1/*
2 * Copyright (c) 2010 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 *
10 * 1. Redistributions of source code must retain the above copyright
11 *    notice, this list of conditions and the following disclaimer.
12 *
13 * 2. Redistributions in binary form must reproduce the above copyright
14 *    notice, this list of conditions and the following disclaimer in the
15 *    documentation and/or other materials provided with the distribution.
16 *
17 * 3. Neither the name of the Institute nor the names of its contributors
18 *    may be used to endorse or promote products derived from this software
19 *    without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 */
33
34#include <config.h>
35
36#include <sys/types.h>
37#include <limits.h>
38#include <stdio.h>
39#include <stdlib.h>
40#include <string.h>
41#include <roken.h>
42
43#include <evp.h>
44#include <hmac.h>
45#include <err.h>
46
47#if 0
48
49struct tests {
50    const EVP_CIPHER *(*cipher)(void);
51    const char *name;
52    void *key;
53    size_t keysize;
54    void *iv;
55    size_t datasize;
56    void *indata;
57    void *outdata;
58    void *outiv;
59};
60
61static struct tests hc_tests[] = {
62    {
63	EVP_aes_256_cbc,
64	"aes-256",
65	"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
66	"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
67	32,
68	"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
69	16,
70	"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
71	"\xdc\x95\xc0\x78\xa2\x40\x89\x89\xad\x48\xa2\x14\x92\x84\x20\x87"
72    },
73#if 0
74    {
75	EVP_aes_128_cfb8,
76	"aes-cfb8-128",
77	"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
78	16,
79	"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
80	16,
81	"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
82	"\x66\xe9\x4b\xd4\xef\x8a\x2c\x3b\x88\x4c\xfa\x59\xca\x34\x2b\x2e"
83    },
84#endif
85    {
86	EVP_des_ede3_cbc,
87	"des-ede3",
88	"\x19\x17\xff\xe6\xbb\x77\x2e\xfc"
89	"\x29\x76\x43\xbc\x63\x56\x7e\x9a"
90	"\x00\x2e\x4d\x43\x1d\x5f\xfd\x58",
91	24,
92	"\xbf\x9a\x12\xb7\x26\x69\xfd\x05",
93	16,
94	"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
95	"\x55\x95\x97\x76\xa9\x6c\x66\x40\x64\xc7\xf4\x1c\x21\xb7\x14\x1b"
96    },
97#if 0
98    {
99	EVP_camellia_128_cbc,
100	"camellia128",
101	"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
102	16,
103	"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
104	16,
105	"\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
106	"\x07\x92\x3A\x39\xEB\x0A\x81\x7D\x1C\x4D\x87\xBD\xB8\x2D\x1F\x1C",
107	NULL
108    },
109#endif
110    {
111	EVP_rc4,
112	"rc4 8",
113	"\x01\x23\x45\x67\x89\xAB\xCD\xEF",
114	8,
115	NULL,
116	8,
117	"\x00\x00\x00\x00\x00\x00\x00\x00",
118	"\x74\x94\xC2\xE7\x10\x4B\x08\x79",
119	NULL
120    },
121    {
122	EVP_rc4,
123	"rc4 5",
124	"\x61\x8a\x63\xd2\xfb",
125	5,
126	NULL,
127	5,
128	"\xdc\xee\x4c\xf9\x2c",
129	"\xf1\x38\x29\xc9\xde",
130	NULL
131    },
132    {
133	EVP_rc4,
134	"rc4 309",
135	"\x29\x04\x19\x72\xfb\x42\xba\x5f\xc7\x12\x77\x12\xf1\x38\x29\xc9",
136	16,
137	NULL,
138	309,
139	"\x52\x75\x69\x73\x6c\x69\x6e\x6e"
140	"\x75\x6e\x20\x6c\x61\x75\x6c\x75"
141	"\x20\x6b\x6f\x72\x76\x69\x73\x73"
142	"\x73\x61\x6e\x69\x2c\x20\x74\xe4"
143	"\x68\x6b\xe4\x70\xe4\x69\x64\x65"
144	"\x6e\x20\x70\xe4\xe4\x6c\x6c\xe4"
145	"\x20\x74\xe4\x79\x73\x69\x6b\x75"
146	"\x75\x2e\x20\x4b\x65\x73\xe4\x79"
147	"\xf6\x6e\x20\x6f\x6e\x20\x6f\x6e"
148	"\x6e\x69\x20\x6f\x6d\x61\x6e\x61"
149	"\x6e\x69\x2c\x20\x6b\x61\x73\x6b"
150	"\x69\x73\x61\x76\x75\x75\x6e\x20"
151	"\x6c\x61\x61\x6b\x73\x6f\x74\x20"
152	"\x76\x65\x72\x68\x6f\x75\x75\x2e"
153	"\x20\x45\x6e\x20\x6d\x61\x20\x69"
154	"\x6c\x6f\x69\x74\x73\x65\x2c\x20"
155	"\x73\x75\x72\x65\x20\x68\x75\x6f"
156	"\x6b\x61\x61\x2c\x20\x6d\x75\x74"
157	"\x74\x61\x20\x6d\x65\x74\x73\xe4"
158	"\x6e\x20\x74\x75\x6d\x6d\x75\x75"
159	"\x73\x20\x6d\x75\x6c\x6c\x65\x20"
160	"\x74\x75\x6f\x6b\x61\x61\x2e\x20"
161	"\x50\x75\x75\x6e\x74\x6f\x20\x70"
162	"\x69\x6c\x76\x65\x6e\x2c\x20\x6d"
163	"\x69\x20\x68\x75\x6b\x6b\x75\x75"
164	"\x2c\x20\x73\x69\x69\x6e\x74\x6f"
165	"\x20\x76\x61\x72\x61\x6e\x20\x74"
166	"\x75\x75\x6c\x69\x73\x65\x6e\x2c"
167	"\x20\x6d\x69\x20\x6e\x75\x6b\x6b"
168	"\x75\x75\x2e\x20\x54\x75\x6f\x6b"
169	"\x73\x75\x74\x20\x76\x61\x6e\x61"
170	"\x6d\x6f\x6e\x20\x6a\x61\x20\x76"
171	"\x61\x72\x6a\x6f\x74\x20\x76\x65"
172	"\x65\x6e\x2c\x20\x6e\x69\x69\x73"
173	"\x74\xe4\x20\x73\x79\x64\xe4\x6d"
174	"\x65\x6e\x69\x20\x6c\x61\x75\x6c"
175	"\x75\x6e\x20\x74\x65\x65\x6e\x2e"
176	"\x20\x2d\x20\x45\x69\x6e\x6f\x20"
177	"\x4c\x65\x69\x6e\x6f",
178	"\x35\x81\x86\x99\x90\x01\xe6\xb5"
179	"\xda\xf0\x5e\xce\xeb\x7e\xee\x21"
180	"\xe0\x68\x9c\x1f\x00\xee\xa8\x1f"
181	"\x7d\xd2\xca\xae\xe1\xd2\x76\x3e"
182	"\x68\xaf\x0e\xad\x33\xd6\x6c\x26"
183	"\x8b\xc9\x46\xc4\x84\xfb\xe9\x4c"
184	"\x5f\x5e\x0b\x86\xa5\x92\x79\xe4"
185	"\xf8\x24\xe7\xa6\x40\xbd\x22\x32"
186	"\x10\xb0\xa6\x11\x60\xb7\xbc\xe9"
187	"\x86\xea\x65\x68\x80\x03\x59\x6b"
188	"\x63\x0a\x6b\x90\xf8\xe0\xca\xf6"
189	"\x91\x2a\x98\xeb\x87\x21\x76\xe8"
190	"\x3c\x20\x2c\xaa\x64\x16\x6d\x2c"
191	"\xce\x57\xff\x1b\xca\x57\xb2\x13"
192	"\xf0\xed\x1a\xa7\x2f\xb8\xea\x52"
193	"\xb0\xbe\x01\xcd\x1e\x41\x28\x67"
194	"\x72\x0b\x32\x6e\xb3\x89\xd0\x11"
195	"\xbd\x70\xd8\xaf\x03\x5f\xb0\xd8"
196	"\x58\x9d\xbc\xe3\xc6\x66\xf5\xea"
197	"\x8d\x4c\x79\x54\xc5\x0c\x3f\x34"
198	"\x0b\x04\x67\xf8\x1b\x42\x59\x61"
199	"\xc1\x18\x43\x07\x4d\xf6\x20\xf2"
200	"\x08\x40\x4b\x39\x4c\xf9\xd3\x7f"
201	"\xf5\x4b\x5f\x1a\xd8\xf6\xea\x7d"
202	"\xa3\xc5\x61\xdf\xa7\x28\x1f\x96"
203	"\x44\x63\xd2\xcc\x35\xa4\xd1\xb0"
204	"\x34\x90\xde\xc5\x1b\x07\x11\xfb"
205	"\xd6\xf5\x5f\x79\x23\x4d\x5b\x7c"
206	"\x76\x66\x22\xa6\x6d\xe9\x2b\xe9"
207	"\x96\x46\x1d\x5e\x4d\xc8\x78\xef"
208	"\x9b\xca\x03\x05\x21\xe8\x35\x1e"
209	"\x4b\xae\xd2\xfd\x04\xf9\x46\x73"
210	"\x68\xc4\xad\x6a\xc1\x86\xd0\x82"
211	"\x45\xb2\x63\xa2\x66\x6d\x1f\x6c"
212	"\x54\x20\xf1\x59\x9d\xfd\x9f\x43"
213	"\x89\x21\xc2\xf5\xa4\x63\x93\x8c"
214	"\xe0\x98\x22\x65\xee\xf7\x01\x79"
215	"\xbc\x55\x3f\x33\x9e\xb1\xa4\xc1"
216	"\xaf\x5f\x6a\x54\x7f"
217    }
218};
219
220static int
221test_cipher(struct tests *t)
222{
223    const EVP_CIPHER *c = t->cipher();
224    EVP_CIPHER_CTX ectx;
225    EVP_CIPHER_CTX dctx;
226    void *d;
227
228    EVP_CIPHER_CTX_init(&ectx);
229    EVP_CIPHER_CTX_init(&dctx);
230
231    if (EVP_CipherInit_ex(&ectx, c, NULL, NULL, NULL, 1) != 1)
232	errx(1, "%s: EVP_CipherInit_ex einit", t->name);
233    if (EVP_CipherInit_ex(&dctx, c, NULL, NULL, NULL, 0) != 1)
234	errx(1, "%s: EVP_CipherInit_ex dinit", t->name);
235
236    EVP_CIPHER_CTX_set_key_length(&ectx, t->keysize);
237    EVP_CIPHER_CTX_set_key_length(&dctx, t->keysize);
238
239    if (EVP_CipherInit_ex(&ectx, NULL, NULL, t->key, t->iv, 1) != 1)
240	errx(1, "%s: EVP_CipherInit_ex encrypt", t->name);
241    if (EVP_CipherInit_ex(&dctx, NULL, NULL, t->key, t->iv, 0) != 1)
242	errx(1, "%s: EVP_CipherInit_ex decrypt", t->name);
243
244    d = emalloc(t->datasize);
245
246    if (!EVP_Cipher(&ectx, d, t->indata, t->datasize))
247	return 1;
248
249    if (memcmp(d, t->outdata, t->datasize) != 0)
250	errx(1, "%s: encrypt not the same", t->name);
251
252    if (!EVP_Cipher(&dctx, d, d, t->datasize))
253	return 1;
254
255    if (memcmp(d, t->indata, t->datasize) != 0)
256	errx(1, "%s: decrypt not the same", t->name);
257
258#if 0
259    if (t->outiv)
260	/* XXXX check  */;
261#endif
262
263    EVP_CIPHER_CTX_cleanup(&ectx);
264    EVP_CIPHER_CTX_cleanup(&dctx);
265    free(d);
266
267    return 0;
268}
269
270static void
271check_hmac(void)
272{
273    unsigned char buf[4] = { 0, 0, 0, 0 };
274    char hmackey[] = "hello-world";
275    size_t hmackey_size = sizeof(hmackey);
276    unsigned int hmaclen;
277    unsigned char hmac[EVP_MAX_MD_SIZE];
278    HMAC_CTX c;
279
280    char answer[20] = "\x2c\xfa\x32\xb7\x2b\x8a\xf6\xdf\xcf\xda"
281	              "\x6f\xd1\x52\x4d\x54\x58\x73\x0f\xf3\x24";
282
283    HMAC_CTX_init(&c);
284    HMAC_Init_ex(&c, hmackey, hmackey_size, EVP_sha1(), NULL);
285    HMAC_Update(&c, buf, sizeof(buf));
286    HMAC_Final(&c, hmac, &hmaclen);
287    HMAC_CTX_cleanup(&c);
288
289    if (hmaclen != 20)
290	errx(1, "hmaclen = %d\n", (int)hmaclen);
291
292    if (ct_memcmp(hmac, answer, hmaclen) != 0)
293	errx(1, "wrong answer\n");
294}
295
296void
297hcrypto_validate(void)
298{
299    static int validated = 0;
300    unsigned int i;
301
302    /* its ok to run this twice, do don't check for races */
303    if (validated)
304	return;
305    validated++;
306
307    for (i = 0; i < sizeof(hc_tests) / sizeof(hc_tests[0]); i++)
308	test_cipher(&hc_tests[i]);
309
310    check_hmac();
311}
312
313#else
314void
315hcrypto_validate(void)
316{
317}
318#endif
319