1/* 2 * Copyright (c) 2010 Kungliga Tekniska Högskolan 3 * (Royal Institute of Technology, Stockholm, Sweden). 4 * All rights reserved. 5 * 6 * Redistribution and use in source and binary forms, with or without 7 * modification, are permitted provided that the following conditions 8 * are met: 9 * 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 17 * 3. Neither the name of the Institute nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 */ 33 34#include <config.h> 35 36#include <sys/types.h> 37#include <limits.h> 38#include <stdio.h> 39#include <stdlib.h> 40#include <string.h> 41#include <roken.h> 42 43#include <evp.h> 44#include <hmac.h> 45#include <err.h> 46 47#if 0 48 49struct tests { 50 const EVP_CIPHER *(*cipher)(void); 51 const char *name; 52 void *key; 53 size_t keysize; 54 void *iv; 55 size_t datasize; 56 void *indata; 57 void *outdata; 58 void *outiv; 59}; 60 61static struct tests hc_tests[] = { 62 { 63 EVP_aes_256_cbc, 64 "aes-256", 65 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" 66 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 67 32, 68 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 69 16, 70 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 71 "\xdc\x95\xc0\x78\xa2\x40\x89\x89\xad\x48\xa2\x14\x92\x84\x20\x87" 72 }, 73#if 0 74 { 75 EVP_aes_128_cfb8, 76 "aes-cfb8-128", 77 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 78 16, 79 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 80 16, 81 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 82 "\x66\xe9\x4b\xd4\xef\x8a\x2c\x3b\x88\x4c\xfa\x59\xca\x34\x2b\x2e" 83 }, 84#endif 85 { 86 EVP_des_ede3_cbc, 87 "des-ede3", 88 "\x19\x17\xff\xe6\xbb\x77\x2e\xfc" 89 "\x29\x76\x43\xbc\x63\x56\x7e\x9a" 90 "\x00\x2e\x4d\x43\x1d\x5f\xfd\x58", 91 24, 92 "\xbf\x9a\x12\xb7\x26\x69\xfd\x05", 93 16, 94 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 95 "\x55\x95\x97\x76\xa9\x6c\x66\x40\x64\xc7\xf4\x1c\x21\xb7\x14\x1b" 96 }, 97#if 0 98 { 99 EVP_camellia_128_cbc, 100 "camellia128", 101 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 102 16, 103 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 104 16, 105 "\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 106 "\x07\x92\x3A\x39\xEB\x0A\x81\x7D\x1C\x4D\x87\xBD\xB8\x2D\x1F\x1C", 107 NULL 108 }, 109#endif 110 { 111 EVP_rc4, 112 "rc4 8", 113 "\x01\x23\x45\x67\x89\xAB\xCD\xEF", 114 8, 115 NULL, 116 8, 117 "\x00\x00\x00\x00\x00\x00\x00\x00", 118 "\x74\x94\xC2\xE7\x10\x4B\x08\x79", 119 NULL 120 }, 121 { 122 EVP_rc4, 123 "rc4 5", 124 "\x61\x8a\x63\xd2\xfb", 125 5, 126 NULL, 127 5, 128 "\xdc\xee\x4c\xf9\x2c", 129 "\xf1\x38\x29\xc9\xde", 130 NULL 131 }, 132 { 133 EVP_rc4, 134 "rc4 309", 135 "\x29\x04\x19\x72\xfb\x42\xba\x5f\xc7\x12\x77\x12\xf1\x38\x29\xc9", 136 16, 137 NULL, 138 309, 139 "\x52\x75\x69\x73\x6c\x69\x6e\x6e" 140 "\x75\x6e\x20\x6c\x61\x75\x6c\x75" 141 "\x20\x6b\x6f\x72\x76\x69\x73\x73" 142 "\x73\x61\x6e\x69\x2c\x20\x74\xe4" 143 "\x68\x6b\xe4\x70\xe4\x69\x64\x65" 144 "\x6e\x20\x70\xe4\xe4\x6c\x6c\xe4" 145 "\x20\x74\xe4\x79\x73\x69\x6b\x75" 146 "\x75\x2e\x20\x4b\x65\x73\xe4\x79" 147 "\xf6\x6e\x20\x6f\x6e\x20\x6f\x6e" 148 "\x6e\x69\x20\x6f\x6d\x61\x6e\x61" 149 "\x6e\x69\x2c\x20\x6b\x61\x73\x6b" 150 "\x69\x73\x61\x76\x75\x75\x6e\x20" 151 "\x6c\x61\x61\x6b\x73\x6f\x74\x20" 152 "\x76\x65\x72\x68\x6f\x75\x75\x2e" 153 "\x20\x45\x6e\x20\x6d\x61\x20\x69" 154 "\x6c\x6f\x69\x74\x73\x65\x2c\x20" 155 "\x73\x75\x72\x65\x20\x68\x75\x6f" 156 "\x6b\x61\x61\x2c\x20\x6d\x75\x74" 157 "\x74\x61\x20\x6d\x65\x74\x73\xe4" 158 "\x6e\x20\x74\x75\x6d\x6d\x75\x75" 159 "\x73\x20\x6d\x75\x6c\x6c\x65\x20" 160 "\x74\x75\x6f\x6b\x61\x61\x2e\x20" 161 "\x50\x75\x75\x6e\x74\x6f\x20\x70" 162 "\x69\x6c\x76\x65\x6e\x2c\x20\x6d" 163 "\x69\x20\x68\x75\x6b\x6b\x75\x75" 164 "\x2c\x20\x73\x69\x69\x6e\x74\x6f" 165 "\x20\x76\x61\x72\x61\x6e\x20\x74" 166 "\x75\x75\x6c\x69\x73\x65\x6e\x2c" 167 "\x20\x6d\x69\x20\x6e\x75\x6b\x6b" 168 "\x75\x75\x2e\x20\x54\x75\x6f\x6b" 169 "\x73\x75\x74\x20\x76\x61\x6e\x61" 170 "\x6d\x6f\x6e\x20\x6a\x61\x20\x76" 171 "\x61\x72\x6a\x6f\x74\x20\x76\x65" 172 "\x65\x6e\x2c\x20\x6e\x69\x69\x73" 173 "\x74\xe4\x20\x73\x79\x64\xe4\x6d" 174 "\x65\x6e\x69\x20\x6c\x61\x75\x6c" 175 "\x75\x6e\x20\x74\x65\x65\x6e\x2e" 176 "\x20\x2d\x20\x45\x69\x6e\x6f\x20" 177 "\x4c\x65\x69\x6e\x6f", 178 "\x35\x81\x86\x99\x90\x01\xe6\xb5" 179 "\xda\xf0\x5e\xce\xeb\x7e\xee\x21" 180 "\xe0\x68\x9c\x1f\x00\xee\xa8\x1f" 181 "\x7d\xd2\xca\xae\xe1\xd2\x76\x3e" 182 "\x68\xaf\x0e\xad\x33\xd6\x6c\x26" 183 "\x8b\xc9\x46\xc4\x84\xfb\xe9\x4c" 184 "\x5f\x5e\x0b\x86\xa5\x92\x79\xe4" 185 "\xf8\x24\xe7\xa6\x40\xbd\x22\x32" 186 "\x10\xb0\xa6\x11\x60\xb7\xbc\xe9" 187 "\x86\xea\x65\x68\x80\x03\x59\x6b" 188 "\x63\x0a\x6b\x90\xf8\xe0\xca\xf6" 189 "\x91\x2a\x98\xeb\x87\x21\x76\xe8" 190 "\x3c\x20\x2c\xaa\x64\x16\x6d\x2c" 191 "\xce\x57\xff\x1b\xca\x57\xb2\x13" 192 "\xf0\xed\x1a\xa7\x2f\xb8\xea\x52" 193 "\xb0\xbe\x01\xcd\x1e\x41\x28\x67" 194 "\x72\x0b\x32\x6e\xb3\x89\xd0\x11" 195 "\xbd\x70\xd8\xaf\x03\x5f\xb0\xd8" 196 "\x58\x9d\xbc\xe3\xc6\x66\xf5\xea" 197 "\x8d\x4c\x79\x54\xc5\x0c\x3f\x34" 198 "\x0b\x04\x67\xf8\x1b\x42\x59\x61" 199 "\xc1\x18\x43\x07\x4d\xf6\x20\xf2" 200 "\x08\x40\x4b\x39\x4c\xf9\xd3\x7f" 201 "\xf5\x4b\x5f\x1a\xd8\xf6\xea\x7d" 202 "\xa3\xc5\x61\xdf\xa7\x28\x1f\x96" 203 "\x44\x63\xd2\xcc\x35\xa4\xd1\xb0" 204 "\x34\x90\xde\xc5\x1b\x07\x11\xfb" 205 "\xd6\xf5\x5f\x79\x23\x4d\x5b\x7c" 206 "\x76\x66\x22\xa6\x6d\xe9\x2b\xe9" 207 "\x96\x46\x1d\x5e\x4d\xc8\x78\xef" 208 "\x9b\xca\x03\x05\x21\xe8\x35\x1e" 209 "\x4b\xae\xd2\xfd\x04\xf9\x46\x73" 210 "\x68\xc4\xad\x6a\xc1\x86\xd0\x82" 211 "\x45\xb2\x63\xa2\x66\x6d\x1f\x6c" 212 "\x54\x20\xf1\x59\x9d\xfd\x9f\x43" 213 "\x89\x21\xc2\xf5\xa4\x63\x93\x8c" 214 "\xe0\x98\x22\x65\xee\xf7\x01\x79" 215 "\xbc\x55\x3f\x33\x9e\xb1\xa4\xc1" 216 "\xaf\x5f\x6a\x54\x7f" 217 } 218}; 219 220static int 221test_cipher(struct tests *t) 222{ 223 const EVP_CIPHER *c = t->cipher(); 224 EVP_CIPHER_CTX ectx; 225 EVP_CIPHER_CTX dctx; 226 void *d; 227 228 EVP_CIPHER_CTX_init(&ectx); 229 EVP_CIPHER_CTX_init(&dctx); 230 231 if (EVP_CipherInit_ex(&ectx, c, NULL, NULL, NULL, 1) != 1) 232 errx(1, "%s: EVP_CipherInit_ex einit", t->name); 233 if (EVP_CipherInit_ex(&dctx, c, NULL, NULL, NULL, 0) != 1) 234 errx(1, "%s: EVP_CipherInit_ex dinit", t->name); 235 236 EVP_CIPHER_CTX_set_key_length(&ectx, t->keysize); 237 EVP_CIPHER_CTX_set_key_length(&dctx, t->keysize); 238 239 if (EVP_CipherInit_ex(&ectx, NULL, NULL, t->key, t->iv, 1) != 1) 240 errx(1, "%s: EVP_CipherInit_ex encrypt", t->name); 241 if (EVP_CipherInit_ex(&dctx, NULL, NULL, t->key, t->iv, 0) != 1) 242 errx(1, "%s: EVP_CipherInit_ex decrypt", t->name); 243 244 d = emalloc(t->datasize); 245 246 if (!EVP_Cipher(&ectx, d, t->indata, t->datasize)) 247 return 1; 248 249 if (memcmp(d, t->outdata, t->datasize) != 0) 250 errx(1, "%s: encrypt not the same", t->name); 251 252 if (!EVP_Cipher(&dctx, d, d, t->datasize)) 253 return 1; 254 255 if (memcmp(d, t->indata, t->datasize) != 0) 256 errx(1, "%s: decrypt not the same", t->name); 257 258#if 0 259 if (t->outiv) 260 /* XXXX check */; 261#endif 262 263 EVP_CIPHER_CTX_cleanup(&ectx); 264 EVP_CIPHER_CTX_cleanup(&dctx); 265 free(d); 266 267 return 0; 268} 269 270static void 271check_hmac(void) 272{ 273 unsigned char buf[4] = { 0, 0, 0, 0 }; 274 char hmackey[] = "hello-world"; 275 size_t hmackey_size = sizeof(hmackey); 276 unsigned int hmaclen; 277 unsigned char hmac[EVP_MAX_MD_SIZE]; 278 HMAC_CTX c; 279 280 char answer[20] = "\x2c\xfa\x32\xb7\x2b\x8a\xf6\xdf\xcf\xda" 281 "\x6f\xd1\x52\x4d\x54\x58\x73\x0f\xf3\x24"; 282 283 HMAC_CTX_init(&c); 284 HMAC_Init_ex(&c, hmackey, hmackey_size, EVP_sha1(), NULL); 285 HMAC_Update(&c, buf, sizeof(buf)); 286 HMAC_Final(&c, hmac, &hmaclen); 287 HMAC_CTX_cleanup(&c); 288 289 if (hmaclen != 20) 290 errx(1, "hmaclen = %d\n", (int)hmaclen); 291 292 if (ct_memcmp(hmac, answer, hmaclen) != 0) 293 errx(1, "wrong answer\n"); 294} 295 296void 297hcrypto_validate(void) 298{ 299 static int validated = 0; 300 unsigned int i; 301 302 /* its ok to run this twice, do don't check for races */ 303 if (validated) 304 return; 305 validated++; 306 307 for (i = 0; i < sizeof(hc_tests) / sizeof(hc_tests[0]); i++) 308 test_cipher(&hc_tests[i]); 309 310 check_hmac(); 311} 312 313#else 314void 315hcrypto_validate(void) 316{ 317} 318#endif 319