add validation of hmac
[heimdal.git] / lib / hcrypto / validate.c
blob3ed358df6627f34eb8a2e917d68f9c8b579facca
1 /*
2 * Copyright (c) 2010 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
34 #include <config.h>
36 #include <sys/types.h>
37 #include <limits.h>
38 #include <stdio.h>
39 #include <stdlib.h>
40 #include <string.h>
41 #include <getarg.h>
42 #include <roken.h>
44 #include <evp.h>
45 #include <hmac.h>
46 #include <err.h>
48 struct tests {
49 const EVP_CIPHER *(*cipher)(void);
50 const char *name;
51 void *key;
52 size_t keysize;
53 void *iv;
54 size_t datasize;
55 void *indata;
56 void *outdata;
57 void *outiv;
60 struct tests tests[] = {
62 EVP_aes_256_cbc,
63 "aes-256",
64 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
65 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
66 32,
67 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
68 16,
69 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
70 "\xdc\x95\xc0\x78\xa2\x40\x89\x89\xad\x48\xa2\x14\x92\x84\x20\x87"
72 #if 0
74 EVP_aes_128_cfb8,
75 "aes-cfb8-128",
76 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
77 16,
78 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
79 16,
80 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
81 "\x66\xe9\x4b\xd4\xef\x8a\x2c\x3b\x88\x4c\xfa\x59\xca\x34\x2b\x2e"
83 #endif
85 EVP_des_ede3_cbc,
86 "des-ede3",
87 "\x19\x17\xff\xe6\xbb\x77\x2e\xfc"
88 "\x29\x76\x43\xbc\x63\x56\x7e\x9a"
89 "\x00\x2e\x4d\x43\x1d\x5f\xfd\x58",
90 24,
91 "\xbf\x9a\x12\xb7\x26\x69\xfd\x05",
92 16,
93 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
94 "\x55\x95\x97\x76\xa9\x6c\x66\x40\x64\xc7\xf4\x1c\x21\xb7\x14\x1b"
96 #if 0
98 EVP_camellia_128_cbc,
99 "camellia128",
100 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
102 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
104 "\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
105 "\x07\x92\x3A\x39\xEB\x0A\x81\x7D\x1C\x4D\x87\xBD\xB8\x2D\x1F\x1C",
106 NULL
108 #endif
110 EVP_rc4,
111 "rc4 8",
112 "\x01\x23\x45\x67\x89\xAB\xCD\xEF",
114 NULL,
116 "\x00\x00\x00\x00\x00\x00\x00\x00",
117 "\x74\x94\xC2\xE7\x10\x4B\x08\x79",
118 NULL
121 EVP_rc4,
122 "rc4 5",
123 "\x61\x8a\x63\xd2\xfb",
125 NULL,
127 "\xdc\xee\x4c\xf9\x2c",
128 "\xf1\x38\x29\xc9\xde",
129 NULL
132 EVP_rc4,
133 "rc4 309",
134 "\x29\x04\x19\x72\xfb\x42\xba\x5f\xc7\x12\x77\x12\xf1\x38\x29\xc9",
136 NULL,
137 309,
138 "\x52\x75\x69\x73\x6c\x69\x6e\x6e"
139 "\x75\x6e\x20\x6c\x61\x75\x6c\x75"
140 "\x20\x6b\x6f\x72\x76\x69\x73\x73"
141 "\x73\x61\x6e\x69\x2c\x20\x74\xe4"
142 "\x68\x6b\xe4\x70\xe4\x69\x64\x65"
143 "\x6e\x20\x70\xe4\xe4\x6c\x6c\xe4"
144 "\x20\x74\xe4\x79\x73\x69\x6b\x75"
145 "\x75\x2e\x20\x4b\x65\x73\xe4\x79"
146 "\xf6\x6e\x20\x6f\x6e\x20\x6f\x6e"
147 "\x6e\x69\x20\x6f\x6d\x61\x6e\x61"
148 "\x6e\x69\x2c\x20\x6b\x61\x73\x6b"
149 "\x69\x73\x61\x76\x75\x75\x6e\x20"
150 "\x6c\x61\x61\x6b\x73\x6f\x74\x20"
151 "\x76\x65\x72\x68\x6f\x75\x75\x2e"
152 "\x20\x45\x6e\x20\x6d\x61\x20\x69"
153 "\x6c\x6f\x69\x74\x73\x65\x2c\x20"
154 "\x73\x75\x72\x65\x20\x68\x75\x6f"
155 "\x6b\x61\x61\x2c\x20\x6d\x75\x74"
156 "\x74\x61\x20\x6d\x65\x74\x73\xe4"
157 "\x6e\x20\x74\x75\x6d\x6d\x75\x75"
158 "\x73\x20\x6d\x75\x6c\x6c\x65\x20"
159 "\x74\x75\x6f\x6b\x61\x61\x2e\x20"
160 "\x50\x75\x75\x6e\x74\x6f\x20\x70"
161 "\x69\x6c\x76\x65\x6e\x2c\x20\x6d"
162 "\x69\x20\x68\x75\x6b\x6b\x75\x75"
163 "\x2c\x20\x73\x69\x69\x6e\x74\x6f"
164 "\x20\x76\x61\x72\x61\x6e\x20\x74"
165 "\x75\x75\x6c\x69\x73\x65\x6e\x2c"
166 "\x20\x6d\x69\x20\x6e\x75\x6b\x6b"
167 "\x75\x75\x2e\x20\x54\x75\x6f\x6b"
168 "\x73\x75\x74\x20\x76\x61\x6e\x61"
169 "\x6d\x6f\x6e\x20\x6a\x61\x20\x76"
170 "\x61\x72\x6a\x6f\x74\x20\x76\x65"
171 "\x65\x6e\x2c\x20\x6e\x69\x69\x73"
172 "\x74\xe4\x20\x73\x79\x64\xe4\x6d"
173 "\x65\x6e\x69\x20\x6c\x61\x75\x6c"
174 "\x75\x6e\x20\x74\x65\x65\x6e\x2e"
175 "\x20\x2d\x20\x45\x69\x6e\x6f\x20"
176 "\x4c\x65\x69\x6e\x6f",
177 "\x35\x81\x86\x99\x90\x01\xe6\xb5"
178 "\xda\xf0\x5e\xce\xeb\x7e\xee\x21"
179 "\xe0\x68\x9c\x1f\x00\xee\xa8\x1f"
180 "\x7d\xd2\xca\xae\xe1\xd2\x76\x3e"
181 "\x68\xaf\x0e\xad\x33\xd6\x6c\x26"
182 "\x8b\xc9\x46\xc4\x84\xfb\xe9\x4c"
183 "\x5f\x5e\x0b\x86\xa5\x92\x79\xe4"
184 "\xf8\x24\xe7\xa6\x40\xbd\x22\x32"
185 "\x10\xb0\xa6\x11\x60\xb7\xbc\xe9"
186 "\x86\xea\x65\x68\x80\x03\x59\x6b"
187 "\x63\x0a\x6b\x90\xf8\xe0\xca\xf6"
188 "\x91\x2a\x98\xeb\x87\x21\x76\xe8"
189 "\x3c\x20\x2c\xaa\x64\x16\x6d\x2c"
190 "\xce\x57\xff\x1b\xca\x57\xb2\x13"
191 "\xf0\xed\x1a\xa7\x2f\xb8\xea\x52"
192 "\xb0\xbe\x01\xcd\x1e\x41\x28\x67"
193 "\x72\x0b\x32\x6e\xb3\x89\xd0\x11"
194 "\xbd\x70\xd8\xaf\x03\x5f\xb0\xd8"
195 "\x58\x9d\xbc\xe3\xc6\x66\xf5\xea"
196 "\x8d\x4c\x79\x54\xc5\x0c\x3f\x34"
197 "\x0b\x04\x67\xf8\x1b\x42\x59\x61"
198 "\xc1\x18\x43\x07\x4d\xf6\x20\xf2"
199 "\x08\x40\x4b\x39\x4c\xf9\xd3\x7f"
200 "\xf5\x4b\x5f\x1a\xd8\xf6\xea\x7d"
201 "\xa3\xc5\x61\xdf\xa7\x28\x1f\x96"
202 "\x44\x63\xd2\xcc\x35\xa4\xd1\xb0"
203 "\x34\x90\xde\xc5\x1b\x07\x11\xfb"
204 "\xd6\xf5\x5f\x79\x23\x4d\x5b\x7c"
205 "\x76\x66\x22\xa6\x6d\xe9\x2b\xe9"
206 "\x96\x46\x1d\x5e\x4d\xc8\x78\xef"
207 "\x9b\xca\x03\x05\x21\xe8\x35\x1e"
208 "\x4b\xae\xd2\xfd\x04\xf9\x46\x73"
209 "\x68\xc4\xad\x6a\xc1\x86\xd0\x82"
210 "\x45\xb2\x63\xa2\x66\x6d\x1f\x6c"
211 "\x54\x20\xf1\x59\x9d\xfd\x9f\x43"
212 "\x89\x21\xc2\xf5\xa4\x63\x93\x8c"
213 "\xe0\x98\x22\x65\xee\xf7\x01\x79"
214 "\xbc\x55\x3f\x33\x9e\xb1\xa4\xc1"
215 "\xaf\x5f\x6a\x54\x7f"
219 static int
220 test_cipher(struct tests *t)
222 const EVP_CIPHER *c = t->cipher();
223 EVP_CIPHER_CTX ectx;
224 EVP_CIPHER_CTX dctx;
225 void *d;
227 EVP_CIPHER_CTX_init(&ectx);
228 EVP_CIPHER_CTX_init(&dctx);
230 if (EVP_CipherInit_ex(&ectx, c, NULL, NULL, NULL, 1) != 1)
231 errx(1, "%s: EVP_CipherInit_ex einit", t->name);
232 if (EVP_CipherInit_ex(&dctx, c, NULL, NULL, NULL, 0) != 1)
233 errx(1, "%s: EVP_CipherInit_ex dinit", t->name);
235 EVP_CIPHER_CTX_set_key_length(&ectx, t->keysize);
236 EVP_CIPHER_CTX_set_key_length(&dctx, t->keysize);
238 if (EVP_CipherInit_ex(&ectx, NULL, NULL, t->key, t->iv, 1) != 1)
239 errx(1, "%s: EVP_CipherInit_ex encrypt", t->name);
240 if (EVP_CipherInit_ex(&dctx, NULL, NULL, t->key, t->iv, 0) != 1)
241 errx(1, "%s: EVP_CipherInit_ex decrypt", t->name);
243 d = emalloc(t->datasize);
245 if (!EVP_Cipher(&ectx, d, t->indata, t->datasize))
246 return 1;
248 if (memcmp(d, t->outdata, t->datasize) != 0)
249 errx(1, "%s: encrypt not the same", t->name);
251 if (!EVP_Cipher(&dctx, d, d, t->datasize))
252 return 1;
254 if (memcmp(d, t->indata, t->datasize) != 0)
255 errx(1, "%s: decrypt not the same", t->name);
257 if (t->outiv)
258 /* XXXX check */;
260 EVP_CIPHER_CTX_cleanup(&ectx);
261 EVP_CIPHER_CTX_cleanup(&dctx);
262 free(d);
264 return 0;
267 static void
268 check_hmac(void)
270 unsigned char buf[4] = { 0, 0, 0, 0 };
271 char hmackey[] = "hello-world";
272 size_t hmackey_size = sizeof(hmackey);
273 unsigned int hmaclen;
274 unsigned char hmac[EVP_MAX_MD_SIZE];
275 HMAC_CTX c;
277 char answer[20] = "\x2c\xfa\x32\xb7\x2b\x8a\xf6\xdf\xcf\xda"
278 "\x6f\xd1\x52\x4d\x54\x58\x73\x0f\xf3\x24";
280 HMAC_CTX_init(&c);
281 HMAC_Init_ex(&c, hmackey, hmackey_size, EVP_sha1(), NULL);
282 HMAC_Update(&c, buf, sizeof(buf));
283 HMAC_Final(&c, hmac, &hmaclen);
284 HMAC_CTX_cleanup(&c);
286 if (hmaclen != 20)
287 errx(1, "hmaclen = %d\n", (int)hmaclen);
289 if (ct_memcmp(hmac, answer, hmaclen) != 0)
290 errx(1, "wrong answer\n");
293 void
294 hcrypto_validate(void)
296 static int validated = 0;
297 unsigned int i;
299 /* its ok to run this twice, do don't check for races */
300 if (validated)
301 return;
302 validated++;
304 for (i = 0; i < sizeof(tests) / sizeof(tests[0]); i++)
305 test_cipher(&tests[i]);
307 check_hmac();