1 /* $NetBSD: validate.c,v 1.1.1.2 2014/04/24 12:45:30 pettai Exp $ */
4 * Copyright (c) 2010 Kungliga Tekniska Högskolan
5 * (Royal Institute of Technology, Stockholm, Sweden).
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the Institute nor the names of its contributors
20 * may be used to endorse or promote products derived from this software
21 * without specific prior written permission.
23 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
38 #include <sys/types.h>
43 #include <krb5/roken.h>
50 const EVP_CIPHER
*(*cipher
)(void);
61 static struct tests hc_tests
[] = {
65 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
66 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
68 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
70 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
71 "\xdc\x95\xc0\x78\xa2\x40\x89\x89\xad\x48\xa2\x14\x92\x84\x20\x87"
77 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
79 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
81 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
82 "\x66\xe9\x4b\xd4\xef\x8a\x2c\x3b\x88\x4c\xfa\x59\xca\x34\x2b\x2e"
88 "\x19\x17\xff\xe6\xbb\x77\x2e\xfc"
89 "\x29\x76\x43\xbc\x63\x56\x7e\x9a"
90 "\x00\x2e\x4d\x43\x1d\x5f\xfd\x58",
92 "\xbf\x9a\x12\xb7\x26\x69\xfd\x05",
94 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
95 "\x55\x95\x97\x76\xa9\x6c\x66\x40\x64\xc7\xf4\x1c\x21\xb7\x14\x1b"
101 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
103 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
105 "\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
106 "\x07\x92\x3A\x39\xEB\x0A\x81\x7D\x1C\x4D\x87\xBD\xB8\x2D\x1F\x1C",
113 "\x01\x23\x45\x67\x89\xAB\xCD\xEF",
117 "\x00\x00\x00\x00\x00\x00\x00\x00",
118 "\x74\x94\xC2\xE7\x10\x4B\x08\x79",
124 "\x61\x8a\x63\xd2\xfb",
128 "\xdc\xee\x4c\xf9\x2c",
129 "\xf1\x38\x29\xc9\xde",
135 "\x29\x04\x19\x72\xfb\x42\xba\x5f\xc7\x12\x77\x12\xf1\x38\x29\xc9",
139 "\x52\x75\x69\x73\x6c\x69\x6e\x6e"
140 "\x75\x6e\x20\x6c\x61\x75\x6c\x75"
141 "\x20\x6b\x6f\x72\x76\x69\x73\x73"
142 "\x73\x61\x6e\x69\x2c\x20\x74\xe4"
143 "\x68\x6b\xe4\x70\xe4\x69\x64\x65"
144 "\x6e\x20\x70\xe4\xe4\x6c\x6c\xe4"
145 "\x20\x74\xe4\x79\x73\x69\x6b\x75"
146 "\x75\x2e\x20\x4b\x65\x73\xe4\x79"
147 "\xf6\x6e\x20\x6f\x6e\x20\x6f\x6e"
148 "\x6e\x69\x20\x6f\x6d\x61\x6e\x61"
149 "\x6e\x69\x2c\x20\x6b\x61\x73\x6b"
150 "\x69\x73\x61\x76\x75\x75\x6e\x20"
151 "\x6c\x61\x61\x6b\x73\x6f\x74\x20"
152 "\x76\x65\x72\x68\x6f\x75\x75\x2e"
153 "\x20\x45\x6e\x20\x6d\x61\x20\x69"
154 "\x6c\x6f\x69\x74\x73\x65\x2c\x20"
155 "\x73\x75\x72\x65\x20\x68\x75\x6f"
156 "\x6b\x61\x61\x2c\x20\x6d\x75\x74"
157 "\x74\x61\x20\x6d\x65\x74\x73\xe4"
158 "\x6e\x20\x74\x75\x6d\x6d\x75\x75"
159 "\x73\x20\x6d\x75\x6c\x6c\x65\x20"
160 "\x74\x75\x6f\x6b\x61\x61\x2e\x20"
161 "\x50\x75\x75\x6e\x74\x6f\x20\x70"
162 "\x69\x6c\x76\x65\x6e\x2c\x20\x6d"
163 "\x69\x20\x68\x75\x6b\x6b\x75\x75"
164 "\x2c\x20\x73\x69\x69\x6e\x74\x6f"
165 "\x20\x76\x61\x72\x61\x6e\x20\x74"
166 "\x75\x75\x6c\x69\x73\x65\x6e\x2c"
167 "\x20\x6d\x69\x20\x6e\x75\x6b\x6b"
168 "\x75\x75\x2e\x20\x54\x75\x6f\x6b"
169 "\x73\x75\x74\x20\x76\x61\x6e\x61"
170 "\x6d\x6f\x6e\x20\x6a\x61\x20\x76"
171 "\x61\x72\x6a\x6f\x74\x20\x76\x65"
172 "\x65\x6e\x2c\x20\x6e\x69\x69\x73"
173 "\x74\xe4\x20\x73\x79\x64\xe4\x6d"
174 "\x65\x6e\x69\x20\x6c\x61\x75\x6c"
175 "\x75\x6e\x20\x74\x65\x65\x6e\x2e"
176 "\x20\x2d\x20\x45\x69\x6e\x6f\x20"
177 "\x4c\x65\x69\x6e\x6f",
178 "\x35\x81\x86\x99\x90\x01\xe6\xb5"
179 "\xda\xf0\x5e\xce\xeb\x7e\xee\x21"
180 "\xe0\x68\x9c\x1f\x00\xee\xa8\x1f"
181 "\x7d\xd2\xca\xae\xe1\xd2\x76\x3e"
182 "\x68\xaf\x0e\xad\x33\xd6\x6c\x26"
183 "\x8b\xc9\x46\xc4\x84\xfb\xe9\x4c"
184 "\x5f\x5e\x0b\x86\xa5\x92\x79\xe4"
185 "\xf8\x24\xe7\xa6\x40\xbd\x22\x32"
186 "\x10\xb0\xa6\x11\x60\xb7\xbc\xe9"
187 "\x86\xea\x65\x68\x80\x03\x59\x6b"
188 "\x63\x0a\x6b\x90\xf8\xe0\xca\xf6"
189 "\x91\x2a\x98\xeb\x87\x21\x76\xe8"
190 "\x3c\x20\x2c\xaa\x64\x16\x6d\x2c"
191 "\xce\x57\xff\x1b\xca\x57\xb2\x13"
192 "\xf0\xed\x1a\xa7\x2f\xb8\xea\x52"
193 "\xb0\xbe\x01\xcd\x1e\x41\x28\x67"
194 "\x72\x0b\x32\x6e\xb3\x89\xd0\x11"
195 "\xbd\x70\xd8\xaf\x03\x5f\xb0\xd8"
196 "\x58\x9d\xbc\xe3\xc6\x66\xf5\xea"
197 "\x8d\x4c\x79\x54\xc5\x0c\x3f\x34"
198 "\x0b\x04\x67\xf8\x1b\x42\x59\x61"
199 "\xc1\x18\x43\x07\x4d\xf6\x20\xf2"
200 "\x08\x40\x4b\x39\x4c\xf9\xd3\x7f"
201 "\xf5\x4b\x5f\x1a\xd8\xf6\xea\x7d"
202 "\xa3\xc5\x61\xdf\xa7\x28\x1f\x96"
203 "\x44\x63\xd2\xcc\x35\xa4\xd1\xb0"
204 "\x34\x90\xde\xc5\x1b\x07\x11\xfb"
205 "\xd6\xf5\x5f\x79\x23\x4d\x5b\x7c"
206 "\x76\x66\x22\xa6\x6d\xe9\x2b\xe9"
207 "\x96\x46\x1d\x5e\x4d\xc8\x78\xef"
208 "\x9b\xca\x03\x05\x21\xe8\x35\x1e"
209 "\x4b\xae\xd2\xfd\x04\xf9\x46\x73"
210 "\x68\xc4\xad\x6a\xc1\x86\xd0\x82"
211 "\x45\xb2\x63\xa2\x66\x6d\x1f\x6c"
212 "\x54\x20\xf1\x59\x9d\xfd\x9f\x43"
213 "\x89\x21\xc2\xf5\xa4\x63\x93\x8c"
214 "\xe0\x98\x22\x65\xee\xf7\x01\x79"
215 "\xbc\x55\x3f\x33\x9e\xb1\xa4\xc1"
216 "\xaf\x5f\x6a\x54\x7f"
221 test_cipher(struct tests
*t
)
223 const EVP_CIPHER
*c
= t
->cipher();
228 EVP_CIPHER_CTX_init(&ectx
);
229 EVP_CIPHER_CTX_init(&dctx
);
231 if (EVP_CipherInit_ex(&ectx
, c
, NULL
, NULL
, NULL
, 1) != 1)
232 errx(1, "%s: EVP_CipherInit_ex einit", t
->name
);
233 if (EVP_CipherInit_ex(&dctx
, c
, NULL
, NULL
, NULL
, 0) != 1)
234 errx(1, "%s: EVP_CipherInit_ex dinit", t
->name
);
236 EVP_CIPHER_CTX_set_key_length(&ectx
, t
->keysize
);
237 EVP_CIPHER_CTX_set_key_length(&dctx
, t
->keysize
);
239 if (EVP_CipherInit_ex(&ectx
, NULL
, NULL
, t
->key
, t
->iv
, 1) != 1)
240 errx(1, "%s: EVP_CipherInit_ex encrypt", t
->name
);
241 if (EVP_CipherInit_ex(&dctx
, NULL
, NULL
, t
->key
, t
->iv
, 0) != 1)
242 errx(1, "%s: EVP_CipherInit_ex decrypt", t
->name
);
244 d
= emalloc(t
->datasize
);
246 if (!EVP_Cipher(&ectx
, d
, t
->indata
, t
->datasize
))
249 if (memcmp(d
, t
->outdata
, t
->datasize
) != 0)
250 errx(1, "%s: encrypt not the same", t
->name
);
252 if (!EVP_Cipher(&dctx
, d
, d
, t
->datasize
))
255 if (memcmp(d
, t
->indata
, t
->datasize
) != 0)
256 errx(1, "%s: decrypt not the same", t
->name
);
261 EVP_CIPHER_CTX_cleanup(&ectx
);
262 EVP_CIPHER_CTX_cleanup(&dctx
);
271 unsigned char buf
[4] = { 0, 0, 0, 0 };
272 char hmackey
[] = "hello-world";
273 size_t hmackey_size
= sizeof(hmackey
);
274 unsigned int hmaclen
;
275 unsigned char hmac
[EVP_MAX_MD_SIZE
];
278 char answer
[20] = "\x2c\xfa\x32\xb7\x2b\x8a\xf6\xdf\xcf\xda"
279 "\x6f\xd1\x52\x4d\x54\x58\x73\x0f\xf3\x24";
282 HMAC_Init_ex(&c
, hmackey
, hmackey_size
, EVP_sha1(), NULL
);
283 HMAC_Update(&c
, buf
, sizeof(buf
));
284 HMAC_Final(&c
, hmac
, &hmaclen
);
285 HMAC_CTX_cleanup(&c
);
288 errx(1, "hmaclen = %d\n", (int)hmaclen
);
290 if (ct_memcmp(hmac
, answer
, hmaclen
) != 0)
291 errx(1, "wrong answer\n");
295 hcrypto_validate(void)
297 static int validated
= 0;
300 /* its ok to run this twice, do don't check for races */
305 for (i
= 0; i
< sizeof(hc_tests
) / sizeof(hc_tests
[0]); i
++)
306 test_cipher(&hc_tests
[i
]);