02\x03\x04\x05\x06\x07\x00\x01\x02\x03\x04\x05\x06\x07"; |
| /// let data_len = plaintexts.iter().fold(0, |sum, x| sum + x.len()); |
| /// |
| /// // Create a cipher context for encryption. |
| /// let mut encrypter = Crypter::new( |
| /// Cipher::aes_128_cbc(), |
| /// Mode::Encrypt, |
| /// key, |
| /// Some(iv)).unwrap(); |
| /// |
| /// let block_size = Cipher::aes_128_cbc().block_size(); |
| /// let mut ciphertext = vec![0; data_len + block_size]; |
| /// |
| /// // Encrypt 2 chunks of plaintexts successively. |
| /// let mut count = encrypter.update(plaintexts[0], &mut ciphertext).unwrap(); |
| /// count += encrypter.update(plaintexts[1], &mut ciphertext[count..]).unwrap(); |
| /// count += encrypter.finalize(&mut ciphertext[count..]).unwrap(); |
| /// ciphertext.truncate(count); |
| /// |
| /// assert_eq!( |
| /// b"\x0F\x21\x83\x7E\xB2\x88\x04\xAF\xD9\xCC\xE2\x03\x49\xB4\x88\xF6\xC4\x61\x0E\x32\x1C\xF9\ |
| /// \x0D\x66\xB1\xE6\x2C\x77\x76\x18\x8D\x99", |
| /// &ciphertext[..] |
| /// ); |
| /// |
| /// |
| /// // Let's pretend we don't know the plaintext, and now decrypt the ciphertext. |
| /// let data_len = ciphertext.len(); |
| /// let ciphertexts = [&ciphertext[..9], &ciphertext[9..]]; |
| /// |
| /// // Create a cipher context for decryption. |
| /// let mut decrypter = Crypter::new( |
| /// Cipher::aes_128_cbc(), |
| /// Mode::Decrypt, |
| /// key, |
| /// Some(iv)).unwrap(); |
| /// let mut plaintext = vec![0; data_len + block_size]; |
| /// |
| /// // Decrypt 2 chunks of ciphertexts successively. |
| /// let mut count = decrypter.update(ciphertexts[0], &mut plaintext).unwrap(); |
| /// count += decrypter.update(ciphertexts[1], &mut plaintext[count..]).unwrap(); |
| /// count += decrypter.finalize(&mut plaintext[count..]).unwrap(); |
| /// plaintext.truncate(count); |
| /// |
| /// assert_eq!(b"Some Stream of Crypto Text", &plaintext[..]); |
| /// ``` |
| </span><span class="kw">pub struct </span>Crypter { |
| ctx: CipherCtx, |
| } |
| |
| <span class="kw">impl </span>Crypter { |
| <span class="doccomment">/// Creates a new `Crypter`. The initialisation vector, `iv`, is not necessary for certain |
| /// types of `Cipher`. |
| /// |
| /// # Panics |
| /// |
| /// Panics if an IV is required by the cipher but not provided. Also make sure that the key |
| /// and IV size are appropriate for your cipher. |
| </span><span class="kw">pub fn </span>new( |
| t: Cipher, |
| mode: Mode, |
| key: <span class="kw-2">&</span>[u8], |
| iv: <span class="prelude-ty">Option</span><<span class="kw-2">&</span>[u8]>, |
| ) -> <span class="prelude-ty">Result</span><Crypter, ErrorStack> { |
| <span class="kw">let </span><span class="kw-2">mut </span>ctx = CipherCtx::new()<span class="question-mark">?</span>; |
| |
| <span class="kw">let </span>f = <span class="kw">match </span>mode { |
| Mode::Encrypt => CipherCtxRef::encrypt_init, |
| Mode::Decrypt => CipherCtxRef::decrypt_init, |
| }; |
| |
| f( |
| <span class="kw-2">&mut </span>ctx, |
| <span class="prelude-val">Some</span>(<span class="kw">unsafe </span>{ CipherRef::from_ptr(t.as_ptr() <span class="kw">as </span><span class="kw-2">*mut </span><span class="kw">_</span>) }), |
| <span class="prelude-val">None</span>, |
| <span class="prelude-val">None</span>, |
| )<span class="question-mark">?</span>; |
| |
| ctx.set_key_length(key.len())<span class="question-mark">?</span>; |
| |
| <span class="kw">if let </span>(<span class="prelude-val">Some</span>(iv), <span class="prelude-val">Some</span>(iv_len)) = (iv, t.iv_len()) { |
| <span class="kw">if </span>iv.len() != iv_len { |
| ctx.set_iv_length(iv.len())<span class="question-mark">?</span>; |
| } |
| } |
| |
| f(<span class="kw-2">&mut </span>ctx, <span class="prelude-val">None</span>, <span class="prelude-val">Some</span>(key), iv)<span class="question-mark">?</span>; |
| |
| <span class="prelude-val">Ok</span>(Crypter { ctx }) |
| } |
| |
| <span class="doccomment">/// Enables or disables padding. |
| /// |
| /// If padding is disabled, total amount of data encrypted/decrypted must |
| /// be a multiple of the cipher's block size. |
| </span><span class="kw">pub fn </span>pad(<span class="kw-2">&mut </span><span class="self">self</span>, padding: bool) { |
| <span class="self">self</span>.ctx.set_padding(padding) |
| } |
| |
| <span class="doccomment">/// Sets the tag used to authenticate ciphertext in AEAD ciphers such as AES GCM. |
| /// |
| /// When decrypting cipher text using an AEAD cipher, this must be called before `finalize`. |
| </span><span class="kw">pub fn </span>set_tag(<span class="kw-2">&mut </span><span class="self">self</span>, tag: <span class="kw-2">&</span>[u8]) -> <span class="prelude-ty">Result</span><(), ErrorStack> { |
| <span class="self">self</span>.ctx.set_tag(tag) |
| } |
| |
| <span class="doccomment">/// Sets the length of the authentication tag to generate in AES CCM. |
| /// |
| /// When encrypting with AES CCM, the tag length needs to be explicitly set in order |
| /// to use a value different than the default 12 bytes. |
| </span><span class="kw">pub fn </span>set_tag_len(<span class="kw-2">&mut </span><span class="self">self</span>, tag_len: usize) -> <span class="prelude-ty">Result</span><(), ErrorStack> { |
| <span class="self">self</span>.ctx.set_tag_length(tag_len) |
| } |
| |
| <span class="doccomment">/// Feeds total plaintext length to the cipher. |
| /// |
| /// The total plaintext or ciphertext length MUST be passed to the cipher when it operates in |
| /// CCM mode. |
| </span><span class="kw">pub fn </span>set_data_len(<span class="kw-2">&mut </span><span class="self">self</span>, data_len: usize) -> <span class="prelude-ty">Result</span><(), ErrorStack> { |
| <span class="self">self</span>.ctx.set_data_len(data_len) |
| } |
| |
| <span class="doccomment">/// Feeds Additional Authenticated Data (AAD) through the cipher. |
| /// |
| /// This can only be used with AEAD ciphers such as AES GCM. Data fed in is not encrypted, but |
| /// is factored into the authentication tag. It must be called before the first call to |
| /// `update`. |
| </span><span class="kw">pub fn </span>aad_update(<span class="kw-2">&mut </span><span class="self">self</span>, input: <span class="kw-2">&</span>[u8]) -> <span class="prelude-ty">Result</span><(), ErrorStack> { |
| <span class="self">self</span>.ctx.cipher_update(input, <span class="prelude-val">None</span>)<span class="question-mark">?</span>; |
| <span class="prelude-val">Ok</span>(()) |
| } |
| |
| <span class="doccomment">/// Feeds data from `input` through the cipher, writing encrypted/decrypted |
| /// bytes into `output`. |
| /// |
| /// The number of bytes written to `output` is returned. Note that this may |
| /// not be equal to the length of `input`. |
| /// |
| /// # Panics |
| /// |
| /// Panics for stream ciphers if `output.len() < input.len()`. |
| /// |
| /// Panics for block ciphers if `output.len() < input.len() + block_size`, |
| /// where `block_size` is the block size of the cipher (see `Cipher::block_size`). |
| /// |
| /// Panics if `output.len() > c_int::max_value()`. |
| </span><span class="kw">pub fn </span>update(<span class="kw-2">&mut </span><span class="self">self</span>, input: <span class="kw-2">&</span>[u8], output: <span class="kw-2">&mut </span>[u8]) -> <span class="prelude-ty">Result</span><usize, ErrorStack> { |
| <span class="self">self</span>.ctx.cipher_update(input, <span class="prelude-val">Some</span>(output)) |
| } |
| |
| <span class="doccomment">/// Finishes the encryption/decryption process, writing any remaining data |
| /// to `output`. |
| /// |
| /// The number of bytes written to `output` is returned. |
| /// |
| /// `update` should not be called after this method. |
| /// |
| /// # Panics |
| /// |
| /// Panics for block ciphers if `output.len() < block_size`, |
| /// where `block_size` is the block size of the cipher (see `Cipher::block_size`). |
| </span><span class="kw">pub fn </span>finalize(<span class="kw-2">&mut </span><span class="self">self</span>, output: <span class="kw-2">&mut </span>[u8]) -> <span class="prelude-ty">Result</span><usize, ErrorStack> { |
| <span class="self">self</span>.ctx.cipher_final(output) |
| } |
| |
| <span class="doccomment">/// Retrieves the authentication tag used to authenticate ciphertext in AEAD ciphers such |
| /// as AES GCM. |
| /// |
| /// When encrypting data with an AEAD cipher, this must be called after `finalize`. |
| /// |
| /// The size of the buffer indicates the required size of the tag. While some ciphers support a |
| /// range of tag sizes, it is recommended to pick the maximum size. For AES GCM, this is 16 |
| /// bytes, for example. |
| </span><span class="kw">pub fn </span>get_tag(<span class="kw-2">&</span><span class="self">self</span>, tag: <span class="kw-2">&mut </span>[u8]) -> <span class="prelude-ty">Result</span><(), ErrorStack> { |
| <span class="self">self</span>.ctx.tag(tag) |
| } |
| } |
| |
| <span class="doccomment">/// Encrypts data in one go, and returns the encrypted data. |
| /// |
| /// Data is encrypted using the specified cipher type `t` in encrypt mode with the specified `key` |
| /// and initialization vector `iv`. Padding is enabled. |
| /// |
| /// This is a convenient interface to `Crypter` to encrypt all data in one go. To encrypt a stream |
| /// of data incrementally , use `Crypter` instead. |
| /// |
| /// # Examples |
| /// |
| /// Encrypt data in AES128 CBC mode |
| /// |
| /// ``` |
| /// use openssl::symm::{encrypt, Cipher}; |
| /// |
| /// let cipher = Cipher::aes_128_cbc(); |
| /// let data = b"Some Crypto Text"; |
| /// let key = b"\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F"; |
| /// let iv = b"\x00\x01\x02\x03\x04\x05\x06\x07\x00\x01\x02\x03\x04\x05\x06\x07"; |
| /// let ciphertext = encrypt( |
| /// cipher, |
| /// key, |
| /// Some(iv), |
| /// data).unwrap(); |
| /// |
| /// assert_eq!( |
| /// b"\xB4\xB9\xE7\x30\xD6\xD6\xF7\xDE\x77\x3F\x1C\xFF\xB3\x3E\x44\x5A\x91\xD7\x27\x62\x87\x4D\ |
| /// \xFB\x3C\x5E\xC4\x59\x72\x4A\xF4\x7C\xA1", |
| /// &ciphertext[..]); |
| /// ``` |
| </span><span class="kw">pub fn </span>encrypt( |
| t: Cipher, |
| key: <span class="kw-2">&</span>[u8], |
| iv: <span class="prelude-ty">Option</span><<span class="kw-2">&</span>[u8]>, |
| data: <span class="kw-2">&</span>[u8], |
| ) -> <span class="prelude-ty">Result</span><Vec<u8>, ErrorStack> { |
| cipher(t, Mode::Encrypt, key, iv, data) |
| } |
| |
| <span class="doccomment">/// Decrypts data in one go, and returns the decrypted data. |
| /// |
| /// Data is decrypted using the specified cipher type `t` in decrypt mode with the specified `key` |
| /// and initialization vector `iv`. Padding is enabled. |
| /// |
| /// This is a convenient interface to `Crypter` to decrypt all data in one go. To decrypt a stream |
| /// of data incrementally , use `Crypter` instead. |
| /// |
| /// # Examples |
| /// |
| /// Decrypt data in AES128 CBC mode |
| /// |
| /// ``` |
| /// use openssl::symm::{decrypt, Cipher}; |
| /// |
| /// let cipher = Cipher::aes_128_cbc(); |
| /// let data = b"\xB4\xB9\xE7\x30\xD6\xD6\xF7\xDE\x77\x3F\x1C\xFF\xB3\x3E\x44\x5A\x91\xD7\x27\x62\ |
| /// \x87\x4D\xFB\x3C\x5E\xC4\x59\x72\x4A\xF4\x7C\xA1"; |
| /// let key = b"\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F"; |
| /// let iv = b"\x00\x01\x02\x03\x04\x05\x06\x07\x00\x01\x02\x03\x04\x05\x06\x07"; |
| /// let ciphertext = decrypt( |
| /// cipher, |
| /// key, |
| /// Some(iv), |
| /// data).unwrap(); |
| /// |
| /// assert_eq!( |
| /// b"Some Crypto Text", |
| /// &ciphertext[..]); |
| /// ``` |
| </span><span class="kw">pub fn </span>decrypt( |
| t: Cipher, |
| key: <span class="kw-2">&</span>[u8], |
| iv: <span class="prelude-ty">Option</span><<span class="kw-2">&</span>[u8]>, |
| data: <span class="kw-2">&</span>[u8], |
| ) -> <span class="prelude-ty">Result</span><Vec<u8>, ErrorStack> { |
| cipher(t, Mode::Decrypt, key, iv, data) |
| } |
| |
| <span class="kw">fn </span>cipher( |
| t: Cipher, |
| mode: Mode, |
| key: <span class="kw-2">&</span>[u8], |
| iv: <span class="prelude-ty">Option</span><<span class="kw-2">&</span>[u8]>, |
| data: <span class="kw-2">&</span>[u8], |
| ) -> <span class="prelude-ty">Result</span><Vec<u8>, ErrorStack> { |
| <span class="kw">let </span><span class="kw-2">mut </span>c = Crypter::new(t, mode, key, iv)<span class="question-mark">?</span>; |
| <span class="kw">let </span><span class="kw-2">mut </span>out = <span class="macro">vec!</span>[<span class="number">0</span>; data.len() + t.block_size()]; |
| <span class="kw">let </span>count = c.update(data, <span class="kw-2">&mut </span>out)<span class="question-mark">?</span>; |
| <span class="kw">let </span>rest = c.finalize(<span class="kw-2">&mut </span>out[count..])<span class="question-mark">?</span>; |
| out.truncate(count + rest); |
| <span class="prelude-val">Ok</span>(out) |
| } |
| |
| <span class="doccomment">/// Like `encrypt`, but for AEAD ciphers such as AES GCM. |
| /// |
| /// Additional Authenticated Data can be provided in the `aad` field, and the authentication tag |
| /// will be copied into the `tag` field. |
| /// |
| /// The size of the `tag` buffer indicates the required size of the tag. While some ciphers support |
| /// a range of tag sizes, it is recommended to pick the maximum size. For AES GCM, this is 16 bytes, |
| /// for example. |
| </span><span class="kw">pub fn </span>encrypt_aead( |
| t: Cipher, |
| key: <span class="kw-2">&</span>[u8], |
| iv: <span class="prelude-ty">Option</span><<span class="kw-2">&</span>[u8]>, |
| aad: <span class="kw-2">&</span>[u8], |
| data: <span class="kw-2">&</span>[u8], |
| tag: <span class="kw-2">&mut </span>[u8], |
| ) -> <span class="prelude-ty">Result</span><Vec<u8>, ErrorStack> { |
| <span class="kw">let </span><span class="kw-2">mut </span>c = Crypter::new(t, Mode::Encrypt, key, iv)<span class="question-mark">?</span>; |
| <span class="kw">let </span><span class="kw-2">mut </span>out = <span class="macro">vec!</span>[<span class="number">0</span>; data.len() + t.block_size()]; |
| |
| <span class="kw">let </span>is_ccm = t.is_ccm(); |
| <span class="kw">if </span>is_ccm || t.is_ocb() { |
| c.set_tag_len(tag.len())<span class="question-mark">?</span>; |
| <span class="kw">if </span>is_ccm { |
| c.set_data_len(data.len())<span class="question-mark">?</span>; |
| } |
| } |
| |
| c.aad_update(aad)<span class="question-mark">?</span>; |
| <span class="kw">let </span>count = c.update(data, <span class="kw-2">&mut </span>out)<span class="question-mark">?</span>; |
| <span class="kw">let </span>rest = c.finalize(<span class="kw-2">&mut </span>out[count..])<span class="question-mark">?</span>; |
| c.get_tag(tag)<span class="question-mark">?</span>; |
| out.truncate(count + rest); |
| <span class="prelude-val">Ok</span>(out) |
| } |
| |
| <span class="doccomment">/// Like `decrypt`, but for AEAD ciphers such as AES GCM. |
| /// |
| /// Additional Authenticated Data can be provided in the `aad` field, and the authentication tag |
| /// should be provided in the `tag` field. |
| </span><span class="kw">pub fn </span>decrypt_aead( |
| t: Cipher, |
| key: <span class="kw-2">&</span>[u8], |
| iv: <span class="prelude-ty">Option</span><<span class="kw-2">&</span>[u8]>, |
| aad: <span class="kw-2">&</span>[u8], |
| data: <span class="kw-2">&</span>[u8], |
| tag: <span class="kw-2">&</span>[u8], |
| ) -> <span class="prelude-ty">Result</span><Vec<u8>, ErrorStack> { |
| <span class="kw">let </span><span class="kw-2">mut </span>c = Crypter::new(t, Mode::Decrypt, key, iv)<span class="question-mark">?</span>; |
| <span class="kw">let </span><span class="kw-2">mut </span>out = <span class="macro">vec!</span>[<span class="number">0</span>; data.len() + t.block_size()]; |
| |
| <span class="kw">let </span>is_ccm = t.is_ccm(); |
| <span class="kw">if </span>is_ccm || t.is_ocb() { |
| c.set_tag(tag)<span class="question-mark">?</span>; |
| <span class="kw">if </span>is_ccm { |
| c.set_data_len(data.len())<span class="question-mark">?</span>; |
| } |
| } |
| |
| c.aad_update(aad)<span class="question-mark">?</span>; |
| <span class="kw">let </span>count = c.update(data, <span class="kw-2">&mut </span>out)<span class="question-mark">?</span>; |
| |
| <span class="kw">let </span>rest = <span class="kw">if </span>t.is_ccm() { |
| <span class="number">0 |
| </span>} <span class="kw">else </span>{ |
| c.set_tag(tag)<span class="question-mark">?</span>; |
| c.finalize(<span class="kw-2">&mut </span>out[count..])<span class="question-mark">? |
| </span>}; |
| |
| out.truncate(count + rest); |
| <span class="prelude-val">Ok</span>(out) |
| } |
| |
| <span class="macro">cfg_if! </span>{ |
| <span class="kw">if </span><span class="attribute">#[cfg(any(boringssl, ossl110, libressl273))] </span>{ |
| <span class="kw">use </span>ffi::{EVP_CIPHER_block_size, EVP_CIPHER_iv_length, EVP_CIPHER_key_length}; |
| } <span class="kw">else </span>{ |
| <span class="kw">use </span><span class="kw">crate</span>::LenType; |
| |
| <span class="attribute">#[allow(bad_style)] |
| </span><span class="kw">pub unsafe fn </span>EVP_CIPHER_iv_length(ptr: <span class="kw-2">*const </span>ffi::EVP_CIPHER) -> LenType { |
| (<span class="kw-2">*</span>ptr).iv_len |
| } |
| |
| <span class="attribute">#[allow(bad_style)] |
| </span><span class="kw">pub unsafe fn </span>EVP_CIPHER_block_size(ptr: <span class="kw-2">*const </span>ffi::EVP_CIPHER) -> LenType { |
| (<span class="kw-2">*</span>ptr).block_size |
| } |
| |
| <span class="attribute">#[allow(bad_style)] |
| </span><span class="kw">pub unsafe fn </span>EVP_CIPHER_key_length(ptr: <span class="kw-2">*const </span>ffi::EVP_CIPHER) -> LenType { |
| (<span class="kw-2">*</span>ptr).key_len |
| } |
| } |
| } |
| |
| <span class="attribute">#[cfg(test)] |
| </span><span class="kw">mod </span>tests { |
| <span class="kw">use super</span>::<span class="kw-2">*</span>; |
| <span class="kw">use </span>hex::{<span class="self">self</span>, FromHex}; |
| |
| <span class="attribute">#[test] |
| </span><span class="kw">fn </span>test_stream_cipher_output() { |
| <span class="kw">let </span>key = [<span class="number">0u8</span>; <span class="number">16</span>]; |
| <span class="kw">let </span>iv = [<span class="number">0u8</span>; <span class="number">16</span>]; |
| <span class="kw">let </span><span class="kw-2">mut </span>c = <span class="kw">super</span>::Crypter::new( |
| <span class="kw">super</span>::Cipher::aes_128_ctr(), |
| <span class="kw">super</span>::Mode::Encrypt, |
| <span class="kw-2">&</span>key, |
| <span class="prelude-val">Some</span>(<span class="kw-2">&</span>iv), |
| ) |
| .unwrap(); |
| |
| <span class="macro">assert_eq!</span>(c.update(<span class="kw-2">&</span>[<span class="number">0u8</span>; <span class="number">15</span>], <span class="kw-2">&mut </span>[<span class="number">0u8</span>; <span class="number">15</span>]).unwrap(), <span class="number">15</span>); |
| <span class="macro">assert_eq!</span>(c.update(<span class="kw-2">&</span>[<span class="number">0u8</span>; <span class="number">1</span>], <span class="kw-2">&mut </span>[<span class="number">0u8</span>; <span class="number">1</span>]).unwrap(), <span class="number">1</span>); |
| <span class="macro">assert_eq!</span>(c.finalize(<span class="kw-2">&mut </span>[<span class="number">0u8</span>; <span class="number">0</span>]).unwrap(), <span class="number">0</span>); |
| } |
| |
| <span class="comment">// Test vectors from FIPS-197: |
| // http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf |
| </span><span class="attribute">#[test] |
| </span><span class="kw">fn </span>test_aes_256_ecb() { |
| <span class="kw">let </span>k0 = [ |
| <span class="number">0x00u8</span>, <span class="number">0x01u8</span>, <span class="number">0x02u8</span>, <span class="number">0x03u8</span>, <span class="number">0x04u8</span>, <span class="number">0x05u8</span>, <span class="number">0x06u8</span>, <span class="number">0x07u8</span>, <span class="number">0x08u8</span>, <span class="number">0x09u8</span>, <span class="number">0x0au8</span>, |
| <span class="number">0x0bu8</span>, <span class="number">0x0cu8</span>, <span class="number">0x0du8</span>, <span class="number">0x0eu8</span>, <span class="number">0x0fu8</span>, <span class="number">0x10u8</span>, <span class="number">0x11u8</span>, <span class="number">0x12u8</span>, <span class="number">0x13u8</span>, <span class="number">0x14u8</span>, <span class="number">0x15u8</span>, |
| <span class="number">0x16u8</span>, <span class="number">0x17u8</span>, <span class="number">0x18u8</span>, <span class="number">0x19u8</span>, <span class="number">0x1au8</span>, <span class="number">0x1bu8</span>, <span class="number">0x1cu8</span>, <span class="number">0x1du8</span>, <span class="number">0x1eu8</span>, <span class="number">0x1fu8</span>, |
| ]; |
| <span class="kw">let </span>p0 = [ |
| <span class="number">0x00u8</span>, <span class="number">0x11u8</span>, <span class="number">0x22u8</span>, <span class="number">0x33u8</span>, <span class="number">0x44u8</span>, <span class="number">0x55u8</span>, <span class="number">0x66u8</span>, <span class="number">0x77u8</span>, <span class="number">0x88u8</span>, <span class="number">0x99u8</span>, <span class="number">0xaau8</span>, |
| <span class="number">0xbbu8</span>, <span class="number">0xccu8</span>, <span class="number">0xddu8</span>, <span class="number">0xeeu8</span>, <span class="number">0xffu8</span>, |
| ]; |
| <span class="kw">let </span>c0 = [ |
| <span class="number">0x8eu8</span>, <span class="number">0xa2u8</span>, <span class="number">0xb7u8</span>, <span class="number">0xcau8</span>, <span class="number">0x51u8</span>, <span class="number">0x67u8</span>, <span class="number">0x45u8</span>, <span class="number">0xbfu8</span>, <span class="number">0xeau8</span>, <span class="number">0xfcu8</span>, <span class="number">0x49u8</span>, |
| <span class="number">0x90u8</span>, <span class="number">0x4bu8</span>, <span class="number">0x49u8</span>, <span class="number">0x60u8</span>, <span class="number">0x89u8</span>, |
| ]; |
| <span class="kw">let </span><span class="kw-2">mut </span>c = <span class="kw">super</span>::Crypter::new( |
| <span class="kw">super</span>::Cipher::aes_256_ecb(), |
| <span class="kw">super</span>::Mode::Encrypt, |
| <span class="kw-2">&</span>k0, |
| <span class="prelude-val">None</span>, |
| ) |
| .unwrap(); |
| c.pad(<span class="bool-val">false</span>); |
| <span class="kw">let </span><span class="kw-2">mut </span>r0 = <span class="macro">vec!</span>[<span class="number">0</span>; c0.len() + <span class="kw">super</span>::Cipher::aes_256_ecb().block_size()]; |
| <span class="kw">let </span>count = c.update(<span class="kw-2">&</span>p0, <span class="kw-2">&mut </span>r0).unwrap(); |
| <span class="kw">let </span>rest = c.finalize(<span class="kw-2">&mut </span>r0[count..]).unwrap(); |
| r0.truncate(count + rest); |
| <span class="macro">assert_eq!</span>(hex::encode(<span class="kw-2">&</span>r0), hex::encode(c0)); |
| |
| <span class="kw">let </span><span class="kw-2">mut </span>c = <span class="kw">super</span>::Crypter::new( |
| <span class="kw">super</span>::Cipher::aes_256_ecb(), |
| <span class="kw">super</span>::Mode::Decrypt, |
| <span class="kw-2">&</span>k0, |
| <span class="prelude-val">None</span>, |
| ) |
| .unwrap(); |
| c.pad(<span class="bool-val">false</span>); |
| <span class="kw">let </span><span class="kw-2">mut </span>p1 = <span class="macro">vec!</span>[<span class="number">0</span>; r0.len() + <span class="kw">super</span>::Cipher::aes_256_ecb().block_size()]; |
| <span class="kw">let </span>count = c.update(<span class="kw-2">&</span>r0, <span class="kw-2">&mut </span>p1).unwrap(); |
| <span class="kw">let </span>rest = c.finalize(<span class="kw-2">&mut </span>p1[count..]).unwrap(); |
| p1.truncate(count + rest); |
| <span class="macro">assert_eq!</span>(hex::encode(p1), hex::encode(p0)); |
| } |
| |
| <span class="attribute">#[test] |
| </span><span class="kw">fn </span>test_aes_256_cbc_decrypt() { |
| <span class="kw">let </span>iv = [ |
| <span class="number">4_u8</span>, <span class="number">223_u8</span>, <span class="number">153_u8</span>, <span class="number">219_u8</span>, <span class="number">28_u8</span>, <span class="number">142_u8</span>, <span class="number">234_u8</span>, <span class="number">68_u8</span>, <span class="number">227_u8</span>, <span class="number">69_u8</span>, <span class="number">98_u8</span>, |
| <span class="number">107_u8</span>, <span class="number">208_u8</span>, <span class="number">14_u8</span>, <span class="number">236_u8</span>, <span class="number">60_u8</span>, |
| ]; |
| <span class="kw">let </span>data = [ |
| <span class="number">143_u8</span>, <span class="number">210_u8</span>, <span class="number">75_u8</span>, <span class="number">63_u8</span>, <span class="number">214_u8</span>, <span class="number">179_u8</span>, <span class="number">155_u8</span>, <span class="number">241_u8</span>, <span class="number">242_u8</span>, <span class="number">31_u8</span>, <span class="number">154_u8</span>, |
| <span class="number">56_u8</span>, <span class="number">198_u8</span>, <span class="number">145_u8</span>, <span class="number">192_u8</span>, <span class="number">64_u8</span>, <span class="number">2_u8</span>, <span class="number">245_u8</span>, <span class="number">167_u8</span>, <span class="number">220_u8</span>, <span class="number">55_u8</span>, <span class="number">119_u8</span>, |
| <span class="number">233_u8</span>, <span class="number">136_u8</span>, <span class="number">139_u8</span>, <span class="number">27_u8</span>, <span class="number">71_u8</span>, <span class="number">242_u8</span>, <span class="number">119_u8</span>, <span class="number">175_u8</span>, <span class="number">65_u8</span>, <span class="number">207_u8</span>, |
| ]; |
| <span class="kw">let </span>ciphered_data = [ |
| <span class="number">0x4a_u8</span>, <span class="number">0x2e_u8</span>, <span class="number">0xe5_u8</span>, <span class="number">0x6_u8</span>, <span class="number">0xbf_u8</span>, <span class="number">0xcf_u8</span>, <span class="number">0xf2_u8</span>, <span class="number">0xd7_u8</span>, <span class="number">0xea_u8</span>, |
| <span class="number">0x2d_u8</span>, <span class="number">0xb1_u8</span>, <span class="number">0x85_u8</span>, <span class="number">0x6c_u8</span>, <span class="number">0x93_u8</span>, <span class="number">0x65_u8</span>, <span class="number">0x6f_u8</span>, |
| ]; |
| <span class="kw">let </span><span class="kw-2">mut </span>cr = <span class="kw">super</span>::Crypter::new( |
| <span class="kw">super</span>::Cipher::aes_256_cbc(), |
| <span class="kw">super</span>::Mode::Decrypt, |
| <span class="kw-2">&</span>data, |
| <span class="prelude-val">Some</span>(<span class="kw-2">&</span>iv), |
| ) |
| .unwrap(); |
| cr.pad(<span class="bool-val">false</span>); |
| <span class="kw">let </span><span class="kw-2">mut </span>unciphered_data = <span class="macro">vec!</span>[<span class="number">0</span>; data.len() + <span class="kw">super</span>::Cipher::aes_256_cbc().block_size()]; |
| <span class="kw">let </span>count = cr.update(<span class="kw-2">&</span>ciphered_data, <span class="kw-2">&mut </span>unciphered_data).unwrap(); |
| <span class="kw">let </span>rest = cr.finalize(<span class="kw-2">&mut </span>unciphered_data[count..]).unwrap(); |
| unciphered_data.truncate(count + rest); |
| |
| <span class="kw">let </span>expected_unciphered_data = <span class="string">b"I love turtles.\x01"</span>; |
| |
| <span class="macro">assert_eq!</span>(<span class="kw-2">&</span>unciphered_data, expected_unciphered_data); |
| } |
| |
| <span class="kw">fn </span>cipher_test(ciphertype: <span class="kw">super</span>::Cipher, pt: <span class="kw-2">&</span>str, ct: <span class="kw-2">&</span>str, key: <span class="kw-2">&</span>str, iv: <span class="kw-2">&</span>str) { |
| <span class="kw">let </span>pt = Vec::from_hex(pt).unwrap(); |
| <span class="kw">let </span>ct = Vec::from_hex(ct).unwrap(); |
| <span class="kw">let </span>key = Vec::from_hex(key).unwrap(); |
| <span class="kw">let </span>iv = Vec::from_hex(iv).unwrap(); |
| |
| <span class="kw">let </span>computed = <span class="kw">super</span>::decrypt(ciphertype, <span class="kw-2">&</span>key, <span class="prelude-val">Some</span>(<span class="kw-2">&</span>iv), <span class="kw-2">&</span>ct).unwrap(); |
| <span class="kw">let </span>expected = pt; |
| |
| <span class="kw">if </span>computed != expected { |
| <span class="macro">println!</span>(<span class="string">"Computed: {}"</span>, hex::encode(<span class="kw-2">&</span>computed)); |
| <span class="macro">println!</span>(<span class="string">"Expected: {}"</span>, hex::encode(<span class="kw-2">&</span>expected)); |
| <span class="kw">if </span>computed.len() != expected.len() { |
| <span class="macro">println!</span>( |
| <span class="string">"Lengths differ: {} in computed vs {} expected"</span>, |
| computed.len(), |
| expected.len() |
| ); |
| } |
| <span class="macro">panic!</span>(<span class="string">"test failure"</span>); |
| } |
| } |
| |
| <span class="attribute">#[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>cipher_test_nopad(ciphertype: <span class="kw">super</span>::Cipher, pt: <span class="kw-2">&</span>str, ct: <span class="kw-2">&</span>str, key: <span class="kw-2">&</span>str, iv: <span class="kw-2">&</span>str) { |
| <span class="kw">let </span>pt = Vec::from_hex(pt).unwrap(); |
| <span class="kw">let </span>ct = Vec::from_hex(ct).unwrap(); |
| <span class="kw">let </span>key = Vec::from_hex(key).unwrap(); |
| <span class="kw">let </span>iv = Vec::from_hex(iv).unwrap(); |
| |
| <span class="kw">let </span>computed = { |
| <span class="kw">let </span><span class="kw-2">mut </span>c = Crypter::new(ciphertype, Mode::Decrypt, <span class="kw-2">&</span>key, <span class="prelude-val">Some</span>(<span class="kw-2">&</span>iv)).unwrap(); |
| c.pad(<span class="bool-val">false</span>); |
| <span class="kw">let </span><span class="kw-2">mut </span>out = <span class="macro">vec!</span>[<span class="number">0</span>; ct.len() + ciphertype.block_size()]; |
| <span class="kw">let </span>count = c.update(<span class="kw-2">&</span>ct, <span class="kw-2">&mut </span>out).unwrap(); |
| <span class="kw">let </span>rest = c.finalize(<span class="kw-2">&mut </span>out[count..]).unwrap(); |
| out.truncate(count + rest); |
| out |
| }; |
| <span class="kw">let </span>expected = pt; |
| |
| <span class="kw">if </span>computed != expected { |
| <span class="macro">println!</span>(<span class="string">"Computed: {}"</span>, hex::encode(<span class="kw-2">&</span>computed)); |
| <span class="macro">println!</span>(<span class="string">"Expected: {}"</span>, hex::encode(<span class="kw-2">&</span>expected)); |
| <span class="kw">if </span>computed.len() != expected.len() { |
| <span class="macro">println!</span>( |
| <span class="string">"Lengths differ: {} in computed vs {} expected"</span>, |
| computed.len(), |
| expected.len() |
| ); |
| } |
| <span class="macro">panic!</span>(<span class="string">"test failure"</span>); |
| } |
| } |
| |
| <span class="attribute">#[test] |
| </span><span class="kw">fn </span>test_rc4() { |
| <span class="attribute">#[cfg(ossl300)] |
| </span><span class="kw">let </span>_provider = <span class="kw">crate</span>::provider::Provider::try_load(<span class="prelude-val">None</span>, <span class="string">"legacy"</span>, <span class="bool-val">true</span>).unwrap(); |
| |
| <span class="kw">let </span>pt = <span class="string">"0000000000000000000000000000000000000000000000000000000000000000000000000000"</span>; |
| <span class="kw">let </span>ct = <span class="string">"A68686B04D686AA107BD8D4CAB191A3EEC0A6294BC78B60F65C25CB47BD7BB3A48EFC4D26BE4"</span>; |
| <span class="kw">let </span>key = <span class="string">"97CD440324DA5FD1F7955C1C13B6B466"</span>; |
| <span class="kw">let </span>iv = <span class="string">""</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::rc4(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>test_aes256_xts() { |
| <span class="comment">// Test case 174 from |
| // http://csrc.nist.gov/groups/STM/cavp/documents/aes/XTSTestVectors.zip |
| </span><span class="kw">let </span>pt = <span class="string">"77f4ef63d734ebd028508da66c22cdebdd52ecd6ee2ab0a50bc8ad0cfd692ca5fcd4e6dedc45df7f\ |
| 6503f462611dc542"</span>; |
| <span class="kw">let </span>ct = <span class="string">"ce7d905a7776ac72f240d22aafed5e4eb7566cdc7211220e970da634ce015f131a5ecb8d400bc9e8\ |
| 4f0b81d8725dbbc7"</span>; |
| <span class="kw">let </span>key = <span class="string">"b6bfef891f83b5ff073f2231267be51eb084b791fa19a154399c0684c8b2dfcb37de77d28bbda3b\ |
| 4180026ad640b74243b3133e7b9fae629403f6733423dae28"</span>; |
| <span class="kw">let </span>iv = <span class="string">"db200efb7eaaa737dbdf40babb68953f"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::aes_256_xts(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| </span><span class="kw">fn </span>test_aes128_ctr() { |
| <span class="kw">let </span>pt = <span class="string">"6BC1BEE22E409F96E93D7E117393172AAE2D8A571E03AC9C9EB76FAC45AF8E5130C81C46A35CE411\ |
| E5FBC1191A0A52EFF69F2445DF4F9B17AD2B417BE66C3710"</span>; |
| <span class="kw">let </span>ct = <span class="string">"874D6191B620E3261BEF6864990DB6CE9806F66B7970FDFF8617187BB9FFFDFF5AE4DF3EDBD5D35E\ |
| 5B4F09020DB03EAB1E031DDA2FBE03D1792170A0F3009CEE"</span>; |
| <span class="kw">let </span>key = <span class="string">"2B7E151628AED2A6ABF7158809CF4F3C"</span>; |
| <span class="kw">let </span>iv = <span class="string">"F0F1F2F3F4F5F6F7F8F9FAFBFCFDFEFF"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::aes_128_ctr(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>test_aes128_cfb1() { |
| <span class="comment">// Lifted from http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf |
| |
| </span><span class="kw">let </span>pt = <span class="string">"6bc1"</span>; |
| <span class="kw">let </span>ct = <span class="string">"68b3"</span>; |
| <span class="kw">let </span>key = <span class="string">"2b7e151628aed2a6abf7158809cf4f3c"</span>; |
| <span class="kw">let </span>iv = <span class="string">"000102030405060708090a0b0c0d0e0f"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::aes_128_cfb1(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>test_aes128_cfb128() { |
| <span class="kw">let </span>pt = <span class="string">"6bc1bee22e409f96e93d7e117393172a"</span>; |
| <span class="kw">let </span>ct = <span class="string">"3b3fd92eb72dad20333449f8e83cfb4a"</span>; |
| <span class="kw">let </span>key = <span class="string">"2b7e151628aed2a6abf7158809cf4f3c"</span>; |
| <span class="kw">let </span>iv = <span class="string">"000102030405060708090a0b0c0d0e0f"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::aes_128_cfb128(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>test_aes128_cfb8() { |
| <span class="kw">let </span>pt = <span class="string">"6bc1bee22e409f96e93d7e117393172aae2d"</span>; |
| <span class="kw">let </span>ct = <span class="string">"3b79424c9c0dd436bace9e0ed4586a4f32b9"</span>; |
| <span class="kw">let </span>key = <span class="string">"2b7e151628aed2a6abf7158809cf4f3c"</span>; |
| <span class="kw">let </span>iv = <span class="string">"000102030405060708090a0b0c0d0e0f"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::aes_128_cfb8(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| </span><span class="kw">fn </span>test_aes128_ofb() { |
| <span class="comment">// Lifted from http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf |
| |
| </span><span class="kw">let </span>pt = <span class="string">"6bc1bee22e409f96e93d7e117393172aae2d8a571e03ac9c9eb76fac45af8e5130c81c46a35ce411e5fbc1191a0a52eff69f2445df4f9b17ad2b417be66c3710"</span>; |
| <span class="kw">let </span>ct = <span class="string">"3b3fd92eb72dad20333449f8e83cfb4a7789508d16918f03f53c52dac54ed8259740051e9c5fecf64344f7a82260edcc304c6528f659c77866a510d9c1d6ae5e"</span>; |
| <span class="kw">let </span>key = <span class="string">"2b7e151628aed2a6abf7158809cf4f3c"</span>; |
| <span class="kw">let </span>iv = <span class="string">"000102030405060708090a0b0c0d0e0f"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::aes_128_ofb(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| </span><span class="kw">fn </span>test_aes192_ctr() { |
| <span class="comment">// Lifted from http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf |
| |
| </span><span class="kw">let </span>pt = <span class="string">"6bc1bee22e409f96e93d7e117393172aae2d8a571e03ac9c9eb76fac45af8e5130c81c46a35ce411e5fbc1191a0a52eff69f2445df4f9b17ad2b417be66c3710"</span>; |
| <span class="kw">let </span>ct = <span class="string">"1abc932417521ca24f2b0459fe7e6e0b090339ec0aa6faefd5ccc2c6f4ce8e941e36b26bd1ebc670d1bd1d665620abf74f78a7f6d29809585a97daec58c6b050"</span>; |
| <span class="kw">let </span>key = <span class="string">"8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b"</span>; |
| <span class="kw">let </span>iv = <span class="string">"f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::aes_192_ctr(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>test_aes192_cfb1() { |
| <span class="comment">// Lifted from http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf |
| |
| </span><span class="kw">let </span>pt = <span class="string">"6bc1"</span>; |
| <span class="kw">let </span>ct = <span class="string">"9359"</span>; |
| <span class="kw">let </span>key = <span class="string">"8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b"</span>; |
| <span class="kw">let </span>iv = <span class="string">"000102030405060708090a0b0c0d0e0f"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::aes_192_cfb1(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>test_aes192_cfb128() { |
| <span class="comment">// Lifted from http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf |
| |
| </span><span class="kw">let </span>pt = <span class="string">"6bc1bee22e409f96e93d7e117393172aae2d8a571e03ac9c9eb76fac45af8e5130c81c46a35ce411e5fbc1191a0a52eff69f2445df4f9b17ad2b417be66c3710"</span>; |
| <span class="kw">let </span>ct = <span class="string">"cdc80d6fddf18cab34c25909c99a417467ce7f7f81173621961a2b70171d3d7a2e1e8a1dd59b88b1c8e60fed1efac4c9c05f9f9ca9834fa042ae8fba584b09ff"</span>; |
| <span class="kw">let </span>key = <span class="string">"8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b"</span>; |
| <span class="kw">let </span>iv = <span class="string">"000102030405060708090a0b0c0d0e0f"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::aes_192_cfb128(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>test_aes192_cfb8() { |
| <span class="comment">// Lifted from http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf |
| |
| </span><span class="kw">let </span>pt = <span class="string">"6bc1bee22e409f96e93d7e117393172aae2d"</span>; |
| <span class="kw">let </span>ct = <span class="string">"cda2521ef0a905ca44cd057cbf0d47a0678a"</span>; |
| <span class="kw">let </span>key = <span class="string">"8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b"</span>; |
| <span class="kw">let </span>iv = <span class="string">"000102030405060708090a0b0c0d0e0f"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::aes_192_cfb8(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| </span><span class="kw">fn </span>test_aes192_ofb() { |
| <span class="comment">// Lifted from http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf |
| |
| </span><span class="kw">let </span>pt = <span class="string">"6bc1bee22e409f96e93d7e117393172aae2d8a571e03ac9c9eb76fac45af8e5130c81c46a35ce411e5fbc1191a0a52eff69f2445df4f9b17ad2b417be66c3710"</span>; |
| <span class="kw">let </span>ct = <span class="string">"cdc80d6fddf18cab34c25909c99a4174fcc28b8d4c63837c09e81700c11004018d9a9aeac0f6596f559c6d4daf59a5f26d9f200857ca6c3e9cac524bd9acc92a"</span>; |
| <span class="kw">let </span>key = <span class="string">"8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b"</span>; |
| <span class="kw">let </span>iv = <span class="string">"000102030405060708090a0b0c0d0e0f"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::aes_192_ofb(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>test_aes256_cfb1() { |
| <span class="kw">let </span>pt = <span class="string">"6bc1"</span>; |
| <span class="kw">let </span>ct = <span class="string">"9029"</span>; |
| <span class="kw">let </span>key = <span class="string">"603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"</span>; |
| <span class="kw">let </span>iv = <span class="string">"000102030405060708090a0b0c0d0e0f"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::aes_256_cfb1(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>test_aes256_cfb128() { |
| <span class="kw">let </span>pt = <span class="string">"6bc1bee22e409f96e93d7e117393172a"</span>; |
| <span class="kw">let </span>ct = <span class="string">"dc7e84bfda79164b7ecd8486985d3860"</span>; |
| <span class="kw">let </span>key = <span class="string">"603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"</span>; |
| <span class="kw">let </span>iv = <span class="string">"000102030405060708090a0b0c0d0e0f"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::aes_256_cfb128(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>test_aes256_cfb8() { |
| <span class="kw">let </span>pt = <span class="string">"6bc1bee22e409f96e93d7e117393172aae2d"</span>; |
| <span class="kw">let </span>ct = <span class="string">"dc1f1a8520a64db55fcc8ac554844e889700"</span>; |
| <span class="kw">let </span>key = <span class="string">"603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"</span>; |
| <span class="kw">let </span>iv = <span class="string">"000102030405060708090a0b0c0d0e0f"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::aes_256_cfb8(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| </span><span class="kw">fn </span>test_aes256_ofb() { |
| <span class="comment">// Lifted from http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf |
| |
| </span><span class="kw">let </span>pt = <span class="string">"6bc1bee22e409f96e93d7e117393172aae2d8a571e03ac9c9eb76fac45af8e5130c81c46a35ce411e5fbc1191a0a52eff69f2445df4f9b17ad2b417be66c3710"</span>; |
| <span class="kw">let </span>ct = <span class="string">"dc7e84bfda79164b7ecd8486985d38604febdc6740d20b3ac88f6ad82a4fb08d71ab47a086e86eedf39d1c5bba97c4080126141d67f37be8538f5a8be740e484"</span>; |
| <span class="kw">let </span>key = <span class="string">"603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4"</span>; |
| <span class="kw">let </span>iv = <span class="string">"000102030405060708090a0b0c0d0e0f"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::aes_256_ofb(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg_attr(ossl300, ignore)] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>test_bf_cbc() { |
| <span class="attribute">#[cfg(ossl300)] |
| </span><span class="kw">let </span>_provider = <span class="kw">crate</span>::provider::Provider::try_load(<span class="prelude-val">None</span>, <span class="string">"legacy"</span>, <span class="bool-val">true</span>).unwrap(); |
| |
| <span class="comment">// https://www.schneier.com/code/vectors.txt |
| |
| </span><span class="kw">let </span>pt = <span class="string">"37363534333231204E6F77206973207468652074696D6520666F722000000000"</span>; |
| <span class="kw">let </span>ct = <span class="string">"6B77B4D63006DEE605B156E27403979358DEB9E7154616D959F1652BD5FF92CC"</span>; |
| <span class="kw">let </span>key = <span class="string">"0123456789ABCDEFF0E1D2C3B4A59687"</span>; |
| <span class="kw">let </span>iv = <span class="string">"FEDCBA9876543210"</span>; |
| |
| cipher_test_nopad(<span class="kw">super</span>::Cipher::bf_cbc(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg_attr(ossl300, ignore)] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>test_bf_ecb() { |
| <span class="attribute">#[cfg(ossl300)] |
| </span><span class="kw">let </span>_provider = <span class="kw">crate</span>::provider::Provider::try_load(<span class="prelude-val">None</span>, <span class="string">"legacy"</span>, <span class="bool-val">true</span>).unwrap(); |
| |
| <span class="kw">let </span>pt = <span class="string">"5CD54CA83DEF57DA"</span>; |
| <span class="kw">let </span>ct = <span class="string">"B1B8CC0B250F09A0"</span>; |
| <span class="kw">let </span>key = <span class="string">"0131D9619DC1376E"</span>; |
| <span class="kw">let </span>iv = <span class="string">"0000000000000000"</span>; |
| |
| cipher_test_nopad(<span class="kw">super</span>::Cipher::bf_ecb(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg_attr(ossl300, ignore)] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>test_bf_cfb64() { |
| <span class="attribute">#[cfg(ossl300)] |
| </span><span class="kw">let </span>_provider = <span class="kw">crate</span>::provider::Provider::try_load(<span class="prelude-val">None</span>, <span class="string">"legacy"</span>, <span class="bool-val">true</span>).unwrap(); |
| |
| <span class="kw">let </span>pt = <span class="string">"37363534333231204E6F77206973207468652074696D6520666F722000"</span>; |
| <span class="kw">let </span>ct = <span class="string">"E73214A2822139CAF26ECF6D2EB9E76E3DA3DE04D1517200519D57A6C3"</span>; |
| <span class="kw">let </span>key = <span class="string">"0123456789ABCDEFF0E1D2C3B4A59687"</span>; |
| <span class="kw">let </span>iv = <span class="string">"FEDCBA9876543210"</span>; |
| |
| cipher_test_nopad(<span class="kw">super</span>::Cipher::bf_cfb64(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg_attr(ossl300, ignore)] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>test_bf_ofb() { |
| <span class="attribute">#[cfg(ossl300)] |
| </span><span class="kw">let </span>_provider = <span class="kw">crate</span>::provider::Provider::try_load(<span class="prelude-val">None</span>, <span class="string">"legacy"</span>, <span class="bool-val">true</span>).unwrap(); |
| |
| <span class="kw">let </span>pt = <span class="string">"37363534333231204E6F77206973207468652074696D6520666F722000"</span>; |
| <span class="kw">let </span>ct = <span class="string">"E73214A2822139CA62B343CC5B65587310DD908D0C241B2263C2CF80DA"</span>; |
| <span class="kw">let </span>key = <span class="string">"0123456789ABCDEFF0E1D2C3B4A59687"</span>; |
| <span class="kw">let </span>iv = <span class="string">"FEDCBA9876543210"</span>; |
| |
| cipher_test_nopad(<span class="kw">super</span>::Cipher::bf_ofb(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| </span><span class="kw">fn </span>test_des_cbc() { |
| <span class="attribute">#[cfg(ossl300)] |
| </span><span class="kw">let </span>_provider = <span class="kw">crate</span>::provider::Provider::try_load(<span class="prelude-val">None</span>, <span class="string">"legacy"</span>, <span class="bool-val">true</span>).unwrap(); |
| |
| <span class="kw">let </span>pt = <span class="string">"54686973206973206120746573742e"</span>; |
| <span class="kw">let </span>ct = <span class="string">"6f2867cfefda048a4046ef7e556c7132"</span>; |
| <span class="kw">let </span>key = <span class="string">"7cb66337f3d3c0fe"</span>; |
| <span class="kw">let </span>iv = <span class="string">"0001020304050607"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::des_cbc(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| </span><span class="kw">fn </span>test_des_ecb() { |
| <span class="attribute">#[cfg(ossl300)] |
| </span><span class="kw">let </span>_provider = <span class="kw">crate</span>::provider::Provider::try_load(<span class="prelude-val">None</span>, <span class="string">"legacy"</span>, <span class="bool-val">true</span>).unwrap(); |
| |
| <span class="kw">let </span>pt = <span class="string">"54686973206973206120746573742e"</span>; |
| <span class="kw">let </span>ct = <span class="string">"0050ab8aecec758843fe157b4dde938c"</span>; |
| <span class="kw">let </span>key = <span class="string">"7cb66337f3d3c0fe"</span>; |
| <span class="kw">let </span>iv = <span class="string">"0001020304050607"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::des_ecb(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| </span><span class="kw">fn </span>test_des_ede3() { |
| <span class="kw">let </span>pt = <span class="string">"9994f4c69d40ae4f34ff403b5cf39d4c8207ea5d3e19a5fd"</span>; |
| <span class="kw">let </span>ct = <span class="string">"9e5c4297d60582f81071ac8ab7d0698d4c79de8b94c519858207ea5d3e19a5fd"</span>; |
| <span class="kw">let </span>key = <span class="string">"010203040506070801020304050607080102030405060708"</span>; |
| <span class="kw">let </span>iv = <span class="string">"5cc118306dc702e4"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::des_ede3(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| </span><span class="kw">fn </span>test_des_ede3_cbc() { |
| <span class="kw">let </span>pt = <span class="string">"54686973206973206120746573742e"</span>; |
| <span class="kw">let </span>ct = <span class="string">"6f2867cfefda048a4046ef7e556c7132"</span>; |
| <span class="kw">let </span>key = <span class="string">"7cb66337f3d3c0fe7cb66337f3d3c0fe7cb66337f3d3c0fe"</span>; |
| <span class="kw">let </span>iv = <span class="string">"0001020304050607"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::des_ede3_cbc(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>test_des_ede3_cfb64() { |
| <span class="kw">let </span>pt = <span class="string">"2b1773784b5889dc788477367daa98ad"</span>; |
| <span class="kw">let </span>ct = <span class="string">"6f2867cfefda048a4046ef7e556c7132"</span>; |
| <span class="kw">let </span>key = <span class="string">"7cb66337f3d3c0fe7cb66337f3d3c0fe7cb66337f3d3c0fe"</span>; |
| <span class="kw">let </span>iv = <span class="string">"0001020304050607"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::des_ede3_cfb64(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| </span><span class="kw">fn </span>test_aes128_gcm() { |
| <span class="kw">let </span>key = <span class="string">"23dc8d23d95b6fd1251741a64f7d4f41"</span>; |
| <span class="kw">let </span>iv = <span class="string">"f416f48ad44d9efa1179e167"</span>; |
| <span class="kw">let </span>pt = <span class="string">"6cb9b71dd0ccd42cdf87e8e396fc581fd8e0d700e360f590593b748e105390de"</span>; |
| <span class="kw">let </span>aad = <span class="string">"45074844c97d515c65bbe37c210a5a4b08c21c588efe5c5f73c4d9c17d34dacddc0bb6a8a53f7bf477b9780c1c2a928660df87016b2873fe876b2b887fb5886bfd63216b7eaecc046372a82c047eb043f0b063226ee52a12c69b"</span>; |
| <span class="kw">let </span>ct = <span class="string">"8ad20486778e87387efb3f2574e509951c0626816722018129e578b2787969d3"</span>; |
| <span class="kw">let </span>tag = <span class="string">"91e1bc09"</span>; |
| |
| <span class="comment">// this tag is smaller than you'd normally want, but I pulled this test from the part of |
| // the NIST test vectors that cover 4 byte tags. |
| </span><span class="kw">let </span><span class="kw-2">mut </span>actual_tag = [<span class="number">0</span>; <span class="number">4</span>]; |
| <span class="kw">let </span>out = encrypt_aead( |
| Cipher::aes_128_gcm(), |
| <span class="kw-2">&</span>Vec::from_hex(key).unwrap(), |
| <span class="prelude-val">Some</span>(<span class="kw-2">&</span>Vec::from_hex(iv).unwrap()), |
| <span class="kw-2">&</span>Vec::from_hex(aad).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(pt).unwrap(), |
| <span class="kw-2">&mut </span>actual_tag, |
| ) |
| .unwrap(); |
| <span class="macro">assert_eq!</span>(ct, hex::encode(out)); |
| <span class="macro">assert_eq!</span>(tag, hex::encode(actual_tag)); |
| |
| <span class="kw">let </span>out = decrypt_aead( |
| Cipher::aes_128_gcm(), |
| <span class="kw-2">&</span>Vec::from_hex(key).unwrap(), |
| <span class="prelude-val">Some</span>(<span class="kw-2">&</span>Vec::from_hex(iv).unwrap()), |
| <span class="kw-2">&</span>Vec::from_hex(aad).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(ct).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(tag).unwrap(), |
| ) |
| .unwrap(); |
| <span class="macro">assert_eq!</span>(pt, hex::encode(out)); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>test_aes128_ccm() { |
| <span class="kw">let </span>key = <span class="string">"3ee186594f110fb788a8bf8aa8be5d4a"</span>; |
| <span class="kw">let </span>nonce = <span class="string">"44f705d52acf27b7f17196aa9b"</span>; |
| <span class="kw">let </span>aad = <span class="string">"2c16724296ff85e079627be3053ea95adf35722c21886baba343bd6c79b5cb57"</span>; |
| |
| <span class="kw">let </span>pt = <span class="string">"d71864877f2578db092daba2d6a1f9f4698a9c356c7830a1"</span>; |
| <span class="kw">let </span>ct = <span class="string">"b4dd74e7a0cc51aea45dfb401a41d5822c96901a83247ea0"</span>; |
| <span class="kw">let </span>tag = <span class="string">"d6965f5aa6e31302a9cc2b36"</span>; |
| |
| <span class="kw">let </span><span class="kw-2">mut </span>actual_tag = [<span class="number">0</span>; <span class="number">12</span>]; |
| <span class="kw">let </span>out = encrypt_aead( |
| Cipher::aes_128_ccm(), |
| <span class="kw-2">&</span>Vec::from_hex(key).unwrap(), |
| <span class="prelude-val">Some</span>(<span class="kw-2">&</span>Vec::from_hex(nonce).unwrap()), |
| <span class="kw-2">&</span>Vec::from_hex(aad).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(pt).unwrap(), |
| <span class="kw-2">&mut </span>actual_tag, |
| ) |
| .unwrap(); |
| |
| <span class="macro">assert_eq!</span>(ct, hex::encode(out)); |
| <span class="macro">assert_eq!</span>(tag, hex::encode(actual_tag)); |
| |
| <span class="kw">let </span>out = decrypt_aead( |
| Cipher::aes_128_ccm(), |
| <span class="kw-2">&</span>Vec::from_hex(key).unwrap(), |
| <span class="prelude-val">Some</span>(<span class="kw-2">&</span>Vec::from_hex(nonce).unwrap()), |
| <span class="kw-2">&</span>Vec::from_hex(aad).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(ct).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(tag).unwrap(), |
| ) |
| .unwrap(); |
| <span class="macro">assert_eq!</span>(pt, hex::encode(out)); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>test_aes128_ccm_verify_fail() { |
| <span class="kw">let </span>key = <span class="string">"3ee186594f110fb788a8bf8aa8be5d4a"</span>; |
| <span class="kw">let </span>nonce = <span class="string">"44f705d52acf27b7f17196aa9b"</span>; |
| <span class="kw">let </span>aad = <span class="string">"2c16724296ff85e079627be3053ea95adf35722c21886baba343bd6c79b5cb57"</span>; |
| |
| <span class="kw">let </span>ct = <span class="string">"b4dd74e7a0cc51aea45dfb401a41d5822c96901a83247ea0"</span>; |
| <span class="kw">let </span>tag = <span class="string">"00005f5aa6e31302a9cc2b36"</span>; |
| |
| <span class="kw">let </span>out = decrypt_aead( |
| Cipher::aes_128_ccm(), |
| <span class="kw-2">&</span>Vec::from_hex(key).unwrap(), |
| <span class="prelude-val">Some</span>(<span class="kw-2">&</span>Vec::from_hex(nonce).unwrap()), |
| <span class="kw-2">&</span>Vec::from_hex(aad).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(ct).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(tag).unwrap(), |
| ); |
| <span class="macro">assert!</span>(out.is_err()); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>test_aes256_ccm() { |
| <span class="kw">let </span>key = <span class="string">"7f4af6765cad1d511db07e33aaafd57646ec279db629048aa6770af24849aa0d"</span>; |
| <span class="kw">let </span>nonce = <span class="string">"dde2a362ce81b2b6913abc3095"</span>; |
| <span class="kw">let </span>aad = <span class="string">"404f5df97ece7431987bc098cce994fc3c063b519ffa47b0365226a0015ef695"</span>; |
| |
| <span class="kw">let </span>pt = <span class="string">"7ebef26bf4ecf6f0ebb2eb860edbf900f27b75b4a6340fdb"</span>; |
| <span class="kw">let </span>ct = <span class="string">"353022db9c568bd7183a13c40b1ba30fcc768c54264aa2cd"</span>; |
| <span class="kw">let </span>tag = <span class="string">"2927a053c9244d3217a7ad05"</span>; |
| |
| <span class="kw">let </span><span class="kw-2">mut </span>actual_tag = [<span class="number">0</span>; <span class="number">12</span>]; |
| <span class="kw">let </span>out = encrypt_aead( |
| Cipher::aes_256_ccm(), |
| <span class="kw-2">&</span>Vec::from_hex(key).unwrap(), |
| <span class="prelude-val">Some</span>(<span class="kw-2">&</span>Vec::from_hex(nonce).unwrap()), |
| <span class="kw-2">&</span>Vec::from_hex(aad).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(pt).unwrap(), |
| <span class="kw-2">&mut </span>actual_tag, |
| ) |
| .unwrap(); |
| |
| <span class="macro">assert_eq!</span>(ct, hex::encode(out)); |
| <span class="macro">assert_eq!</span>(tag, hex::encode(actual_tag)); |
| |
| <span class="kw">let </span>out = decrypt_aead( |
| Cipher::aes_256_ccm(), |
| <span class="kw-2">&</span>Vec::from_hex(key).unwrap(), |
| <span class="prelude-val">Some</span>(<span class="kw-2">&</span>Vec::from_hex(nonce).unwrap()), |
| <span class="kw-2">&</span>Vec::from_hex(aad).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(ct).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(tag).unwrap(), |
| ) |
| .unwrap(); |
| <span class="macro">assert_eq!</span>(pt, hex::encode(out)); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>test_aes256_ccm_verify_fail() { |
| <span class="kw">let </span>key = <span class="string">"7f4af6765cad1d511db07e33aaafd57646ec279db629048aa6770af24849aa0d"</span>; |
| <span class="kw">let </span>nonce = <span class="string">"dde2a362ce81b2b6913abc3095"</span>; |
| <span class="kw">let </span>aad = <span class="string">"404f5df97ece7431987bc098cce994fc3c063b519ffa47b0365226a0015ef695"</span>; |
| |
| <span class="kw">let </span>ct = <span class="string">"353022db9c568bd7183a13c40b1ba30fcc768c54264aa2cd"</span>; |
| <span class="kw">let </span>tag = <span class="string">"0000a053c9244d3217a7ad05"</span>; |
| |
| <span class="kw">let </span>out = decrypt_aead( |
| Cipher::aes_256_ccm(), |
| <span class="kw-2">&</span>Vec::from_hex(key).unwrap(), |
| <span class="prelude-val">Some</span>(<span class="kw-2">&</span>Vec::from_hex(nonce).unwrap()), |
| <span class="kw-2">&</span>Vec::from_hex(aad).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(ct).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(tag).unwrap(), |
| ); |
| <span class="macro">assert!</span>(out.is_err()); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(ossl110)] |
| </span><span class="kw">fn </span>test_aes_128_ocb() { |
| <span class="kw">let </span>key = <span class="string">"000102030405060708090a0b0c0d0e0f"</span>; |
| <span class="kw">let </span>aad = <span class="string">"0001020304050607"</span>; |
| <span class="kw">let </span>tag = <span class="string">"16dc76a46d47e1ead537209e8a96d14e"</span>; |
| <span class="kw">let </span>iv = <span class="string">"000102030405060708090a0b"</span>; |
| <span class="kw">let </span>pt = <span class="string">"0001020304050607"</span>; |
| <span class="kw">let </span>ct = <span class="string">"92b657130a74b85a"</span>; |
| |
| <span class="kw">let </span><span class="kw-2">mut </span>actual_tag = [<span class="number">0</span>; <span class="number">16</span>]; |
| <span class="kw">let </span>out = encrypt_aead( |
| Cipher::aes_128_ocb(), |
| <span class="kw-2">&</span>Vec::from_hex(key).unwrap(), |
| <span class="prelude-val">Some</span>(<span class="kw-2">&</span>Vec::from_hex(iv).unwrap()), |
| <span class="kw-2">&</span>Vec::from_hex(aad).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(pt).unwrap(), |
| <span class="kw-2">&mut </span>actual_tag, |
| ) |
| .unwrap(); |
| |
| <span class="macro">assert_eq!</span>(ct, hex::encode(out)); |
| <span class="macro">assert_eq!</span>(tag, hex::encode(actual_tag)); |
| |
| <span class="kw">let </span>out = decrypt_aead( |
| Cipher::aes_128_ocb(), |
| <span class="kw-2">&</span>Vec::from_hex(key).unwrap(), |
| <span class="prelude-val">Some</span>(<span class="kw-2">&</span>Vec::from_hex(iv).unwrap()), |
| <span class="kw-2">&</span>Vec::from_hex(aad).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(ct).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(tag).unwrap(), |
| ) |
| .unwrap(); |
| <span class="macro">assert_eq!</span>(pt, hex::encode(out)); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(ossl110)] |
| </span><span class="kw">fn </span>test_aes_128_ocb_fail() { |
| <span class="kw">let </span>key = <span class="string">"000102030405060708090a0b0c0d0e0f"</span>; |
| <span class="kw">let </span>aad = <span class="string">"0001020304050607"</span>; |
| <span class="kw">let </span>tag = <span class="string">"16dc76a46d47e1ead537209e8a96d14e"</span>; |
| <span class="kw">let </span>iv = <span class="string">"000000000405060708090a0b"</span>; |
| <span class="kw">let </span>ct = <span class="string">"92b657130a74b85a"</span>; |
| |
| <span class="kw">let </span>out = decrypt_aead( |
| Cipher::aes_128_ocb(), |
| <span class="kw-2">&</span>Vec::from_hex(key).unwrap(), |
| <span class="prelude-val">Some</span>(<span class="kw-2">&</span>Vec::from_hex(iv).unwrap()), |
| <span class="kw-2">&</span>Vec::from_hex(aad).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(ct).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(tag).unwrap(), |
| ); |
| <span class="macro">assert!</span>(out.is_err()); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(any(ossl110))] |
| </span><span class="kw">fn </span>test_chacha20() { |
| <span class="kw">let </span>key = <span class="string">"0000000000000000000000000000000000000000000000000000000000000000"</span>; |
| <span class="kw">let </span>iv = <span class="string">"00000000000000000000000000000000"</span>; |
| <span class="kw">let </span>pt = |
| <span class="string">"000000000000000000000000000000000000000000000000000000000000000000000000000000000\ |
| 00000000000000000000000000000000000000000000000"</span>; |
| <span class="kw">let </span>ct = |
| <span class="string">"76b8e0ada0f13d90405d6ae55386bd28bdd219b8a08ded1aa836efcc8b770dc7da41597c5157488d7\ |
| 724e03fb8d84a376a43b8f41518a11cc387b669b2ee6586"</span>; |
| |
| cipher_test(Cipher::chacha20(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(any(ossl110))] |
| </span><span class="kw">fn </span>test_chacha20_poly1305() { |
| <span class="kw">let </span>key = <span class="string">"808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9f"</span>; |
| <span class="kw">let </span>iv = <span class="string">"070000004041424344454647"</span>; |
| <span class="kw">let </span>aad = <span class="string">"50515253c0c1c2c3c4c5c6c7"</span>; |
| <span class="kw">let </span>pt = |
| <span class="string">"4c616469657320616e642047656e746c656d656e206f662074686520636c617373206f66202739393\ |
| a204966204920636f756c64206f6666657220796f75206f6e6c79206f6e652074697020666f722074\ |
| 6865206675747572652c2073756e73637265656e20776f756c642062652069742e"</span>; |
| <span class="kw">let </span>ct = |
| <span class="string">"d31a8d34648e60db7b86afbc53ef7ec2a4aded51296e08fea9e2b5a736ee62d63dbea45e8ca967128\ |
| 2fafb69da92728b1a71de0a9e060b2905d6a5b67ecd3b3692ddbd7f2d778b8c9803aee328091b58fa\ |
| b324e4fad675945585808b4831d7bc3ff4def08e4b7a9de576d26586cec64b6116"</span>; |
| <span class="kw">let </span>tag = <span class="string">"1ae10b594f09e26a7e902ecbd0600691"</span>; |
| |
| <span class="kw">let </span><span class="kw-2">mut </span>actual_tag = [<span class="number">0</span>; <span class="number">16</span>]; |
| <span class="kw">let </span>out = encrypt_aead( |
| Cipher::chacha20_poly1305(), |
| <span class="kw-2">&</span>Vec::from_hex(key).unwrap(), |
| <span class="prelude-val">Some</span>(<span class="kw-2">&</span>Vec::from_hex(iv).unwrap()), |
| <span class="kw-2">&</span>Vec::from_hex(aad).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(pt).unwrap(), |
| <span class="kw-2">&mut </span>actual_tag, |
| ) |
| .unwrap(); |
| <span class="macro">assert_eq!</span>(ct, hex::encode(out)); |
| <span class="macro">assert_eq!</span>(tag, hex::encode(actual_tag)); |
| |
| <span class="kw">let </span>out = decrypt_aead( |
| Cipher::chacha20_poly1305(), |
| <span class="kw-2">&</span>Vec::from_hex(key).unwrap(), |
| <span class="prelude-val">Some</span>(<span class="kw-2">&</span>Vec::from_hex(iv).unwrap()), |
| <span class="kw-2">&</span>Vec::from_hex(aad).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(ct).unwrap(), |
| <span class="kw-2">&</span>Vec::from_hex(tag).unwrap(), |
| ) |
| .unwrap(); |
| <span class="macro">assert_eq!</span>(pt, hex::encode(out)); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(any(boringssl, osslconf = <span class="string">"OPENSSL_NO_SEED"</span>, ossl300)))] |
| </span><span class="kw">fn </span>test_seed_cbc() { |
| <span class="attribute">#[cfg(ossl300)] |
| </span><span class="kw">let </span>_provider = <span class="kw">crate</span>::provider::Provider::try_load(<span class="prelude-val">None</span>, <span class="string">"legacy"</span>, <span class="bool-val">true</span>).unwrap(); |
| |
| <span class="kw">let </span>pt = <span class="string">"5363686f6b6f6c6164656e6b756368656e0a"</span>; |
| <span class="kw">let </span>ct = <span class="string">"c2edf0fb2eb11bf7b2f39417a8528896d34b24b6fd79e5923b116dfcd2aba5a4"</span>; |
| <span class="kw">let </span>key = <span class="string">"41414141414141414141414141414141"</span>; |
| <span class="kw">let </span>iv = <span class="string">"41414141414141414141414141414141"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::seed_cbc(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(any(boringssl, osslconf = <span class="string">"OPENSSL_NO_SEED"</span>, ossl300)))] |
| </span><span class="kw">fn </span>test_seed_cfb128() { |
| <span class="attribute">#[cfg(ossl300)] |
| </span><span class="kw">let </span>_provider = <span class="kw">crate</span>::provider::Provider::try_load(<span class="prelude-val">None</span>, <span class="string">"legacy"</span>, <span class="bool-val">true</span>).unwrap(); |
| |
| <span class="kw">let </span>pt = <span class="string">"5363686f6b6f6c6164656e6b756368656e0a"</span>; |
| <span class="kw">let </span>ct = <span class="string">"71d4d25fc1750cb7789259e7f34061939a41"</span>; |
| <span class="kw">let </span>key = <span class="string">"41414141414141414141414141414141"</span>; |
| <span class="kw">let </span>iv = <span class="string">"41414141414141414141414141414141"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::seed_cfb128(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(any(boringssl, osslconf = <span class="string">"OPENSSL_NO_SEED"</span>, ossl300)))] |
| </span><span class="kw">fn </span>test_seed_ecb() { |
| <span class="attribute">#[cfg(ossl300)] |
| </span><span class="kw">let </span>_provider = <span class="kw">crate</span>::provider::Provider::try_load(<span class="prelude-val">None</span>, <span class="string">"legacy"</span>, <span class="bool-val">true</span>).unwrap(); |
| |
| <span class="kw">let </span>pt = <span class="string">"5363686f6b6f6c6164656e6b756368656e0a"</span>; |
| <span class="kw">let </span>ct = <span class="string">"0263a9cd498cf0edb0ef72a3231761d00ce601f7d08ad19ad74f0815f2c77f7e"</span>; |
| <span class="kw">let </span>key = <span class="string">"41414141414141414141414141414141"</span>; |
| <span class="kw">let </span>iv = <span class="string">"41414141414141414141414141414141"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::seed_ecb(), pt, ct, key, iv); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(any(boringssl, osslconf = <span class="string">"OPENSSL_NO_SEED"</span>, ossl300)))] |
| </span><span class="kw">fn </span>test_seed_ofb() { |
| <span class="attribute">#[cfg(ossl300)] |
| </span><span class="kw">let </span>_provider = <span class="kw">crate</span>::provider::Provider::try_load(<span class="prelude-val">None</span>, <span class="string">"legacy"</span>, <span class="bool-val">true</span>).unwrap(); |
| |
| <span class="kw">let </span>pt = <span class="string">"5363686f6b6f6c6164656e6b756368656e0a"</span>; |
| <span class="kw">let </span>ct = <span class="string">"71d4d25fc1750cb7789259e7f34061930afd"</span>; |
| <span class="kw">let </span>key = <span class="string">"41414141414141414141414141414141"</span>; |
| <span class="kw">let </span>iv = <span class="string">"41414141414141414141414141414141"</span>; |
| |
| cipher_test(<span class="kw">super</span>::Cipher::seed_ofb(), pt, ct, key, iv); |
| } |
| |
| <span class="comment">// GB/T 32907-2016 |
| // http://openstd.samr.gov.cn/bzgk/gb/newGbInfo?hcno=7803DE42D3BC5E80B0C3E5D8E873D56A |
| </span><span class="attribute">#[test] |
| #[cfg(all(any(ossl111, libressl291), not(osslconf = <span class="string">"OPENSSL_NO_SM4"</span>)))] |
| </span><span class="kw">fn </span>test_sm4_ecb() { |
| <span class="kw">use </span>std::mem; |
| |
| <span class="kw">let </span>key = <span class="macro">vec!</span>[ |
| <span class="number">0x01</span>, <span class="number">0x23</span>, <span class="number">0x45</span>, <span class="number">0x67</span>, <span class="number">0x89</span>, <span class="number">0xab</span>, <span class="number">0xcd</span>, <span class="number">0xef</span>, <span class="number">0xfe</span>, <span class="number">0xdc</span>, <span class="number">0xba</span>, <span class="number">0x98</span>, <span class="number">0x76</span>, <span class="number">0x54</span>, |
| <span class="number">0x32</span>, <span class="number">0x10</span>, |
| ]; |
| <span class="kw">let </span>pt = <span class="macro">vec!</span>[ |
| <span class="number">0x01</span>, <span class="number">0x23</span>, <span class="number">0x45</span>, <span class="number">0x67</span>, <span class="number">0x89</span>, <span class="number">0xab</span>, <span class="number">0xcd</span>, <span class="number">0xef</span>, <span class="number">0xfe</span>, <span class="number">0xdc</span>, <span class="number">0xba</span>, <span class="number">0x98</span>, <span class="number">0x76</span>, <span class="number">0x54</span>, |
| <span class="number">0x32</span>, <span class="number">0x10</span>, |
| ]; |
| <span class="kw">let </span>ct = <span class="macro">vec!</span>[ |
| <span class="number">0x68</span>, <span class="number">0x1e</span>, <span class="number">0xdf</span>, <span class="number">0x34</span>, <span class="number">0xd2</span>, <span class="number">0x06</span>, <span class="number">0x96</span>, <span class="number">0x5e</span>, <span class="number">0x86</span>, <span class="number">0xb3</span>, <span class="number">0xe9</span>, <span class="number">0x4f</span>, <span class="number">0x53</span>, <span class="number">0x6e</span>, |
| <span class="number">0x42</span>, <span class="number">0x46</span>, |
| ]; |
| <span class="kw">let </span>ct1 = <span class="macro">vec!</span>[ |
| <span class="number">0x59</span>, <span class="number">0x52</span>, <span class="number">0x98</span>, <span class="number">0xc7</span>, <span class="number">0xc6</span>, <span class="number">0xfd</span>, <span class="number">0x27</span>, <span class="number">0x1f</span>, <span class="number">0x04</span>, <span class="number">0x02</span>, <span class="number">0xf8</span>, <span class="number">0x04</span>, <span class="number">0xc3</span>, <span class="number">0x3d</span>, |
| <span class="number">0x3f</span>, <span class="number">0x66</span>, |
| ]; |
| |
| <span class="kw">let </span>block_size = Cipher::sm4_ecb().block_size(); |
| <span class="kw">let </span><span class="kw-2">mut </span>c = Crypter::new(Cipher::sm4_ecb(), Mode::Encrypt, <span class="kw-2">&</span>key, <span class="prelude-val">None</span>).unwrap(); |
| c.pad(<span class="bool-val">false</span>); |
| |
| <span class="comment">// 1 round |
| </span><span class="kw">let </span><span class="kw-2">mut </span>r = <span class="macro">vec!</span>[<span class="number">0</span>; pt.len() + Cipher::sm4_ecb().block_size()]; |
| <span class="kw">let </span>count = c.update(<span class="kw-2">&</span>pt, <span class="kw-2">&mut </span>r).unwrap(); |
| <span class="macro">assert_eq!</span>(ct, <span class="kw-2">&</span>r[..count]); |
| |
| <span class="comment">// 1000000 rounds |
| </span><span class="kw">let </span><span class="kw-2">mut </span>r1 = <span class="macro">vec!</span>[<span class="number">0</span>; pt.len() + Cipher::sm4_ecb().block_size()]; |
| <span class="kw">for _ in </span><span class="number">0</span>..<span class="number">999999 </span>{ |
| c.update(<span class="kw-2">&</span>r[..block_size], <span class="kw-2">&mut </span>r1).unwrap(); |
| mem::swap(<span class="kw-2">&mut </span>r, <span class="kw-2">&mut </span>r1); |
| } |
| <span class="macro">assert_eq!</span>(ct1, <span class="kw-2">&</span>r[..count]); |
| } |
| } |
| </code></pre></div> |
| </section></div></main><div id="rustdoc-vars" data-root-path="../../" data-current-crate="openssl" data-themes="ayu,dark,light" data-resource-suffix="" data-rustdoc-version="1.66.0-nightly (5c8bff74b 2022-10-21)" ></div></body></html> |