Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
PaddlePaddle
Paddle
提交
5a7a517c
P
Paddle
项目概览
PaddlePaddle
/
Paddle
大约 1 年 前同步成功
通知
2298
Star
20931
Fork
5422
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
1423
列表
看板
标记
里程碑
合并请求
543
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
P
Paddle
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
1,423
Issue
1,423
列表
看板
标记
里程碑
合并请求
543
合并请求
543
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
体验新版 GitCode,发现更多精彩内容 >>
未验证
提交
5a7a517c
编写于
5月 27, 2020
作者:
Y
Yanghello
提交者:
GitHub
5月 27, 2020
1
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Add crypto api (#24694)
上级
dbcd7c69
变更
13
隐藏空白更改
内联
并排
Showing
13 changed file
with
962 addition
and
0 deletion
+962
-0
CMakeLists.txt
CMakeLists.txt
+1
-0
cmake/external/cryptopp.cmake
cmake/external/cryptopp.cmake
+82
-0
cmake/third_party.cmake
cmake/third_party.cmake
+4
-0
paddle/fluid/framework/io/CMakeLists.txt
paddle/fluid/framework/io/CMakeLists.txt
+3
-0
paddle/fluid/framework/io/crypto/CMakeLists.txt
paddle/fluid/framework/io/crypto/CMakeLists.txt
+3
-0
paddle/fluid/framework/io/crypto/aes_cipher.cc
paddle/fluid/framework/io/crypto/aes_cipher.cc
+284
-0
paddle/fluid/framework/io/crypto/aes_cipher.h
paddle/fluid/framework/io/crypto/aes_cipher.h
+100
-0
paddle/fluid/framework/io/crypto/aes_cipher_test.cc
paddle/fluid/framework/io/crypto/aes_cipher_test.cc
+117
-0
paddle/fluid/framework/io/crypto/cipher.cc
paddle/fluid/framework/io/crypto/cipher.cc
+60
-0
paddle/fluid/framework/io/crypto/cipher.h
paddle/fluid/framework/io/crypto/cipher.h
+51
-0
paddle/fluid/framework/io/crypto/cipher_utils.cc
paddle/fluid/framework/io/crypto/cipher_utils.cc
+117
-0
paddle/fluid/framework/io/crypto/cipher_utils.h
paddle/fluid/framework/io/crypto/cipher_utils.h
+63
-0
paddle/fluid/framework/io/crypto/cipher_utils_test.cc
paddle/fluid/framework/io/crypto/cipher_utils_test.cc
+77
-0
未找到文件。
CMakeLists.txt
浏览文件 @
5a7a517c
...
@@ -88,6 +88,7 @@ option(WITH_DGC "Use DGC(Deep Gradient Compression) or not" ${WITH_DISTRIBUTE}
...
@@ -88,6 +88,7 @@ option(WITH_DGC "Use DGC(Deep Gradient Compression) or not" ${WITH_DISTRIBUTE}
option
(
SANITIZER_TYPE
"Choose the type of sanitizer, options are: Address, Leak, Memory, Thread, Undefined"
OFF
)
option
(
SANITIZER_TYPE
"Choose the type of sanitizer, options are: Address, Leak, Memory, Thread, Undefined"
OFF
)
option
(
WITH_LITE
"Compile Paddle Fluid with Lite Engine"
OFF
)
option
(
WITH_LITE
"Compile Paddle Fluid with Lite Engine"
OFF
)
option
(
WITH_NCCL
"Compile PaddlePaddle with NCCL support"
ON
)
option
(
WITH_NCCL
"Compile PaddlePaddle with NCCL support"
ON
)
option
(
WITH_CRYPTO
"Compile PaddlePaddle with paddle_crypto lib"
ON
)
# PY_VERSION
# PY_VERSION
if
(
NOT PY_VERSION
)
if
(
NOT PY_VERSION
)
...
...
cmake/external/cryptopp.cmake
0 → 100644
浏览文件 @
5a7a517c
# Copyright (c) 2016 PaddlePaddle Authors. All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
INCLUDE
(
ExternalProject
)
SET
(
CRYPTOPP_PREFIX_DIR
${
THIRD_PARTY_PATH
}
/cryptopp
)
SET
(
CRYPTOPP_INSTALL_DIR
${
THIRD_PARTY_PATH
}
/install/cryptopp
)
SET
(
CRYPTOPP_INCLUDE_DIR
"
${
CRYPTOPP_INSTALL_DIR
}
/include"
CACHE PATH
"cryptopp include directory."
FORCE
)
SET
(
CRYPTOPP_REPOSITORY https://github.com/weidai11/cryptopp.git
)
SET
(
CRYPTOPP_TAG CRYPTOPP_8_2_0
)
IF
(
WIN32
)
SET
(
CRYPTOPP_LIBRARIES
"
${
CRYPTOPP_INSTALL_DIR
}
/lib/cryptopp-static.lib"
CACHE FILEPATH
"cryptopp library."
FORCE
)
SET
(
CRYPTOPP_CMAKE_CXX_FLAGS
"
${
CMAKE_CXX_FLAGS
}
"
)
set
(
CMAKE_CXX_FLAGS_RELEASE
"
${
CMAKE_CXX_FLAGS_RELEASE
}
/MT"
)
set
(
CMAKE_CXX_FLAGS_DEBUG
"
${
CMAKE_CXX_FLAGS_DEBUG
}
/MTd"
)
set
(
CompilerFlags
CMAKE_CXX_FLAGS
CMAKE_CXX_FLAGS_DEBUG
CMAKE_CXX_FLAGS_RELEASE
CMAKE_C_FLAGS
CMAKE_C_FLAGS_DEBUG
CMAKE_C_FLAGS_RELEASE
)
foreach
(
CompilerFlag
${
CompilerFlags
}
)
string
(
REPLACE
"/MD"
"/MT"
${
CompilerFlag
}
"
${${
CompilerFlag
}}
"
)
endforeach
()
ELSE
(
WIN32
)
SET
(
CRYPTOPP_LIBRARIES
"
${
CRYPTOPP_INSTALL_DIR
}
/lib/libcryptopp.a"
CACHE FILEPATH
"cryptopp library."
FORCE
)
SET
(
CRYPTOPP_CMAKE_CXX_FLAGS
${
CMAKE_CXX_FLAGS
}
)
ENDIF
(
WIN32
)
set
(
CRYPTOPP_CMAKE_ARGS
${
COMMON_CMAKE_ARGS
}
-DBUILD_SHARED=ON
-DBUILD_STATIC=ON
-DBUILD_TESTING=OFF
-DCMAKE_INSTALL_LIBDIR=
${
CRYPTOPP_INSTALL_DIR
}
/lib
-DCMAKE_INSTALL_PREFIX=
${
CRYPTOPP_INSTALL_DIR
}
-DCMAKE_BUILD_TYPE=
${
THIRD_PARTY_BUILD_TYPE
}
-DCMAKE_CXX_FLAGS=
${
CRYPTOPP_CMAKE_CXX_FLAGS
}
-DCMAKE_CXX_FLAGS_RELEASE=
${
CMAKE_CXX_FLAGS_RELEASE
}
)
INCLUDE_DIRECTORIES
(
${
CRYPTOPP_INCLUDE_DIR
}
)
cache_third_party
(
extern_cryptopp
REPOSITORY
${
CRYPTOPP_REPOSITORY
}
TAG
${
CRYPTOPP_TAG
}
DIR CRYPTOPP_SOURCE_DIR
)
ExternalProject_Add
(
extern_cryptopp
${
EXTERNAL_PROJECT_LOG_ARGS
}
${
SHALLOW_CLONE
}
"
${
CRYPTOPP_DOWNLOAD_CMD
}
"
PREFIX
${
CRYPTOPP_PREFIX_DIR
}
SOURCE_DIR
${
CRYPTOPP_SOURCE_DIR
}
PATCH_COMMAND
COMMAND
${
CMAKE_COMMAND
}
-E remove_directory
"<SOURCE_DIR>/cmake/"
COMMAND git clone -b
${
CRYPTOPP_TAG
}
https://github.com/noloader/cryptopp-cmake
"<SOURCE_DIR>/cmake"
COMMAND
${
CMAKE_COMMAND
}
-E copy_directory
"<SOURCE_DIR>/cmake/"
"<SOURCE_DIR>/"
INSTALL_DIR
${
CRYPTOPP_INSTALL_DIR
}
CMAKE_ARGS
${
CRYPTOPP_CMAKE_ARGS
}
CMAKE_CACHE_ARGS -DCMAKE_INSTALL_PREFIX:PATH=
${
CRYPTOPP_INSTALL_DIR
}
-DCMAKE_POSITION_INDEPENDENT_CODE:BOOL=ON
-DCMAKE_BUILD_TYPE:STRING=
${
THIRD_PARTY_BUILD_TYPE
}
)
ADD_LIBRARY
(
cryptopp STATIC IMPORTED GLOBAL
)
SET_PROPERTY
(
TARGET cryptopp PROPERTY IMPORTED_LOCATION
${
CRYPTOPP_LIBRARIES
}
)
ADD_DEPENDENCIES
(
cryptopp extern_cryptopp
)
cmake/third_party.cmake
浏览文件 @
5a7a517c
...
@@ -305,4 +305,8 @@ if (WITH_LITE)
...
@@ -305,4 +305,8 @@ if (WITH_LITE)
include
(
external/lite
)
include
(
external/lite
)
endif
(
WITH_LITE
)
endif
(
WITH_LITE
)
if
(
WITH_CRYPTO
)
include
(
external/cryptopp
)
# download, build, install cryptopp
endif
(
WITH_CRYPTO
)
add_custom_target
(
third_party ALL DEPENDS
${
third_party_deps
}
)
add_custom_target
(
third_party ALL DEPENDS
${
third_party_deps
}
)
paddle/fluid/framework/io/CMakeLists.txt
浏览文件 @
5a7a517c
...
@@ -2,3 +2,6 @@ cc_library(fs SRCS fs.cc DEPS string_helper glog boost)
...
@@ -2,3 +2,6 @@ cc_library(fs SRCS fs.cc DEPS string_helper glog boost)
cc_library
(
shell SRCS shell.cc DEPS string_helper glog timer enforce
)
cc_library
(
shell SRCS shell.cc DEPS string_helper glog timer enforce
)
cc_test
(
test_fs SRCS test_fs.cc DEPS fs shell
)
cc_test
(
test_fs SRCS test_fs.cc DEPS fs shell
)
if
(
WITH_CRYPTO
)
add_subdirectory
(
crypto
)
endif
(
WITH_CRYPTO
)
paddle/fluid/framework/io/crypto/CMakeLists.txt
0 → 100644
浏览文件 @
5a7a517c
cc_library
(
paddle_crypto SRCS cipher_utils.cc cipher.cc aes_cipher.cc DEPS cryptopp enforce
)
cc_test
(
aes_cipher_test SRCS aes_cipher_test.cc DEPS paddle_crypto
)
cc_test
(
cipher_utils_test SRCS cipher_utils_test.cc DEPS paddle_crypto
)
paddle/fluid/framework/io/crypto/aes_cipher.cc
0 → 100644
浏览文件 @
5a7a517c
// Copyright (c) 2020 PaddlePaddle Authors. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include "paddle/fluid/framework/io/crypto/aes_cipher.h"
#include <cryptopp/aes.h>
#include <cryptopp/ccm.h>
#include <cryptopp/cryptlib.h>
#include <cryptopp/filters.h>
#include <cryptopp/gcm.h>
#include <cryptopp/modes.h>
#include <cryptopp/smartptr.h>
#include <set>
#include <string>
#include "paddle/fluid/framework/io/crypto/cipher_utils.h"
#include "paddle/fluid/platform/enforce.h"
namespace
paddle
{
namespace
framework
{
void
AESCipher
::
Init
(
const
std
::
string
&
cipher_name
,
const
int
&
iv_size
,
const
int
&
tag_size
)
{
aes_cipher_name_
=
cipher_name
;
iv_size_
=
iv_size
;
tag_size_
=
tag_size
;
std
::
set
<
std
::
string
>
authented_cipher_set
{
"AES_GCM_NoPadding"
};
if
(
authented_cipher_set
.
find
(
cipher_name
)
!=
authented_cipher_set
.
end
())
{
is_authenticated_cipher_
=
true
;
}
}
std
::
string
AESCipher
::
EncryptInternal
(
const
std
::
string
&
plaintext
,
const
std
::
string
&
key
)
{
CryptoPP
::
member_ptr
<
CryptoPP
::
SymmetricCipher
>
m_cipher
;
CryptoPP
::
member_ptr
<
CryptoPP
::
StreamTransformationFilter
>
m_filter
;
bool
need_iv
=
false
;
std
::
string
iv
=
""
;
const
unsigned
char
*
key_char
=
reinterpret_cast
<
const
unsigned
char
*>
(
&
(
key
.
at
(
0
)));
BuildCipher
(
true
,
&
need_iv
,
&
m_cipher
,
&
m_filter
);
if
(
need_iv
)
{
iv_
=
CipherUtils
::
GenKey
(
iv_size_
);
m_cipher
.
get
()
->
SetKeyWithIV
(
key_char
,
key
.
size
(),
reinterpret_cast
<
const
unsigned
char
*>
(
&
(
iv_
.
at
(
0
))),
iv_
.
size
());
}
else
{
m_cipher
.
get
()
->
SetKey
(
key_char
,
key
.
size
());
}
std
::
string
ciphertext
;
m_filter
->
Attach
(
new
CryptoPP
::
StringSink
(
ciphertext
));
CryptoPP
::
StringSource
(
plaintext
,
true
,
new
CryptoPP
::
Redirector
(
*
m_filter
));
if
(
need_iv
)
{
ciphertext
=
iv_
.
append
(
ciphertext
);
}
return
ciphertext
;
}
std
::
string
AESCipher
::
DecryptInternal
(
const
std
::
string
&
ciphertext
,
const
std
::
string
&
key
)
{
CryptoPP
::
member_ptr
<
CryptoPP
::
SymmetricCipher
>
m_cipher
;
CryptoPP
::
member_ptr
<
CryptoPP
::
StreamTransformationFilter
>
m_filter
;
bool
need_iv
=
false
;
std
::
string
iv
=
""
;
const
unsigned
char
*
key_char
=
reinterpret_cast
<
const
unsigned
char
*>
(
&
(
key
.
at
(
0
)));
BuildCipher
(
false
,
&
need_iv
,
&
m_cipher
,
&
m_filter
);
int
ciphertext_beg
=
0
;
if
(
need_iv
)
{
iv_
=
ciphertext
.
substr
(
0
,
iv_size_
/
8
);
ciphertext_beg
=
iv_size_
/
8
;
m_cipher
.
get
()
->
SetKeyWithIV
(
key_char
,
key
.
size
(),
reinterpret_cast
<
const
unsigned
char
*>
(
&
(
iv_
.
at
(
0
))),
iv_
.
size
());
}
else
{
m_cipher
.
get
()
->
SetKey
(
key_char
,
key
.
size
());
}
std
::
string
plaintext
;
m_filter
->
Attach
(
new
CryptoPP
::
StringSink
(
plaintext
));
CryptoPP
::
StringSource
(
ciphertext
.
substr
(
ciphertext_beg
),
true
,
new
CryptoPP
::
Redirector
(
*
m_filter
));
return
plaintext
;
}
std
::
string
AESCipher
::
AuthenticatedEncryptInternal
(
const
std
::
string
&
plaintext
,
const
std
::
string
&
key
)
{
CryptoPP
::
member_ptr
<
CryptoPP
::
AuthenticatedSymmetricCipher
>
m_cipher
;
CryptoPP
::
member_ptr
<
CryptoPP
::
AuthenticatedEncryptionFilter
>
m_filter
;
bool
need_iv
=
false
;
std
::
string
iv
=
""
;
const
unsigned
char
*
key_char
=
reinterpret_cast
<
const
unsigned
char
*>
(
&
(
key
.
at
(
0
)));
BuildAuthEncCipher
(
&
need_iv
,
&
m_cipher
,
&
m_filter
);
if
(
need_iv
)
{
iv_
=
CipherUtils
::
GenKey
(
iv_size_
);
m_cipher
.
get
()
->
SetKeyWithIV
(
key_char
,
key
.
size
(),
reinterpret_cast
<
const
unsigned
char
*>
(
&
(
iv_
.
at
(
0
))),
iv_
.
size
());
}
else
{
m_cipher
.
get
()
->
SetKey
(
key_char
,
key
.
size
());
}
std
::
string
ciphertext
;
m_filter
->
Attach
(
new
CryptoPP
::
StringSink
(
ciphertext
));
CryptoPP
::
StringSource
(
plaintext
,
true
,
new
CryptoPP
::
Redirector
(
*
m_filter
));
if
(
need_iv
)
{
ciphertext
=
iv_
.
append
(
ciphertext
);
}
return
ciphertext
;
}
std
::
string
AESCipher
::
AuthenticatedDecryptInternal
(
const
std
::
string
&
ciphertext
,
const
std
::
string
&
key
)
{
CryptoPP
::
member_ptr
<
CryptoPP
::
AuthenticatedSymmetricCipher
>
m_cipher
;
CryptoPP
::
member_ptr
<
CryptoPP
::
AuthenticatedDecryptionFilter
>
m_filter
;
bool
need_iv
=
false
;
std
::
string
iv
=
""
;
const
unsigned
char
*
key_char
=
reinterpret_cast
<
const
unsigned
char
*>
(
&
(
key
.
at
(
0
)));
BuildAuthDecCipher
(
&
need_iv
,
&
m_cipher
,
&
m_filter
);
int
ciphertext_beg
=
0
;
if
(
need_iv
)
{
iv_
=
ciphertext
.
substr
(
0
,
iv_size_
/
8
);
ciphertext_beg
=
iv_size_
/
8
;
m_cipher
.
get
()
->
SetKeyWithIV
(
key_char
,
key
.
size
(),
reinterpret_cast
<
const
unsigned
char
*>
(
&
(
iv_
.
at
(
0
))),
iv_
.
size
());
}
else
{
m_cipher
.
get
()
->
SetKey
(
key_char
,
key
.
size
());
}
std
::
string
plaintext
;
m_filter
->
Attach
(
new
CryptoPP
::
StringSink
(
plaintext
));
CryptoPP
::
StringSource
(
ciphertext
.
substr
(
ciphertext_beg
),
true
,
new
CryptoPP
::
Redirector
(
*
m_filter
));
PADDLE_ENFORCE_EQ
(
m_filter
->
GetLastResult
(),
true
,
paddle
::
platform
::
errors
::
InvalidArgument
(
"Integrity check failed. "
"Invalid ciphertext input."
));
return
plaintext
;
}
void
AESCipher
::
BuildCipher
(
bool
for_encrypt
,
bool
*
need_iv
,
CryptoPP
::
member_ptr
<
CryptoPP
::
SymmetricCipher
>*
m_cipher
,
CryptoPP
::
member_ptr
<
CryptoPP
::
StreamTransformationFilter
>*
m_filter
)
{
if
(
aes_cipher_name_
==
"AES_ECB_PKCSPadding"
&&
for_encrypt
)
{
m_cipher
->
reset
(
new
CryptoPP
::
ECB_Mode
<
CryptoPP
::
AES
>::
Encryption
);
m_filter
->
reset
(
new
CryptoPP
::
StreamTransformationFilter
(
*
(
*
m_cipher
).
get
(),
NULL
,
CryptoPP
::
BlockPaddingSchemeDef
::
PKCS_PADDING
));
}
else
if
(
aes_cipher_name_
==
"AES_ECB_PKCSPadding"
&&
!
for_encrypt
)
{
m_cipher
->
reset
(
new
CryptoPP
::
ECB_Mode
<
CryptoPP
::
AES
>::
Decryption
);
m_filter
->
reset
(
new
CryptoPP
::
StreamTransformationFilter
(
*
(
*
m_cipher
).
get
(),
NULL
,
CryptoPP
::
BlockPaddingSchemeDef
::
PKCS_PADDING
));
}
else
if
(
aes_cipher_name_
==
"AES_CBC_PKCSPadding"
&&
for_encrypt
)
{
m_cipher
->
reset
(
new
CryptoPP
::
CBC_Mode
<
CryptoPP
::
AES
>::
Encryption
);
*
need_iv
=
true
;
m_filter
->
reset
(
new
CryptoPP
::
StreamTransformationFilter
(
*
(
*
m_cipher
).
get
(),
NULL
,
CryptoPP
::
BlockPaddingSchemeDef
::
PKCS_PADDING
));
}
else
if
(
aes_cipher_name_
==
"AES_CBC_PKCSPadding"
&&
!
for_encrypt
)
{
m_cipher
->
reset
(
new
CryptoPP
::
CBC_Mode
<
CryptoPP
::
AES
>::
Decryption
);
*
need_iv
=
true
;
m_filter
->
reset
(
new
CryptoPP
::
StreamTransformationFilter
(
*
(
*
m_cipher
).
get
(),
NULL
,
CryptoPP
::
BlockPaddingSchemeDef
::
PKCS_PADDING
));
}
else
if
(
aes_cipher_name_
==
"AES_CTR_NoPadding"
&&
for_encrypt
)
{
m_cipher
->
reset
(
new
CryptoPP
::
CTR_Mode
<
CryptoPP
::
AES
>::
Encryption
);
*
need_iv
=
true
;
m_filter
->
reset
(
new
CryptoPP
::
StreamTransformationFilter
(
*
(
*
m_cipher
).
get
(),
NULL
,
CryptoPP
::
BlockPaddingSchemeDef
::
NO_PADDING
));
}
else
if
(
aes_cipher_name_
==
"AES_CTR_NoPadding"
&&
!
for_encrypt
)
{
m_cipher
->
reset
(
new
CryptoPP
::
CTR_Mode
<
CryptoPP
::
AES
>::
Decryption
);
*
need_iv
=
true
;
m_filter
->
reset
(
new
CryptoPP
::
StreamTransformationFilter
(
*
(
*
m_cipher
).
get
(),
NULL
,
CryptoPP
::
BlockPaddingSchemeDef
::
NO_PADDING
));
}
else
{
PADDLE_THROW
(
paddle
::
platform
::
errors
::
Unimplemented
(
"Create cipher error. "
"Cipher name %s is error, or has not been implemented."
,
aes_cipher_name_
));
}
}
void
AESCipher
::
BuildAuthEncCipher
(
bool
*
need_iv
,
CryptoPP
::
member_ptr
<
CryptoPP
::
AuthenticatedSymmetricCipher
>*
m_cipher
,
CryptoPP
::
member_ptr
<
CryptoPP
::
AuthenticatedEncryptionFilter
>*
m_filter
)
{
if
(
aes_cipher_name_
==
"AES_GCM_NoPadding"
)
{
m_cipher
->
reset
(
new
CryptoPP
::
GCM
<
CryptoPP
::
AES
>::
Encryption
);
*
need_iv
=
true
;
m_filter
->
reset
(
new
CryptoPP
::
AuthenticatedEncryptionFilter
(
*
(
*
m_cipher
).
get
(),
NULL
,
false
,
tag_size_
/
8
,
CryptoPP
::
DEFAULT_CHANNEL
,
CryptoPP
::
BlockPaddingSchemeDef
::
NO_PADDING
));
}
else
{
PADDLE_THROW
(
paddle
::
platform
::
errors
::
Unimplemented
(
"Create cipher error. "
"Cipher name %s is error, or has not been implemented."
,
aes_cipher_name_
));
}
}
void
AESCipher
::
BuildAuthDecCipher
(
bool
*
need_iv
,
CryptoPP
::
member_ptr
<
CryptoPP
::
AuthenticatedSymmetricCipher
>*
m_cipher
,
CryptoPP
::
member_ptr
<
CryptoPP
::
AuthenticatedDecryptionFilter
>*
m_filter
)
{
if
(
aes_cipher_name_
==
"AES_GCM_NoPadding"
)
{
m_cipher
->
reset
(
new
CryptoPP
::
GCM
<
CryptoPP
::
AES
>::
Decryption
);
*
need_iv
=
true
;
m_filter
->
reset
(
new
CryptoPP
::
AuthenticatedDecryptionFilter
(
*
(
*
m_cipher
).
get
(),
NULL
,
CryptoPP
::
AuthenticatedDecryptionFilter
::
DEFAULT_FLAGS
,
tag_size_
/
8
,
CryptoPP
::
BlockPaddingSchemeDef
::
NO_PADDING
));
}
else
{
PADDLE_THROW
(
paddle
::
platform
::
errors
::
Unimplemented
(
"Create cipher error. "
"Cipher name %s is error, or has not been implemented."
,
aes_cipher_name_
));
}
}
std
::
string
AESCipher
::
Encrypt
(
const
std
::
string
&
plaintext
,
const
std
::
string
&
key
)
{
return
is_authenticated_cipher_
?
AuthenticatedEncryptInternal
(
plaintext
,
key
)
:
EncryptInternal
(
plaintext
,
key
);
}
std
::
string
AESCipher
::
Decrypt
(
const
std
::
string
&
ciphertext
,
const
std
::
string
&
key
)
{
return
is_authenticated_cipher_
?
AuthenticatedDecryptInternal
(
ciphertext
,
key
)
:
DecryptInternal
(
ciphertext
,
key
);
}
void
AESCipher
::
EncryptToFile
(
const
std
::
string
&
plaintext
,
const
std
::
string
&
key
,
const
std
::
string
&
filename
)
{
std
::
ofstream
fout
(
filename
);
fout
<<
this
->
Encrypt
(
plaintext
,
key
);
fout
.
close
();
}
std
::
string
AESCipher
::
DecryptFromFile
(
const
std
::
string
&
key
,
const
std
::
string
&
filename
)
{
std
::
ifstream
fin
(
filename
);
std
::
string
ciphertext
{
std
::
istreambuf_iterator
<
char
>
(
fin
),
std
::
istreambuf_iterator
<
char
>
()};
fin
.
close
();
return
Decrypt
(
ciphertext
,
key
);
}
}
// namespace framework
}
// namespace paddle
paddle/fluid/framework/io/crypto/aes_cipher.h
0 → 100644
浏览文件 @
5a7a517c
// Copyright (c) 2020 PaddlePaddle Authors. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#pragma once
#include <string>
#include "paddle/fluid/framework/io/crypto/cipher.h"
namespace
CryptoPP
{
class
StreamTransformationFilter
;
class
SymmetricCipher
;
class
AuthenticatedSymmetricCipher
;
class
AuthenticatedDecryptionFilter
;
class
AuthenticatedEncryptionFilter
;
template
<
class
CryptoppCipher
>
class
member_ptr
;
}
// namespace CryptoPP
namespace
paddle
{
namespace
framework
{
class
AESCipher
:
public
Cipher
{
public:
AESCipher
()
=
default
;
~
AESCipher
()
{}
std
::
string
Encrypt
(
const
std
::
string
&
input
,
const
std
::
string
&
key
)
override
;
std
::
string
Decrypt
(
const
std
::
string
&
input
,
const
std
::
string
&
key
)
override
;
void
EncryptToFile
(
const
std
::
string
&
input
,
const
std
::
string
&
key
,
const
std
::
string
&
filename
)
override
;
std
::
string
DecryptFromFile
(
const
std
::
string
&
key
,
const
std
::
string
&
filename
)
override
;
void
Init
(
const
std
::
string
&
cipher_name
,
const
int
&
iv_size
,
const
int
&
tag_size
);
private:
std
::
string
EncryptInternal
(
const
std
::
string
&
plaintext
,
const
std
::
string
&
key
);
std
::
string
DecryptInternal
(
const
std
::
string
&
ciphertext
,
const
std
::
string
&
key
);
std
::
string
AuthenticatedEncryptInternal
(
const
std
::
string
&
plaintext
,
const
std
::
string
&
key
);
std
::
string
AuthenticatedDecryptInternal
(
const
std
::
string
&
ciphertext
,
const
std
::
string
&
key
);
void
BuildCipher
(
bool
for_encrypt
,
bool
*
need_iv
,
CryptoPP
::
member_ptr
<
CryptoPP
::
SymmetricCipher
>*
m_cipher
,
CryptoPP
::
member_ptr
<
CryptoPP
::
StreamTransformationFilter
>*
m_filter
);
void
BuildAuthEncCipher
(
bool
*
need_iv
,
CryptoPP
::
member_ptr
<
CryptoPP
::
AuthenticatedSymmetricCipher
>*
m_cipher
,
CryptoPP
::
member_ptr
<
CryptoPP
::
AuthenticatedEncryptionFilter
>*
m_filter
);
void
BuildAuthDecCipher
(
bool
*
need_iv
,
CryptoPP
::
member_ptr
<
CryptoPP
::
AuthenticatedSymmetricCipher
>*
m_cipher
,
CryptoPP
::
member_ptr
<
CryptoPP
::
AuthenticatedDecryptionFilter
>*
m_filter
);
std
::
string
aes_cipher_name_
;
int
iv_size_
;
int
tag_size_
;
std
::
string
iv_
;
bool
is_authenticated_cipher_
{
false
};
};
}
// namespace framework
}
// namespace paddle
paddle/fluid/framework/io/crypto/aes_cipher_test.cc
0 → 100644
浏览文件 @
5a7a517c
/* Copyright (c) 2018 PaddlePaddle Authors. All Rights Reserved.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License. */
#include "paddle/fluid/framework/io/crypto/aes_cipher.h"
#include <cryptopp/cryptlib.h>
#include <glog/logging.h>
#include <gtest/gtest.h>
#include <string>
#include <vector>
#include "paddle/fluid/framework/io/crypto/cipher.h"
#include "paddle/fluid/framework/io/crypto/cipher_utils.h"
namespace
paddle
{
namespace
framework
{
class
AESTest
:
public
::
testing
::
Test
{
public:
std
::
string
key
;
void
SetUp
()
override
{
key
=
CipherUtils
::
GenKey
(
256
);
}
static
void
GenConfigFile
(
const
std
::
string
&
cipher_name
);
};
void
AESTest
::
GenConfigFile
(
const
std
::
string
&
cipher_name
)
{
std
::
ofstream
fout
(
"aes_test.conf"
);
fout
<<
"cipher_name : "
<<
cipher_name
<<
std
::
endl
;
fout
.
close
();
}
TEST_F
(
AESTest
,
security_string
)
{
std
::
vector
<
std
::
string
>
name_list
(
{
"AES_CTR_NoPadding"
,
"AES_CBC_PKCSPadding"
,
"AES_ECB_PKCSPadding"
,
"AES_GCM_NoPadding"
});
const
std
::
string
plaintext
(
"hello world."
);
bool
is_throw
=
false
;
for
(
auto
&
i
:
name_list
)
{
AESTest
::
GenConfigFile
(
i
);
try
{
auto
cipher
=
CipherFactory
::
CreateCipher
(
"aes_test.conf"
);
std
::
string
ciphertext
=
cipher
->
Encrypt
(
plaintext
,
AESTest
::
key
);
std
::
string
plaintext1
=
cipher
->
Decrypt
(
ciphertext
,
AESTest
::
key
);
EXPECT_EQ
(
plaintext
,
plaintext1
);
}
catch
(
CryptoPP
::
Exception
&
e
)
{
is_throw
=
true
;
LOG
(
ERROR
)
<<
e
.
what
();
}
EXPECT_FALSE
(
is_throw
);
}
}
TEST_F
(
AESTest
,
security_vector
)
{
std
::
vector
<
std
::
string
>
name_list
(
{
"AES_CTR_NoPadding"
,
"AES_CBC_PKCSPadding"
,
"AES_ECB_PKCSPadding"
,
"AES_GCM_NoPadding"
});
std
::
vector
<
int
>
input
{
1
,
2
,
3
,
4
};
bool
is_throw
=
false
;
for
(
auto
&
i
:
name_list
)
{
AESTest
::
GenConfigFile
(
i
);
try
{
auto
cipher
=
CipherFactory
::
CreateCipher
(
"aes_test.conf"
);
for
(
auto
&
i
:
input
)
{
std
::
string
ciphertext
=
cipher
->
Encrypt
(
std
::
to_string
(
i
),
AESTest
::
key
);
std
::
string
plaintext
=
cipher
->
Decrypt
(
ciphertext
,
AESTest
::
key
);
int
output
=
std
::
stoi
(
plaintext
);
EXPECT_EQ
(
i
,
output
);
}
}
catch
(
CryptoPP
::
Exception
&
e
)
{
is_throw
=
true
;
LOG
(
ERROR
)
<<
e
.
what
();
}
EXPECT_FALSE
(
is_throw
);
}
}
TEST_F
(
AESTest
,
encrypt_to_file
)
{
std
::
vector
<
std
::
string
>
name_list
(
{
"AES_CTR_NoPadding"
,
"AES_CBC_PKCSPadding"
,
"AES_ECB_PKCSPadding"
,
"AES_GCM_NoPadding"
});
const
std
::
string
plaintext
(
"hello world."
);
std
::
string
filename
(
"aes_test.ciphertext"
);
bool
is_throw
=
false
;
for
(
auto
&
i
:
name_list
)
{
AESTest
::
GenConfigFile
(
i
);
try
{
auto
cipher
=
CipherFactory
::
CreateCipher
(
"aes_test.conf"
);
cipher
->
EncryptToFile
(
plaintext
,
AESTest
::
key
,
filename
);
std
::
string
plaintext1
=
cipher
->
DecryptFromFile
(
AESTest
::
key
,
filename
);
EXPECT_EQ
(
plaintext
,
plaintext1
);
}
catch
(
CryptoPP
::
Exception
&
e
)
{
is_throw
=
true
;
LOG
(
ERROR
)
<<
e
.
what
();
}
EXPECT_FALSE
(
is_throw
);
}
}
}
// namespace framework
}
// namespace paddle
paddle/fluid/framework/io/crypto/cipher.cc
0 → 100644
浏览文件 @
5a7a517c
// Copyright (c) 2019 PaddlePaddle Authors. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include "paddle/fluid/framework/io/crypto/cipher.h"
#include "paddle/fluid/framework/io/crypto/aes_cipher.h"
#include "paddle/fluid/framework/io/crypto/cipher_utils.h"
#include "paddle/fluid/platform/enforce.h"
namespace
paddle
{
namespace
framework
{
std
::
shared_ptr
<
Cipher
>
CipherFactory
::
CreateCipher
(
const
std
::
string
&
config_file
)
{
std
::
string
cipher_name
;
int
iv_size
;
int
tag_size
;
std
::
unordered_map
<
std
::
string
,
std
::
string
>
config
;
if
(
!
config_file
.
empty
())
{
config
=
CipherUtils
::
LoadConfig
(
config_file
);
CipherUtils
::
GetValue
<
std
::
string
>
(
config
,
"cipher_name"
,
&
cipher_name
);
}
else
{
// set default cipher name
cipher_name
=
"AES_CTR_NoPadding"
;
}
if
(
cipher_name
.
find
(
"AES"
)
!=
cipher_name
.
npos
)
{
auto
ret
=
std
::
make_shared
<
AESCipher
>
();
// if not set iv_size, set default value
if
(
config_file
.
empty
()
||
!
CipherUtils
::
GetValue
<
int
>
(
config
,
"iv_size"
,
&
iv_size
))
{
iv_size
=
CipherUtils
::
AES_DEFAULT_IV_SIZE
;
}
// if not set tag_size, set default value
if
(
config_file
.
empty
()
||
!
CipherUtils
::
GetValue
<
int
>
(
config
,
"tag_size"
,
&
tag_size
))
{
tag_size
=
CipherUtils
::
AES_DEFAULT_IV_SIZE
;
}
ret
->
Init
(
cipher_name
,
iv_size
,
tag_size
);
return
ret
;
}
else
{
PADDLE_THROW
(
paddle
::
platform
::
errors
::
InvalidArgument
(
"Invalid cipher name is specied. "
"Please check you have specified valid cipher"
" name in CryptoProperties."
));
}
return
nullptr
;
}
}
// namespace framework
}
// namespace paddle
paddle/fluid/framework/io/crypto/cipher.h
0 → 100644
浏览文件 @
5a7a517c
// Copyright (c) 2019 PaddlePaddle Authors. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#pragma once
#include <memory>
#include <string>
#include <unordered_map>
namespace
paddle
{
namespace
framework
{
class
Cipher
{
public:
Cipher
()
=
default
;
virtual
~
Cipher
()
{}
// encrypt string
virtual
std
::
string
Encrypt
(
const
std
::
string
&
plaintext
,
const
std
::
string
&
key
)
=
0
;
// decrypt string
virtual
std
::
string
Decrypt
(
const
std
::
string
&
ciphertext
,
const
std
::
string
&
key
)
=
0
;
// encrypt strings and read them to file,
virtual
void
EncryptToFile
(
const
std
::
string
&
plaintext
,
const
std
::
string
&
key
,
const
std
::
string
&
filename
)
=
0
;
// read from file and decrypt them
virtual
std
::
string
DecryptFromFile
(
const
std
::
string
&
key
,
const
std
::
string
&
filename
)
=
0
;
};
class
CipherFactory
{
public:
CipherFactory
()
=
default
;
static
std
::
shared_ptr
<
Cipher
>
CreateCipher
(
const
std
::
string
&
config_file
);
};
}
// namespace framework
}
// namespace paddle
paddle/fluid/framework/io/crypto/cipher_utils.cc
0 → 100644
浏览文件 @
5a7a517c
// Copyright (c) 2019 PaddlePaddle Authors. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include "paddle/fluid/framework/io/crypto/cipher_utils.h"
#include <cryptopp/osrng.h>
#include <fstream>
#include <sstream>
#include "paddle/fluid/platform/enforce.h"
namespace
paddle
{
namespace
framework
{
std
::
string
CipherUtils
::
GenKey
(
int
length
)
{
CryptoPP
::
AutoSeededRandomPool
prng
;
int
bit_length
=
length
/
8
;
std
::
string
rng
;
rng
.
resize
(
bit_length
);
// CryptoPP::byte key[length];
prng
.
GenerateBlock
(
reinterpret_cast
<
unsigned
char
*>
(
&
(
rng
.
at
(
0
))),
rng
.
size
());
return
rng
;
}
std
::
string
CipherUtils
::
GenKeyToFile
(
int
length
,
const
std
::
string
&
filename
)
{
CryptoPP
::
AutoSeededRandomPool
prng
;
std
::
string
rng
;
int
bit_length
=
length
/
8
;
rng
.
resize
(
bit_length
);
// CryptoPP::byte key[length];
prng
.
GenerateBlock
(
reinterpret_cast
<
unsigned
char
*>
(
&
(
rng
.
at
(
0
))),
rng
.
size
());
std
::
ofstream
fout
(
filename
);
PADDLE_ENFORCE_EQ
(
fout
.
is_open
(),
true
,
paddle
::
platform
::
errors
::
Unavailable
(
"Failed to open file : %s, "
"make sure input filename is available."
,
filename
));
fout
.
write
(
rng
.
c_str
(),
rng
.
size
());
fout
.
close
();
return
rng
;
}
std
::
string
CipherUtils
::
ReadKeyFromFile
(
const
std
::
string
&
filename
)
{
std
::
ifstream
fin
(
filename
,
std
::
ios
::
binary
);
std
::
string
ret
{
std
::
istreambuf_iterator
<
char
>
(
fin
),
std
::
istreambuf_iterator
<
char
>
()};
fin
.
close
();
return
ret
;
}
std
::
unordered_map
<
std
::
string
,
std
::
string
>
CipherUtils
::
LoadConfig
(
const
std
::
string
&
config_file
)
{
std
::
ifstream
fin
(
config_file
);
PADDLE_ENFORCE_EQ
(
fin
.
is_open
(),
true
,
paddle
::
platform
::
errors
::
Unavailable
(
"Failed to open file : %s, "
"make sure input filename is available."
,
config_file
));
std
::
unordered_map
<
std
::
string
,
std
::
string
>
ret
;
char
c
;
std
::
string
line
;
std
::
istringstream
iss
;
while
(
std
::
getline
(
fin
,
line
))
{
if
(
line
.
at
(
0
)
==
'#'
)
{
continue
;
}
iss
.
clear
();
iss
.
str
(
line
);
std
::
string
key
;
std
::
string
value
;
if
(
!
(
iss
>>
key
>>
c
>>
value
)
&&
(
c
==
':'
))
{
PADDLE_THROW
(
paddle
::
platform
::
errors
::
InvalidArgument
(
"Parse config file error, "
"check the format of configure in file %s."
,
config_file
));
}
ret
.
insert
({
key
,
value
});
}
return
ret
;
}
template
<
>
bool
CipherUtils
::
GetValue
<
bool
>
(
const
std
::
unordered_map
<
std
::
string
,
std
::
string
>&
config
,
const
std
::
string
&
key
,
bool
*
output
)
{
auto
itr
=
config
.
find
(
key
);
if
(
itr
==
config
.
end
())
{
return
false
;
}
std
::
istringstream
iss
(
itr
->
second
);
*
output
=
false
;
iss
>>
*
output
;
if
(
iss
.
fail
())
{
iss
.
clear
();
iss
>>
std
::
boolalpha
>>
*
output
;
}
return
true
;
}
const
int
CipherUtils
::
AES_DEFAULT_IV_SIZE
=
128
;
const
int
CipherUtils
::
AES_DEFAULT_TAG_SIZE
=
128
;
}
// namespace framework
}
// namespace paddle
paddle/fluid/framework/io/crypto/cipher_utils.h
0 → 100644
浏览文件 @
5a7a517c
// Copyright (c) 2019 PaddlePaddle Authors. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#pragma once
#include <string>
#include <unordered_map>
#include "paddle/fluid/platform/enforce.h"
namespace
paddle
{
namespace
framework
{
class
CipherUtils
{
public:
CipherUtils
()
=
default
;
static
std
::
string
GenKey
(
int
length
);
static
std
::
string
GenKeyToFile
(
int
length
,
const
std
::
string
&
filename
);
static
std
::
string
ReadKeyFromFile
(
const
std
::
string
&
filename
);
static
std
::
unordered_map
<
std
::
string
,
std
::
string
>
LoadConfig
(
const
std
::
string
&
config_file
);
template
<
typename
val_type
>
static
bool
GetValue
(
const
std
::
unordered_map
<
std
::
string
,
std
::
string
>&
config
,
const
std
::
string
&
key
,
val_type
*
output
);
static
const
int
AES_DEFAULT_IV_SIZE
;
static
const
int
AES_DEFAULT_TAG_SIZE
;
};
template
<
>
bool
CipherUtils
::
GetValue
<
bool
>
(
const
std
::
unordered_map
<
std
::
string
,
std
::
string
>&
config
,
const
std
::
string
&
key
,
bool
*
output
);
template
<
typename
val_type
>
bool
CipherUtils
::
GetValue
(
const
std
::
unordered_map
<
std
::
string
,
std
::
string
>&
config
,
const
std
::
string
&
key
,
val_type
*
output
)
{
auto
itr
=
config
.
find
(
key
);
if
(
itr
==
config
.
end
())
{
return
false
;
}
std
::
istringstream
iss
(
itr
->
second
);
iss
>>
*
output
;
return
true
;
}
}
// namespace framework
}
// namespace paddle
paddle/fluid/framework/io/crypto/cipher_utils_test.cc
0 → 100644
浏览文件 @
5a7a517c
/* Copyright (c) 2018 PaddlePaddle Authors. All Rights Reserved.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License. */
#include <gtest/gtest.h>
#include <fstream>
#include <string>
#include <vector>
#include "paddle/fluid/framework/io/crypto/cipher_utils.h"
namespace
paddle
{
namespace
framework
{
TEST
(
CipherUtils
,
load_config
)
{
std
::
string
filename
(
"cryptotest_config_file.conf"
);
std
::
ofstream
fout
(
filename
,
std
::
ios
::
out
);
fout
<<
"# anotation test line:"
" must have two space along ':'."
<<
std
::
endl
;
std
::
vector
<
std
::
string
>
key_value
;
key_value
.
emplace_back
(
"key_str : ciphername"
);
key_value
.
emplace_back
(
"key_int : 1"
);
key_value
.
emplace_back
(
"key_bool : true"
);
key_value
.
emplace_back
(
"key_bool1 : false"
);
key_value
.
emplace_back
(
"key_bool2 : 0"
);
for
(
auto
&
i
:
key_value
)
{
fout
<<
i
<<
std
::
endl
;
}
fout
.
close
();
auto
config
=
CipherUtils
::
LoadConfig
(
filename
);
std
::
string
out_str
;
EXPECT_TRUE
(
CipherUtils
::
GetValue
<
std
::
string
>
(
config
,
"key_str"
,
&
out_str
));
EXPECT_EQ
(
out_str
,
std
::
string
(
"ciphername"
));
int
out_int
;
EXPECT_TRUE
(
CipherUtils
::
GetValue
<
int
>
(
config
,
"key_int"
,
&
out_int
));
EXPECT_EQ
(
out_int
,
1
);
bool
out_bool
;
EXPECT_TRUE
(
CipherUtils
::
GetValue
<
bool
>
(
config
,
"key_bool"
,
&
out_bool
));
EXPECT_EQ
(
out_bool
,
true
);
bool
out_bool1
;
EXPECT_TRUE
(
CipherUtils
::
GetValue
<
bool
>
(
config
,
"key_bool1"
,
&
out_bool1
));
EXPECT_EQ
(
out_bool1
,
false
);
bool
out_bool2
;
EXPECT_TRUE
(
CipherUtils
::
GetValue
<
bool
>
(
config
,
"key_bool2"
,
&
out_bool2
));
EXPECT_EQ
(
out_bool2
,
false
);
}
TEST
(
CipherUtils
,
gen_key
)
{
std
::
string
filename
(
"test_keyfile"
);
std
::
string
key
=
CipherUtils
::
GenKey
(
256
);
std
::
string
key1
=
CipherUtils
::
GenKeyToFile
(
256
,
filename
);
EXPECT_NE
(
key
,
key1
);
std
::
string
key2
=
CipherUtils
::
ReadKeyFromFile
(
filename
);
EXPECT_EQ
(
key1
,
key2
);
EXPECT_EQ
(
static_cast
<
int
>
(
key
.
size
()),
32
);
}
}
// namespace framework
}
// namespace paddle
saxon_zh
@saxon_zh
mentioned in commit
325d9259
·
9月 28, 2020
mentioned in commit
325d9259
mentioned in commit 325d9259508fa10756a66276bb47d1c7023d9440
开关提交列表
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录